SlideShare a Scribd company logo
1 of 37
Download to read offline
Question Answer1
Which was the first protocols which laid foundation of internet?
Mediation of banks or other monetary institutions increase _____ and ____ to settle a
transaction
_________ developed the cryptocurrency Bitcoin.
________ is the component that completes the Internet puzzle and makes it more open, more
accessible, and more reliable.
Blockchain is a system of records to transact value in a _________ way.
_________ and __________ are not two different entities in a blockchain setting.
Blockchain is ___________
Ledger database of blockchain is __________ database
A new entry on database gets reflected on __________ of the databases hosted on different
nodes.
Blockchain is a layer which is _______ of the Internet
Blockchain is ___________ in nature.
Every block in a blockchain is a collection of __________________
What is the name of the part that links back to he previous block in the chain?
It is _________ to access all the previous blocks in a blockchain.
The transaction data in the blocks is __________
Which perspective indicates the control that an individual, or a group of people, or an
organization as a whole has on a system ?
immutable
Political
all copies
on top
open-sourced
Transactions
Header
Feasible
TCP-IP
cost,time
Satoshi Nakamoto
Blockchain
Peer to peer
Transaction and settlement
decentralized
append-only
Centralization of power can lead to ____________ operations
_____________ is difficult in most of the time in a centralized system.
A typical centralized system structure is _______ to _________ node
Decentralized systems are ___________
Layered approach in the TCP/IP stack is actually a standard to achieve an __________
system
Which is the layer where you code up the desired functionalities ?
The set of instructions that are executed in Execution layer are called ?
Ethereum’s code or its smart contracts written in solidity gets compiled to __________
All the nodes in a blockchain network have to execute the programs/scripts ___________
In which layer, the rules of the system can be defined, such as data models and structures ?
Which layer allows peer to peer communication by discovering nodes ?
__________ consensus mechanism to select a node at random that can propose a block.
Which is the base layer of blockchain?
Which of the following is an account based blockchain implementation ?
Blockchain is a combination of the concepts from cryptography, ____________, and
computer science engineering.
Transaction in blockchain are secured by _____________.
_________ Generals’ Problem is an obvious and common problem that distributed systems
deal with to remain fault tolerant
Byzantine
Propagation layer
Proof of work
Consesus layer
Ethereum
Game theory
Cryptography
Open
Application
smart contracts
Bytecode
independently
Semantic layer
Unethical
Scalability
one to many
Symmetric
The __________ field provides a radically different approach to determine how a system
will behave.
The sole purpose of game theory in blockchain is to ensure that the system is _______
The underlying crypto and game theoretic ___________ protocols could be different in
different use cases.
Data structures and peer-to-peer network communication technique are supported by
___________ field of blockchain.
The purpose of cryptography is to make system _________.
____________ is the science of keeping things confidential.
Which of the following is not a usage of crytography?
Any information presented as a text message, numeric data, or a computer program can be
called _______.
The text which is encrypted is called __________.
Who decrypts the data ?
A type of cryptography where both sender and receiver uses same encryption keys is called?
Symetric key cryptography is not used in which of the following protocols ?
Kerckhoffs principle states that cryptosystem should be _________ even though a system is
publicly accessible.
What is the base of the encryption and decryption algorithm?
Which of the follwing is not a property is XOR operation ?
_____________ convert one symbol of plaintext into one symbol of ciphertext.
For such a system to remain secure, the pseudorandom keystream generator has to be _____
and ________.
TCP
secured
XOR operation
Additive
Stream ciphers
secure,unpredictable
cryptography
efficiency
plaintext
ciphertext
recipient
Symetric encryption
game theory
stable
consensus
computer science
secure
Stream ciphers are an approximation of a proven perfect cipher called ___________.
The Data Encryption Standard (DES) is a __________ cipher technique
In symmetric cryptography, a large number of block ciphers use a design scheme known as a
_______________
Data encryption standard uses 64 bit key out of which 8 bit is reserved for ____________
DES uses ______ rounds of Feistel network
All of these consensus algorithms’ primary objective is Byzantine ______________.
one thing that makes cryptocurrency systems stable is the “______” element.
Fiat currencies are backed by ___________
what is the process of generating bitcoins called ?
The Bitcoin Core client uses the ________ database of Google to store the blockchain
datastructure internally
The first block of a blockchain is called?
Which hashing algorithm does bitcoin use?
Size of the block header in a blockchain;s block is _________ bytes
The ________ in the Merkle tree actually represent the hash of the transactions
The nonce in the header starts from _______
_______ nodes can carry all permissible activity such as mining transactions and
broadcasting transactions,
Which nodes are also termed as "thin clients" ?
80
Leaf Nodes
zero
Full nodes
Lightweight nodes
trust
gold
mining
LevelDB
Genesis Block
SHA-256
One time pad
Symetric block
Feistel cipher
parity check
16
fault tolerance
How does new node detect peering nodes ?
How many public keys can one have ?
____________ refers to successfully creating a new block in the blockchain
In Bitcoin, it is the distributed __________ consensus algorithm that helps mine new blocks
by maintaining decentralization
What are set of instructions recorded with each transaction that describes how the next
person can gain access to those Bitcoins received and spend them called ?
Scripting used by Bitcoins are ______ based ?
Unlocking Script has _________ and __________ as its components
Which output instructions does duplicate top item in stack ?
The latest block defines the _______ of the blockchain
Bitcoin uses _______ digital signature algorithm.
The public keys are hashed twice to generate the Bitcoin adress, first with SHA256 and then
with _________
BitcoinJ is a __________ to work with Bitcoin protocol
What is full form of SPV ?
Which Is the most famous Bitcoin software that full nodes use ?
The merkleblock message size is in ______.
A group of computers that communicate with each other without relying on central authority
is refer as__
In Etherum _____ is used for security during transaction.
Bitcoin core
kilobyte
Peer-to-peer network
Hashing and Asymetric
Cryptography
OP_DUP
height
ECDSA
RIPEMD160
Library
Simple Payment Verification
As many as one needs
block mining
Proof of work
Scripts
Stack
Public key, Signature
DNS seeds
In Bitcoin___ is used to generate a unique fingerprint to confirm that data has not altered.
In Bitcoin___ is refered as digital dollar.
EVM stands for___.
Machines on Etherum network join and do validating transaction, the process is known
as___.
____ is a nick name for native Ethrum browser.
____ is true about smart contract.
____ law states that,"In economy bad money drives out good."
Private chain has some bridge to the public chain in Etherum , it is refered as____
Etherum chains can do__
____ is a currency to use in private transactions ledger on public chain.
_____ is a lightweight operation performs basic functions.
Accounts in Etherum are represented by____
In Etherum account address is____.
____ is not true about account in blockchain.
In symmetric cryptograhy plain text is converted in to cipher text by applying small data
string which is called as__
Encryption of message with sender's authenticity refered as__
____ is not a tool to work with Etherum in Mist.
key
Secure and Signed Messaging
MistMask
All Of The Mentioned
Subcurrency
Wallet
Hexadecimal value
Public key
does not contain state of the
account
Etherum Virtual Machine
Mining
Mist
it is self executing
Gresham's
Permisioned blockchain
Cryptographic Hashing
Barbados
In Etherum own tokens can be launched on___
____ does not relate to asymetric cryptography
Public blockchains are also refered as____
___ programming language is used in Etherum.
When a wallet application attempts to make any change , then__
In Etherum 'smart contract' is___
____ powers the EVM.
Symmetric key cryptography requires ____.
____ is a command line interface for Etherum.
____ is private Etherum development company.
_____ functionality is not available in Etherum network.
External account have___state.
Contract account has ___ state
_____ is/are features of Etherum network.
___ is not true about paper wallet.
Jaxx is the popular ___ wallet.
Blockchain networks like Etherum work without 'chargeback', it means__
Mobile Wallet
once transaction written can not
change
Ethcore.io
forgot password
Balance state
Both balance and contract state
All Of The Mentioned
it can work when user is online
Solidicity
All Of The Mentioned
Business rules implied by the
contract in blockchain
Gas
Secure channel
go-etherum and cpp etherum
Both public and private chain
mining
permissionless blockchain
What is a gas?
____ shows historical record of all transactions.
In blockchain context,____ compares large data sets quickly and evalute whether their
contents are similar.
DLT stands for___
Low blocktime helps for____.
_____ may cause for wrong transaction.
Every transaction requires___.
EOA refers to___.
_____ is not true about Contract account.
Transaction contains__
Messages in blockchain contains__.
In EVM gas fees for stop operation is___.
In EVM gas fees for store operation is___.
For queries account balance in EVM gas fees is___.
In EVM for ___ operation no gas fees applies.
In EVM___ opcode gives the address of currently executing account.
In EVM _____ is not a environmental information op code. SHA3
All Of The Mentioned
0
100
20
suicide
ADDRESS
speedy transaction
Short block
Externally Owned Account
controlled by humans
All Of The Mentioned
fee required to succesfully
conduct a transaction
Browser Explorer
hash function
Distributed Ledger Technology
In EVM ____ is arithmatic opcde.
____ opcode in EVM gives block number.
___ opcode gives block's beneficiary address.
To get the amount of available gas, including the corresponding reduction, ___ opcode is
used in EVM.
____ is not a exachange operation in EVM opcode.
____ opcode in EVM halts the execution and register account for later deletion.
___ programming is used to write smart contarcts.
____ currencies are used to promote local economic development with in a small community
and build social capital in that community.
Solidicity prigramming language supports__.
Process of validating transactions following a specific protocol is called as___.
___ tool helps to easily interact with the Etherum network in your browser.
___ is the file extension for solidicity.
___ is the advantage of public blockchain.
A ____ instrument used to transfer value between two parties over a blockchain network.
Task of miners in blockchain is____.
___ is not true about functions in solidicity.
____ gives hash of the given block.
.sol
open to everyone without
permission.
token
Compete for a reward by trying
to calculate the nonce.
they are public by default.
block.blockhash
SUICIDE
Solidicity
complementry currency
All Of The Mentioned
Consensus
MetaMask
All Of The Mentioned
NUMBER
COINBASE
GAS
SWAP11
To destroy current contract , sending funds to the given address.
Etherum refers to____.
Solidity is ___type of programming language.
___statement is true about Gas Fees.
Smart contracts are written using the _________ programming language
In software interface design, ________ is the general term for little buttons.sliders, dials,
startups,hearts or any other thing you can click to make something happen
DApps stands for
An asset whose price goes down is called
The popularity of a technology increases as more people us it.This is called the
People invest in geographic areas where they or their families reside.This is called as
Token in Ethereum is
We can procure Faux ether using
etherscan.io is
Which command amongst this is used to specify the version of compiler in solidity?
Gas amount is specified in
Ethereum based custom tokens can be used on
Token can be watched using
Blockchain Explorer
pragma solidity
Wei
Public and Private Chain
etherscan.io
Distributed Apps
depreciating asset
network effect
home bias
subcurrency
Faucets
selfdestruct<address recipients>
All Of The Mentioned
Object Oriented
Gas measures how much efforts
each transaction step incurs.
Solidity
Controls
EVM stands for
Ropsten, Rinkeby and Kovan are examples of?
We need to enter ________ while watching a token
msg.sender is an example of
Receiver address can be printed as a machine readable code in a nested square pattern called
Which amongst the following is Ethereum's native browser?
Accounts in Ethereum are represented as
Which amongst this is not a type of Ethereum address?
The situation when the price drops before you get a chance to sell your currency is called
Tokens are also called as
Ropsten test network was formerly called as
faucet.ropsten.be is used for
Supply field in MyToken Contract represents
Which amongst this is not a field in MyToken Contract?
Name field in MyToken Contract represents
Token can be watched using
Which amongst this is a Token Standard?
Address
Token Name
Token Address
ETS
IP Address
Slippage
Coins
Morden
procuring faux ether
Number of tokens to be created
TestNet
Token Address
Global Variable
QR Code
Mist
Hexadecimal Numbers
Ethereum Virtual Machine
Decimal field in MyToken Contract represents
Local currency is also called as
What are contracts called in Hyperledger?
Hyperledger is hosted by which Foundation?
Hyperledger was launched in the year ___________
Hot swapping in hyperledger refers to
How many frameworks does HyperLedger have?
The Hyperledger fabric framework was contributed by
Which amongst these frameworks is focused on mobile applications?
Which amongst these frameworks is Ethereum VM built to specification?
The Hyperledger Sawtooth framework was contributed by
Which amongst these frameworks can be used for supply chain on a distributed ledger?
Which amongst these tools is used for benchmarking?
The certificate generation tool used by MSP is
Which amongst these tools is used for creating and managing blockchains?
Which amongst these tools is an Interledger Protocol?
Chaincodes are written using the _________ programming language
Cello
Quilt
GoLang
Iroha
Burrow
Intel
Grid
Calipher
cryptogen
Chaincode
Linux
2015
replacing the consensus while the
network is running
6
IBM
subunits of token
Fiat
Which amongst this is not an Hyperledger Fabric asset?
MSP stands for
Which amongst these tools is a shared cryptographic library?
The hyperledger fabric network acts as ______ layer for client applications
This peer approves or disapproves transaction in Hyperledger
This peer receiver and send messages to other peers in Hyperledger
Curl stands for
Hyperledger can be installed on
The default admin in Hyperledger Fabric is
The command to shutdown a Hyperledger Fabric is
Which amongst this is not a component of Hyperledger Composer?
Which amongst this is an extension of the network model ?
Which amongst this is a chaincode file?
Which amongst this is not a component of a BNA?
BNA is an archive made up of ____ files
What is the command for creating an Admin card in Hyperledger?
What is the command for removing a container in Docker?
createPeerAdminCard.sh
docker rm containerid
stopFabric.sh
Docker
cto
AdminCard.sh
4
Back End
Endorser Peer
Anchor Peer
Client URL
MacOS
PeerAdmin
Private Key
Membership Service Provider
URSA
Which component is used to view,invoke,deploy and query blocks,transactions and data in
Hyperledger?
What is the javascript version of Interledger Protocol in HyperLedger called?
The node which handles shared ledger of the network is called
Network Connection Profile is stored as _______ File
Which amongst these components is used to test the code without pushing it on the
blockchain?
Which amongst these files contains the right of participants?
Which amongst these files defines queries that can run in a network?
Online version of composer playground is
___________provides a wizard generator through command line
Which amongst this is apple's IDE for software development?
Which amongst this is a package manager?
The name Vitalik Buterin can be assiciated with _____________.
The process of arriving at a consensus about the legitimacy and order of transaction is called
as _____________.
The amount of computation a miner can apply to a network is called?
Ethash is the name given to _________.
What is the native token of Ethereum called as?
Which one of the following value declares a block valid or canonical? Nonce
npm
Ethereum
Mining
Horse power
Ethereum Structure
Ether
Hyperledger Composer
Playground
acl
qry
mybluemix.net
Yeoman
xcode
Explorer
Interledger.js
Orderer
JSON
Which one of the following factor does not validate a block?
The period of collection of 30000 block is called ____________.
DAG stands for?
Both Ethereum and Bitcoin use __________to record transaction ledger.
A miner who finds a winning block is rewarded in the form of _________.
The global state of Ethereum block uses _________data structure.
The chances of winning a block is aratio of miners horse power to __________.
The EVM is capable of executing ____________.
Ethereum and bitcoin are based on ____ network.
In Ethereum an Uncle refers to ___________________.
An average time to mine a block in Ethereum is ?
Which one of the following statement is True about Ethereum?
Pricing based on computational complexity is called as __________ in Ethereum.
Which one of the following pair is an Ethereum unit.
Which one of the following is not a basic consensus algorithm.
Ethereum uses __________ protocol to reduce fork and award orphan blocks.
Ethereum's very first Genesis block was created in the year ?
Ethereum is crowd funded
Gas
Wei,Tether
Dapp
Ghost
2015
Merkle Patricia tree
Network difficulty
Smart contract
Self regulated
A non main block
15 seconds
Ether units
Epoch
Directed acyclic graph
Merkle tree
Ether units
Name the Currency that exist in a distributed decentralised network ?
Identify the main denomination used in Ethereum?
The number of Ether generally issued per block is ?
Identify the True statement from the following with respect to Ethereum.
The ability to perform any task given enough memory,processing power and instructions is
called ______________.
Ether acts like a __________for applications in decentralised network.
___________ refers to putting our own Ether to verify our transaction as validator.
A node in Ethereum refers to _____________.
A Wallet in blockchain parlance is ?
Computers that validate and handle blockchain transactions are called ______.
Another name given to a blockchain is ?
The Term Fork is used when _____________.
The purpose of nonce in Ethereum blockchain is ____________.
Miners are motivated to correct validation of transaction because of ?
What gives more power to EVM?
Proof of Stake refers to ?
If UTXO:Bitcoin then ?:Ethereum
Prevent double spend
Block reward
Gas
Consensus
Balance
Staking
Computer in a network
Place to store crptocurrency
Miner
Distributed ledger
Blockchain splits
Ether
Ether
Ethereum internal coding is
turing complete
Turing complete
Fuel
All blocks are connected to previous block with the help of _____________.
A smart contract refers to what?
Which one of the following is not a Consensus algorithm.
How many trees Ethereum maintains for its objects?
Cryptocurrency is secure because of ___________.
Identify the Tree not maintained by Ethereum blockchain.
What is present in the top most node of a Ethereum Merkle tree?
One of the shortcomings of Merkle tree is ?
In Ethereum balances of contract account is maintained in ______ tree.
Identify the type of fork that allow clients to double spend.
Which one of the following is not a type of fork in Ethereum?
Identify the fork that is Voluntary in Ethereum.
The study of rational intelligent decision making under conflict and co-operation is called ?
Another name for Crypto Ananlysis is _____________.
Identify the hash algorithm used in Ethereum protocol .
In Ethereum, if a transaction runs out of gas in the middle then the transaction will be
____________.
Which algorithm produces Strings or Numbers of fixed length?
Code breaking
SHA-256A
Rolled back
Prove state of network
State tree
State fork
Transaction
Protocol
Game theory
Computer Program
PoET
3
Cryptographic math
Smart tree
Root hash
Hashkey
What is the full form of ECDSA?
In a _______attack,the attacker floods the P2P network with a large number of
pseudonymous identities.
All smart phone and computer network when connected to network use hashing algorithm
that begins with ____________.
In Ethereum mining if the STARTGAS value is too high,then its is an indication of what ?
Identify the algorithm that produces string or number of fixed length.
ECDS Algorithm stands for?
.
Which one of the following decides the order of transaction in Ethereum?
Which one of the following statement is True about Ethereum.
In Cryptocurrency ,a high difficulty means?
A digital asset secured by Cryptography is called___________.
How much payment is made in ethers to miners that find Uncles?
The time required for information to travel from one node to another in a network is called
____________.
ASIC in blockchain technology stands for?
The most essential hardware of a mining rig is ______________.
A group of cryptocurrency miners who work together combining resources over network is
called ____________?
Identify the program or tool that serves as a node to Ethereum blockchain?
GPU
Mining pool
geth
Hashing provides fixed length
string
Additional computing power to
verify transaction
Cryptocurrency
1 upon 32
Latency
Application specific internal
circuit
SHA
Computations are too high
Hashing
Elliptic curve digital signature
Double spend
The order in which the majority
of nodes say True
Elliptic curve based encryption
algorithm
Sybil attack
Name the browser used to access various Ethereum dApp?
_________________ are digital applications or programs that exist and run on a blockchain
and are outside the purview and control of a single authority.
___________create an innovative open-source software ecosystem that is both secure and
resilient.
_______________ is the example of dApp.
To create dApp we setup and initialize the ___________ Library in a node.js a pplication.
To call the bitcoin libray we used ________ file as a entry file.
The key feature of Ethereum blockchain that allows developers to
create_____________________.
The main feature of _______________ is the ability to execute logic on the blockchain using
smart contracts
_____________ library wraps a lot of Ethereum JSON RPC APIs and provides easy to use
functions to create Ethereum DApps using JavaScript
What does the block in the blockchain doesn't consist of?
What is a genesis block?
________________ means that the nodes are not connected to each other.
The _____________ is a data structure that contains key value mapping addresses to account
objects.
Each account object contains _______ values
An _____________is a list of the contract’s function definition and arguments in JavaScript
Object Notation (JSON) format
When compiling a contract offline, e.g., using solc on the command line, you get the
_______________ .
________________ is Ethereum’s unit for measuring the computational and storage
resources required to perform actions on the Ethereum blockchain
deployment bytecode or the
runtime bytecode
Gas
AVL tree
The first block of a Blockchain
Empty array
State
Four
ABI
BitTorrent
bitcoinjs
index.js
decentralized applications
Ethereum
web3 JavaScript
Mist
Decentralized applications
dApps
___________________ provides the building blocks to create, compile, deploy, and test
blockchain applications.
_________________ tries to answer for both deployment options and whether you should be
considering a blockchain or not.
A blockchain is a type of?
Bitcoin module btc.js, we will initialize the bitcoinjs library using the ______________
keyword.
A Bitcoin transaction is mostly just a transfer of __________ from one address to another
To represent our contract we use ___________.
_______________is the runtime environment for smart contracts in Ethereum
___________ is an integer, just a counter equal to the number of transactions sent by the
sender account, i.e., transaction sequence number .
All data on a blockchain is cryptographically signed by _____________ of the users
To create a Bitcoin ______________using a node.js application we will need the keypairs for
the sender and the receivers.
_____________ API is a service that provides public-hosted Ethereum nodes so that
developers can easily test their Ethereum apps.
___________ is the IDE which provides a very simple interface to code and compile smart
contracts within your browser.
By default, the Remix editor targets a ________________ environment for smart contract
compilation
To execute a function of the smart contract, first we need to create _______________ class
with the ABI and address of our deployed contract.
In the blockchain process the application and the node both run on the __________ machine.
Which data structure is used to record the canonical order of transactions and then hashed
into a fingerprint?
What is UTXO? Unspent Transaction Output
Infura
Remix editor
JavaScript VM
a instance of the
web3.eth.Contract
local
Merkle trees
Bitcoins
web3.eth.Contract
EVM
Nonce
Private keys
Transaction
Truffle
Wüst–Gervais model
Database
require
To connect the nodes, we will send the ___________ on the geth console of the second node
with the node address of the first node as the parameter
What is a miner?
In __________________ Vitalik Buterin started sharing a whitepaper that outlined the idea
behind Ethereum: a Turing-complete, general-purpose blockchain.
______________is a decentralized content-addressable storage system that distributes stored
objects among peers in a P2P network.
All actions in the Ethereum network are triggered by transactions intiated
by__________________.
A ___________________is the functional programmatic unit in Ethereum that resides on the
blockchain.
The ___________________ which contains code in the case of contracts, but remains empty
for external accounts
Storage root, which is the root of the ________________ that contains code and data stored
on the blockchain
RLP is used only to ___________the structure of the data and is completely unaware of the
type of object being encoded.
Full form of BNA is ___________________________.
________________ is the hub wallet is a contract that receives payments from buyers and
facilitates the payout of tokens to miners for services.
________________ is a simple web app made with React.js used for hub-node registration
____________ is a mobile wallet and DApp browser, with support for a variety of tokens and
popular DApps. Available for iOS and Android.
The contract is converted to bytecode to be executed on the EVM, adhering to the compiler
specification is called as _______________________ .
Storage Root has ____________ root hash of Merkle tree that encodes the storage contents of
an account.
The last Byzantium update introduced the ___________ code like an exception handling.
The public node API endpoint to get and post transactions we use the ______________for
Bitcoin test network.
RegApp
Status
Compile Contract
256-bit
revert
Block Explorer API
Contract account
Codehash
Merkle-Patricia Tree
Encode
Business Network Archive
Hub wallet
admin.addPeer() command
Computers that validate and
process blockchain transactions
Dec-13
IPFS
External accounts
What is command to install the node module for bitcoinjs ?
We have to used the ____________function on the contract function to get the data payload
value for the transaction
While Bitcoin uses the UTXO model, Ethereum uses the _________________ model.
Which among the following is Ethereum's native browser?
______________ is the identifier of the network, which differentiates our private blockchain
with other Ethereum networks.
What are the maximum number of bitcoins that can be created?
________________ is the important parameter which represents the identifier of the
blockchain and helps prevent replay attacks.
______________ is the parameter which disabled the interprocess communication port for
geth so that while running multiple geth instances on the same local machine
_______________________ these three parameters define the configuration for the RPC API
exposed by geth.
___________________ these three parameters we are instructing geth to start node as a
miner node, limit the miner process threads to only one so that we do not consume a lot of
If we run the _______________ command on the geth console of the second node, we will
get an empty array as the result.
The full form of geth is _____________________ .
__________________ is a protocol which is written in Scala
Full form is IPFS _________________________________
Once you’ve configured the frontend, launch it with a web server on your local machine by
using the command ________________________.
Full for of EVM is ____________________________.
When you send a transaction to an ABI-compatible smart contract, the transaction first
interacts with that smart______________.
Mantis
Inter-Planetary File System
$ npm install and $ npm run dev
Ethereum Virtual Machine
contract’s dispatcher
chainId
ipcdisable
rpc, --rpcapi, --rpcport
mine – minerthreads – etherbase
admin.peers
Go-Ethereum
npm install --save bitcoinjs-lib
encodeABI
accounts and balances
Mist
networkid
21 million
The __________________ reads in the data field of the transaction and sends the relevant
part to the appropriate function
If there isn’t enough gas, execution is _________ and the transaction is reverted.
RLP stand for _________________________.
The mapping between all the Ethereum accounts, including EOAs and Contract Accounts
with their states, is collectively referred to as ______________.
____________ is the value that limits the maximum amount of gas the code execution can
consume when triggered by the message.
______________ is a set of accounts if any, that will be discarded after the transaction
completion
_____________ is used for composing transactions, querying the blockchain, converting
between data formats, performing remote calls, and similar everyday tasks.
___________ is another Java library for integrating with Ethereum and working with smart
contracts.
EtherJar
Halted
Recursive Length Prefix
Physical State
gasLimit
Self-destruct set
Seth
dispatcher
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf
Block chain MCQs1.pdf

More Related Content

Similar to Block chain MCQs1.pdf

Blockchain e mercato
Blockchain e mercatoBlockchain e mercato
Blockchain e mercatoCDagata
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceAlecHo7
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxAschalewAyele2
 
CASE STUDY ON EVOTING USING BLOCKCHAIN1.pptx
CASE STUDY ON  EVOTING USING BLOCKCHAIN1.pptxCASE STUDY ON  EVOTING USING BLOCKCHAIN1.pptx
CASE STUDY ON EVOTING USING BLOCKCHAIN1.pptxATHULPSUDHEER
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfVISHNURAJSSNSCEAD
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2editor1knowledgecuddle
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamentalCodium Club
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsGautam Anand
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platformif kakao
 
Cse white paper (2)
Cse white paper (2)Cse white paper (2)
Cse white paper (2)thanhcrypto
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Mukesh Chinta
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Adz91 Digital Ads Pvt Ltd
 
A survey on_po_w_based_consensus
A survey on_po_w_based_consensusA survey on_po_w_based_consensus
A survey on_po_w_based_consensusJorge Eterovic
 

Similar to Block chain MCQs1.pdf (20)

Blockchain e mercato
Blockchain e mercatoBlockchain e mercato
Blockchain e mercato
 
bitcoin_presentation
bitcoin_presentationbitcoin_presentation
bitcoin_presentation
 
Cryptography
CryptographyCryptography
Cryptography
 
SpaceChain - Blockchain in Space
SpaceChain - Blockchain in SpaceSpaceChain - Blockchain in Space
SpaceChain - Blockchain in Space
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
chapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptxchapter 4 Selected Topics in computer.pptx
chapter 4 Selected Topics in computer.pptx
 
CASE STUDY ON EVOTING USING BLOCKCHAIN1.pptx
CASE STUDY ON  EVOTING USING BLOCKCHAIN1.pptxCASE STUDY ON  EVOTING USING BLOCKCHAIN1.pptx
CASE STUDY ON EVOTING USING BLOCKCHAIN1.pptx
 
Blockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdfBlockchain_TezosDeveloperCommunitySNSCE.pdf
Blockchain_TezosDeveloperCommunitySNSCE.pdf
 
Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2Documenting Software Architectural Component and Connector with UML 2
Documenting Software Architectural Component and Connector with UML 2
 
Blockchain data structures and fundamental
Blockchain data structures and fundamentalBlockchain data structures and fundamental
Blockchain data structures and fundamental
 
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) AlgorithmsUnderstanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
Understanding Proof of Work (PoW) and Proof of Stake (PoS) Algorithms
 
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain PlatformKlaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
Klaytn: Service-Oriented Enterprise-Grade Public Blockchain Platform
 
Cse white paper (2)
Cse white paper (2)Cse white paper (2)
Cse white paper (2)
 
CSE30 White Paper
CSE30 White PaperCSE30 White Paper
CSE30 White Paper
 
Blockchain
BlockchainBlockchain
Blockchain
 
Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5Cisco cybersecurity essentials chapter -5
Cisco cybersecurity essentials chapter -5
 
BlockChain Public
BlockChain PublicBlockChain Public
BlockChain Public
 
Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage Key aggregate cryptosystem for scalable data sharing in cloud storage
Key aggregate cryptosystem for scalable data sharing in cloud storage
 
A survey on_po_w_based_consensus
A survey on_po_w_based_consensusA survey on_po_w_based_consensus
A survey on_po_w_based_consensus
 
7. 9589 1-pb
7. 9589 1-pb7. 9589 1-pb
7. 9589 1-pb
 

Recently uploaded

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka DoktorováCzechDreamin
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastUXDXConf
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfChristopherTHyatt
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyJohn Staveley
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoUXDXConf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101vincent683379
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKUXDXConf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsStefano
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomCzechDreamin
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераMark Opanasiuk
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekCzechDreamin
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCzechDreamin
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 

Recently uploaded (20)

10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Block chain MCQs1.pdf

  • 1. Question Answer1 Which was the first protocols which laid foundation of internet? Mediation of banks or other monetary institutions increase _____ and ____ to settle a transaction _________ developed the cryptocurrency Bitcoin. ________ is the component that completes the Internet puzzle and makes it more open, more accessible, and more reliable. Blockchain is a system of records to transact value in a _________ way. _________ and __________ are not two different entities in a blockchain setting. Blockchain is ___________ Ledger database of blockchain is __________ database A new entry on database gets reflected on __________ of the databases hosted on different nodes. Blockchain is a layer which is _______ of the Internet Blockchain is ___________ in nature. Every block in a blockchain is a collection of __________________ What is the name of the part that links back to he previous block in the chain? It is _________ to access all the previous blocks in a blockchain. The transaction data in the blocks is __________ Which perspective indicates the control that an individual, or a group of people, or an organization as a whole has on a system ? immutable Political all copies on top open-sourced Transactions Header Feasible TCP-IP cost,time Satoshi Nakamoto Blockchain Peer to peer Transaction and settlement decentralized append-only
  • 2. Centralization of power can lead to ____________ operations _____________ is difficult in most of the time in a centralized system. A typical centralized system structure is _______ to _________ node Decentralized systems are ___________ Layered approach in the TCP/IP stack is actually a standard to achieve an __________ system Which is the layer where you code up the desired functionalities ? The set of instructions that are executed in Execution layer are called ? Ethereum’s code or its smart contracts written in solidity gets compiled to __________ All the nodes in a blockchain network have to execute the programs/scripts ___________ In which layer, the rules of the system can be defined, such as data models and structures ? Which layer allows peer to peer communication by discovering nodes ? __________ consensus mechanism to select a node at random that can propose a block. Which is the base layer of blockchain? Which of the following is an account based blockchain implementation ? Blockchain is a combination of the concepts from cryptography, ____________, and computer science engineering. Transaction in blockchain are secured by _____________. _________ Generals’ Problem is an obvious and common problem that distributed systems deal with to remain fault tolerant Byzantine Propagation layer Proof of work Consesus layer Ethereum Game theory Cryptography Open Application smart contracts Bytecode independently Semantic layer Unethical Scalability one to many Symmetric
  • 3. The __________ field provides a radically different approach to determine how a system will behave. The sole purpose of game theory in blockchain is to ensure that the system is _______ The underlying crypto and game theoretic ___________ protocols could be different in different use cases. Data structures and peer-to-peer network communication technique are supported by ___________ field of blockchain. The purpose of cryptography is to make system _________. ____________ is the science of keeping things confidential. Which of the following is not a usage of crytography? Any information presented as a text message, numeric data, or a computer program can be called _______. The text which is encrypted is called __________. Who decrypts the data ? A type of cryptography where both sender and receiver uses same encryption keys is called? Symetric key cryptography is not used in which of the following protocols ? Kerckhoffs principle states that cryptosystem should be _________ even though a system is publicly accessible. What is the base of the encryption and decryption algorithm? Which of the follwing is not a property is XOR operation ? _____________ convert one symbol of plaintext into one symbol of ciphertext. For such a system to remain secure, the pseudorandom keystream generator has to be _____ and ________. TCP secured XOR operation Additive Stream ciphers secure,unpredictable cryptography efficiency plaintext ciphertext recipient Symetric encryption game theory stable consensus computer science secure
  • 4. Stream ciphers are an approximation of a proven perfect cipher called ___________. The Data Encryption Standard (DES) is a __________ cipher technique In symmetric cryptography, a large number of block ciphers use a design scheme known as a _______________ Data encryption standard uses 64 bit key out of which 8 bit is reserved for ____________ DES uses ______ rounds of Feistel network All of these consensus algorithms’ primary objective is Byzantine ______________. one thing that makes cryptocurrency systems stable is the “______” element. Fiat currencies are backed by ___________ what is the process of generating bitcoins called ? The Bitcoin Core client uses the ________ database of Google to store the blockchain datastructure internally The first block of a blockchain is called? Which hashing algorithm does bitcoin use? Size of the block header in a blockchain;s block is _________ bytes The ________ in the Merkle tree actually represent the hash of the transactions The nonce in the header starts from _______ _______ nodes can carry all permissible activity such as mining transactions and broadcasting transactions, Which nodes are also termed as "thin clients" ? 80 Leaf Nodes zero Full nodes Lightweight nodes trust gold mining LevelDB Genesis Block SHA-256 One time pad Symetric block Feistel cipher parity check 16 fault tolerance
  • 5. How does new node detect peering nodes ? How many public keys can one have ? ____________ refers to successfully creating a new block in the blockchain In Bitcoin, it is the distributed __________ consensus algorithm that helps mine new blocks by maintaining decentralization What are set of instructions recorded with each transaction that describes how the next person can gain access to those Bitcoins received and spend them called ? Scripting used by Bitcoins are ______ based ? Unlocking Script has _________ and __________ as its components Which output instructions does duplicate top item in stack ? The latest block defines the _______ of the blockchain Bitcoin uses _______ digital signature algorithm. The public keys are hashed twice to generate the Bitcoin adress, first with SHA256 and then with _________ BitcoinJ is a __________ to work with Bitcoin protocol What is full form of SPV ? Which Is the most famous Bitcoin software that full nodes use ? The merkleblock message size is in ______. A group of computers that communicate with each other without relying on central authority is refer as__ In Etherum _____ is used for security during transaction. Bitcoin core kilobyte Peer-to-peer network Hashing and Asymetric Cryptography OP_DUP height ECDSA RIPEMD160 Library Simple Payment Verification As many as one needs block mining Proof of work Scripts Stack Public key, Signature DNS seeds
  • 6. In Bitcoin___ is used to generate a unique fingerprint to confirm that data has not altered. In Bitcoin___ is refered as digital dollar. EVM stands for___. Machines on Etherum network join and do validating transaction, the process is known as___. ____ is a nick name for native Ethrum browser. ____ is true about smart contract. ____ law states that,"In economy bad money drives out good." Private chain has some bridge to the public chain in Etherum , it is refered as____ Etherum chains can do__ ____ is a currency to use in private transactions ledger on public chain. _____ is a lightweight operation performs basic functions. Accounts in Etherum are represented by____ In Etherum account address is____. ____ is not true about account in blockchain. In symmetric cryptograhy plain text is converted in to cipher text by applying small data string which is called as__ Encryption of message with sender's authenticity refered as__ ____ is not a tool to work with Etherum in Mist. key Secure and Signed Messaging MistMask All Of The Mentioned Subcurrency Wallet Hexadecimal value Public key does not contain state of the account Etherum Virtual Machine Mining Mist it is self executing Gresham's Permisioned blockchain Cryptographic Hashing Barbados
  • 7. In Etherum own tokens can be launched on___ ____ does not relate to asymetric cryptography Public blockchains are also refered as____ ___ programming language is used in Etherum. When a wallet application attempts to make any change , then__ In Etherum 'smart contract' is___ ____ powers the EVM. Symmetric key cryptography requires ____. ____ is a command line interface for Etherum. ____ is private Etherum development company. _____ functionality is not available in Etherum network. External account have___state. Contract account has ___ state _____ is/are features of Etherum network. ___ is not true about paper wallet. Jaxx is the popular ___ wallet. Blockchain networks like Etherum work without 'chargeback', it means__ Mobile Wallet once transaction written can not change Ethcore.io forgot password Balance state Both balance and contract state All Of The Mentioned it can work when user is online Solidicity All Of The Mentioned Business rules implied by the contract in blockchain Gas Secure channel go-etherum and cpp etherum Both public and private chain mining permissionless blockchain
  • 8. What is a gas? ____ shows historical record of all transactions. In blockchain context,____ compares large data sets quickly and evalute whether their contents are similar. DLT stands for___ Low blocktime helps for____. _____ may cause for wrong transaction. Every transaction requires___. EOA refers to___. _____ is not true about Contract account. Transaction contains__ Messages in blockchain contains__. In EVM gas fees for stop operation is___. In EVM gas fees for store operation is___. For queries account balance in EVM gas fees is___. In EVM for ___ operation no gas fees applies. In EVM___ opcode gives the address of currently executing account. In EVM _____ is not a environmental information op code. SHA3 All Of The Mentioned 0 100 20 suicide ADDRESS speedy transaction Short block Externally Owned Account controlled by humans All Of The Mentioned fee required to succesfully conduct a transaction Browser Explorer hash function Distributed Ledger Technology
  • 9. In EVM ____ is arithmatic opcde. ____ opcode in EVM gives block number. ___ opcode gives block's beneficiary address. To get the amount of available gas, including the corresponding reduction, ___ opcode is used in EVM. ____ is not a exachange operation in EVM opcode. ____ opcode in EVM halts the execution and register account for later deletion. ___ programming is used to write smart contarcts. ____ currencies are used to promote local economic development with in a small community and build social capital in that community. Solidicity prigramming language supports__. Process of validating transactions following a specific protocol is called as___. ___ tool helps to easily interact with the Etherum network in your browser. ___ is the file extension for solidicity. ___ is the advantage of public blockchain. A ____ instrument used to transfer value between two parties over a blockchain network. Task of miners in blockchain is____. ___ is not true about functions in solidicity. ____ gives hash of the given block. .sol open to everyone without permission. token Compete for a reward by trying to calculate the nonce. they are public by default. block.blockhash SUICIDE Solidicity complementry currency All Of The Mentioned Consensus MetaMask All Of The Mentioned NUMBER COINBASE GAS SWAP11
  • 10. To destroy current contract , sending funds to the given address. Etherum refers to____. Solidity is ___type of programming language. ___statement is true about Gas Fees. Smart contracts are written using the _________ programming language In software interface design, ________ is the general term for little buttons.sliders, dials, startups,hearts or any other thing you can click to make something happen DApps stands for An asset whose price goes down is called The popularity of a technology increases as more people us it.This is called the People invest in geographic areas where they or their families reside.This is called as Token in Ethereum is We can procure Faux ether using etherscan.io is Which command amongst this is used to specify the version of compiler in solidity? Gas amount is specified in Ethereum based custom tokens can be used on Token can be watched using Blockchain Explorer pragma solidity Wei Public and Private Chain etherscan.io Distributed Apps depreciating asset network effect home bias subcurrency Faucets selfdestruct<address recipients> All Of The Mentioned Object Oriented Gas measures how much efforts each transaction step incurs. Solidity Controls
  • 11. EVM stands for Ropsten, Rinkeby and Kovan are examples of? We need to enter ________ while watching a token msg.sender is an example of Receiver address can be printed as a machine readable code in a nested square pattern called Which amongst the following is Ethereum's native browser? Accounts in Ethereum are represented as Which amongst this is not a type of Ethereum address? The situation when the price drops before you get a chance to sell your currency is called Tokens are also called as Ropsten test network was formerly called as faucet.ropsten.be is used for Supply field in MyToken Contract represents Which amongst this is not a field in MyToken Contract? Name field in MyToken Contract represents Token can be watched using Which amongst this is a Token Standard? Address Token Name Token Address ETS IP Address Slippage Coins Morden procuring faux ether Number of tokens to be created TestNet Token Address Global Variable QR Code Mist Hexadecimal Numbers Ethereum Virtual Machine
  • 12. Decimal field in MyToken Contract represents Local currency is also called as What are contracts called in Hyperledger? Hyperledger is hosted by which Foundation? Hyperledger was launched in the year ___________ Hot swapping in hyperledger refers to How many frameworks does HyperLedger have? The Hyperledger fabric framework was contributed by Which amongst these frameworks is focused on mobile applications? Which amongst these frameworks is Ethereum VM built to specification? The Hyperledger Sawtooth framework was contributed by Which amongst these frameworks can be used for supply chain on a distributed ledger? Which amongst these tools is used for benchmarking? The certificate generation tool used by MSP is Which amongst these tools is used for creating and managing blockchains? Which amongst these tools is an Interledger Protocol? Chaincodes are written using the _________ programming language Cello Quilt GoLang Iroha Burrow Intel Grid Calipher cryptogen Chaincode Linux 2015 replacing the consensus while the network is running 6 IBM subunits of token Fiat
  • 13. Which amongst this is not an Hyperledger Fabric asset? MSP stands for Which amongst these tools is a shared cryptographic library? The hyperledger fabric network acts as ______ layer for client applications This peer approves or disapproves transaction in Hyperledger This peer receiver and send messages to other peers in Hyperledger Curl stands for Hyperledger can be installed on The default admin in Hyperledger Fabric is The command to shutdown a Hyperledger Fabric is Which amongst this is not a component of Hyperledger Composer? Which amongst this is an extension of the network model ? Which amongst this is a chaincode file? Which amongst this is not a component of a BNA? BNA is an archive made up of ____ files What is the command for creating an Admin card in Hyperledger? What is the command for removing a container in Docker? createPeerAdminCard.sh docker rm containerid stopFabric.sh Docker cto AdminCard.sh 4 Back End Endorser Peer Anchor Peer Client URL MacOS PeerAdmin Private Key Membership Service Provider URSA
  • 14. Which component is used to view,invoke,deploy and query blocks,transactions and data in Hyperledger? What is the javascript version of Interledger Protocol in HyperLedger called? The node which handles shared ledger of the network is called Network Connection Profile is stored as _______ File Which amongst these components is used to test the code without pushing it on the blockchain? Which amongst these files contains the right of participants? Which amongst these files defines queries that can run in a network? Online version of composer playground is ___________provides a wizard generator through command line Which amongst this is apple's IDE for software development? Which amongst this is a package manager? The name Vitalik Buterin can be assiciated with _____________. The process of arriving at a consensus about the legitimacy and order of transaction is called as _____________. The amount of computation a miner can apply to a network is called? Ethash is the name given to _________. What is the native token of Ethereum called as? Which one of the following value declares a block valid or canonical? Nonce npm Ethereum Mining Horse power Ethereum Structure Ether Hyperledger Composer Playground acl qry mybluemix.net Yeoman xcode Explorer Interledger.js Orderer JSON
  • 15. Which one of the following factor does not validate a block? The period of collection of 30000 block is called ____________. DAG stands for? Both Ethereum and Bitcoin use __________to record transaction ledger. A miner who finds a winning block is rewarded in the form of _________. The global state of Ethereum block uses _________data structure. The chances of winning a block is aratio of miners horse power to __________. The EVM is capable of executing ____________. Ethereum and bitcoin are based on ____ network. In Ethereum an Uncle refers to ___________________. An average time to mine a block in Ethereum is ? Which one of the following statement is True about Ethereum? Pricing based on computational complexity is called as __________ in Ethereum. Which one of the following pair is an Ethereum unit. Which one of the following is not a basic consensus algorithm. Ethereum uses __________ protocol to reduce fork and award orphan blocks. Ethereum's very first Genesis block was created in the year ? Ethereum is crowd funded Gas Wei,Tether Dapp Ghost 2015 Merkle Patricia tree Network difficulty Smart contract Self regulated A non main block 15 seconds Ether units Epoch Directed acyclic graph Merkle tree Ether units
  • 16. Name the Currency that exist in a distributed decentralised network ? Identify the main denomination used in Ethereum? The number of Ether generally issued per block is ? Identify the True statement from the following with respect to Ethereum. The ability to perform any task given enough memory,processing power and instructions is called ______________. Ether acts like a __________for applications in decentralised network. ___________ refers to putting our own Ether to verify our transaction as validator. A node in Ethereum refers to _____________. A Wallet in blockchain parlance is ? Computers that validate and handle blockchain transactions are called ______. Another name given to a blockchain is ? The Term Fork is used when _____________. The purpose of nonce in Ethereum blockchain is ____________. Miners are motivated to correct validation of transaction because of ? What gives more power to EVM? Proof of Stake refers to ? If UTXO:Bitcoin then ?:Ethereum Prevent double spend Block reward Gas Consensus Balance Staking Computer in a network Place to store crptocurrency Miner Distributed ledger Blockchain splits Ether Ether Ethereum internal coding is turing complete Turing complete Fuel
  • 17. All blocks are connected to previous block with the help of _____________. A smart contract refers to what? Which one of the following is not a Consensus algorithm. How many trees Ethereum maintains for its objects? Cryptocurrency is secure because of ___________. Identify the Tree not maintained by Ethereum blockchain. What is present in the top most node of a Ethereum Merkle tree? One of the shortcomings of Merkle tree is ? In Ethereum balances of contract account is maintained in ______ tree. Identify the type of fork that allow clients to double spend. Which one of the following is not a type of fork in Ethereum? Identify the fork that is Voluntary in Ethereum. The study of rational intelligent decision making under conflict and co-operation is called ? Another name for Crypto Ananlysis is _____________. Identify the hash algorithm used in Ethereum protocol . In Ethereum, if a transaction runs out of gas in the middle then the transaction will be ____________. Which algorithm produces Strings or Numbers of fixed length? Code breaking SHA-256A Rolled back Prove state of network State tree State fork Transaction Protocol Game theory Computer Program PoET 3 Cryptographic math Smart tree Root hash Hashkey
  • 18. What is the full form of ECDSA? In a _______attack,the attacker floods the P2P network with a large number of pseudonymous identities. All smart phone and computer network when connected to network use hashing algorithm that begins with ____________. In Ethereum mining if the STARTGAS value is too high,then its is an indication of what ? Identify the algorithm that produces string or number of fixed length. ECDS Algorithm stands for? . Which one of the following decides the order of transaction in Ethereum? Which one of the following statement is True about Ethereum. In Cryptocurrency ,a high difficulty means? A digital asset secured by Cryptography is called___________. How much payment is made in ethers to miners that find Uncles? The time required for information to travel from one node to another in a network is called ____________. ASIC in blockchain technology stands for? The most essential hardware of a mining rig is ______________. A group of cryptocurrency miners who work together combining resources over network is called ____________? Identify the program or tool that serves as a node to Ethereum blockchain? GPU Mining pool geth Hashing provides fixed length string Additional computing power to verify transaction Cryptocurrency 1 upon 32 Latency Application specific internal circuit SHA Computations are too high Hashing Elliptic curve digital signature Double spend The order in which the majority of nodes say True Elliptic curve based encryption algorithm Sybil attack
  • 19. Name the browser used to access various Ethereum dApp? _________________ are digital applications or programs that exist and run on a blockchain and are outside the purview and control of a single authority. ___________create an innovative open-source software ecosystem that is both secure and resilient. _______________ is the example of dApp. To create dApp we setup and initialize the ___________ Library in a node.js a pplication. To call the bitcoin libray we used ________ file as a entry file. The key feature of Ethereum blockchain that allows developers to create_____________________. The main feature of _______________ is the ability to execute logic on the blockchain using smart contracts _____________ library wraps a lot of Ethereum JSON RPC APIs and provides easy to use functions to create Ethereum DApps using JavaScript What does the block in the blockchain doesn't consist of? What is a genesis block? ________________ means that the nodes are not connected to each other. The _____________ is a data structure that contains key value mapping addresses to account objects. Each account object contains _______ values An _____________is a list of the contract’s function definition and arguments in JavaScript Object Notation (JSON) format When compiling a contract offline, e.g., using solc on the command line, you get the _______________ . ________________ is Ethereum’s unit for measuring the computational and storage resources required to perform actions on the Ethereum blockchain deployment bytecode or the runtime bytecode Gas AVL tree The first block of a Blockchain Empty array State Four ABI BitTorrent bitcoinjs index.js decentralized applications Ethereum web3 JavaScript Mist Decentralized applications dApps
  • 20. ___________________ provides the building blocks to create, compile, deploy, and test blockchain applications. _________________ tries to answer for both deployment options and whether you should be considering a blockchain or not. A blockchain is a type of? Bitcoin module btc.js, we will initialize the bitcoinjs library using the ______________ keyword. A Bitcoin transaction is mostly just a transfer of __________ from one address to another To represent our contract we use ___________. _______________is the runtime environment for smart contracts in Ethereum ___________ is an integer, just a counter equal to the number of transactions sent by the sender account, i.e., transaction sequence number . All data on a blockchain is cryptographically signed by _____________ of the users To create a Bitcoin ______________using a node.js application we will need the keypairs for the sender and the receivers. _____________ API is a service that provides public-hosted Ethereum nodes so that developers can easily test their Ethereum apps. ___________ is the IDE which provides a very simple interface to code and compile smart contracts within your browser. By default, the Remix editor targets a ________________ environment for smart contract compilation To execute a function of the smart contract, first we need to create _______________ class with the ABI and address of our deployed contract. In the blockchain process the application and the node both run on the __________ machine. Which data structure is used to record the canonical order of transactions and then hashed into a fingerprint? What is UTXO? Unspent Transaction Output Infura Remix editor JavaScript VM a instance of the web3.eth.Contract local Merkle trees Bitcoins web3.eth.Contract EVM Nonce Private keys Transaction Truffle Wüst–Gervais model Database require
  • 21. To connect the nodes, we will send the ___________ on the geth console of the second node with the node address of the first node as the parameter What is a miner? In __________________ Vitalik Buterin started sharing a whitepaper that outlined the idea behind Ethereum: a Turing-complete, general-purpose blockchain. ______________is a decentralized content-addressable storage system that distributes stored objects among peers in a P2P network. All actions in the Ethereum network are triggered by transactions intiated by__________________. A ___________________is the functional programmatic unit in Ethereum that resides on the blockchain. The ___________________ which contains code in the case of contracts, but remains empty for external accounts Storage root, which is the root of the ________________ that contains code and data stored on the blockchain RLP is used only to ___________the structure of the data and is completely unaware of the type of object being encoded. Full form of BNA is ___________________________. ________________ is the hub wallet is a contract that receives payments from buyers and facilitates the payout of tokens to miners for services. ________________ is a simple web app made with React.js used for hub-node registration ____________ is a mobile wallet and DApp browser, with support for a variety of tokens and popular DApps. Available for iOS and Android. The contract is converted to bytecode to be executed on the EVM, adhering to the compiler specification is called as _______________________ . Storage Root has ____________ root hash of Merkle tree that encodes the storage contents of an account. The last Byzantium update introduced the ___________ code like an exception handling. The public node API endpoint to get and post transactions we use the ______________for Bitcoin test network. RegApp Status Compile Contract 256-bit revert Block Explorer API Contract account Codehash Merkle-Patricia Tree Encode Business Network Archive Hub wallet admin.addPeer() command Computers that validate and process blockchain transactions Dec-13 IPFS External accounts
  • 22. What is command to install the node module for bitcoinjs ? We have to used the ____________function on the contract function to get the data payload value for the transaction While Bitcoin uses the UTXO model, Ethereum uses the _________________ model. Which among the following is Ethereum's native browser? ______________ is the identifier of the network, which differentiates our private blockchain with other Ethereum networks. What are the maximum number of bitcoins that can be created? ________________ is the important parameter which represents the identifier of the blockchain and helps prevent replay attacks. ______________ is the parameter which disabled the interprocess communication port for geth so that while running multiple geth instances on the same local machine _______________________ these three parameters define the configuration for the RPC API exposed by geth. ___________________ these three parameters we are instructing geth to start node as a miner node, limit the miner process threads to only one so that we do not consume a lot of If we run the _______________ command on the geth console of the second node, we will get an empty array as the result. The full form of geth is _____________________ . __________________ is a protocol which is written in Scala Full form is IPFS _________________________________ Once you’ve configured the frontend, launch it with a web server on your local machine by using the command ________________________. Full for of EVM is ____________________________. When you send a transaction to an ABI-compatible smart contract, the transaction first interacts with that smart______________. Mantis Inter-Planetary File System $ npm install and $ npm run dev Ethereum Virtual Machine contract’s dispatcher chainId ipcdisable rpc, --rpcapi, --rpcport mine – minerthreads – etherbase admin.peers Go-Ethereum npm install --save bitcoinjs-lib encodeABI accounts and balances Mist networkid 21 million
  • 23. The __________________ reads in the data field of the transaction and sends the relevant part to the appropriate function If there isn’t enough gas, execution is _________ and the transaction is reverted. RLP stand for _________________________. The mapping between all the Ethereum accounts, including EOAs and Contract Accounts with their states, is collectively referred to as ______________. ____________ is the value that limits the maximum amount of gas the code execution can consume when triggered by the message. ______________ is a set of accounts if any, that will be discarded after the transaction completion _____________ is used for composing transactions, querying the blockchain, converting between data formats, performing remote calls, and similar everyday tasks. ___________ is another Java library for integrating with Ethereum and working with smart contracts. EtherJar Halted Recursive Length Prefix Physical State gasLimit Self-destruct set Seth dispatcher