ExamGecko
Home Home / Blockchain / CBDE

Blockchain CBDE Practice Test - Questions Answers

Question list
Search
Search

Consensus is reached:

A.
by the miner nodes which make sure that a transaction is valid.
A.
by the miner nodes which make sure that a transaction is valid.
Answers
B.
by every single node in the blockchain network executing the same transaction.
B.
by every single node in the blockchain network executing the same transaction.
Answers
C.
by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
C.
by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
Answers
Suggested answer: B

Smart Contracts can be written in:

A.
Java, C++, Solidity and JavaScript, because the Ethereum Blockchain is completely language agnostic and cross compilers exist for every major language.
A.
Java, C++, Solidity and JavaScript, because the Ethereum Blockchain is completely language agnostic and cross compilers exist for every major language.
Answers
B.
Solidity, Viper, LLL and Serpent, because those are high level languages that are compiled down to bytecode.
B.
Solidity, Viper, LLL and Serpent, because those are high level languages that are compiled down to bytecode.
Answers
C.
Solidity and JavaScript, because those are the official first implementations for Distributed applications and the Blockchain supports those languages fully.
C.
Solidity and JavaScript, because those are the official first implementations for Distributed applications and the Blockchain supports those languages fully.
Answers
Suggested answer: B

Solidity gets compiled:

A.
to bytecode that can't be understood by humans.
A.
to bytecode that can't be understood by humans.
Answers
B.
to bytecodes which are essentially opcodes running instruction by instruction.
B.
to bytecodes which are essentially opcodes running instruction by instruction.
Answers
Suggested answer: B

Having a bug-bounty program early on:

A.
can help to engage the community in testing your smart contracts and therefore help to find bugs early.
A.
can help to engage the community in testing your smart contracts and therefore help to find bugs early.
Answers
B.
might be a burden as it is an administrative overhead mainly.
B.
might be a burden as it is an administrative overhead mainly.
Answers
C.
is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
C.
is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
Answers
Suggested answer: A


Which is the right order for Denominations?

A.
Wei, Finney, Szabo, Ether, Tether.
A.
Wei, Finney, Szabo, Ether, Tether.
Answers
B.
Finney, Szabo, Mether, Gwei.
B.
Finney, Szabo, Mether, Gwei.
Answers
C.
Gwei, Szabo, Finney, Ether.
C.
Gwei, Szabo, Finney, Ether.
Answers
Suggested answer: C

The nonce-field in a transaction is used:

A.
to protect against replay attacks.
A.
to protect against replay attacks.
Answers
B.
to have an additional checksum for transactions.
B.
to have an additional checksum for transactions.
Answers
C.
to sum up all ethers sent from that address.
C.
to sum up all ethers sent from that address.
Answers
Suggested answer: A

Which statement is true about the EVM?

A.
While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
A.
While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
Answers
B.
The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
B.
The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
Answers
C.
The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
C.
The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
Answers
Suggested answer: C

DApps are:

A.
great, because they cut the middle man, run on a trusted platform, apply logic to the blockchain where already economic assets are running and thus allow peer to peer trade.
A.
great, because they cut the middle man, run on a trusted platform, apply logic to the blockchain where already economic assets are running and thus allow peer to peer trade.
Answers
B.
an amazing way to create new applications. Those applications run entirely separated from other applications on the platform and allow for logical interactions. They can't access any funds to add an additional layer of trust.
B.
an amazing way to create new applications. Those applications run entirely separated from other applications on the platform and allow for logical interactions. They can't access any funds to add an additional layer of trust.
Answers
C.
a new way of applying logical operations for banks and big financial institutions. This way they can reduce the staff while operating at increased security.
C.
a new way of applying logical operations for banks and big financial institutions. This way they can reduce the staff while operating at increased security.
Answers
Suggested answer: B

To get most out of the blockchain, it is best:

A.
to use it for the whole business logic. It’s always best to have everything in once place.
A.
to use it for the whole business logic. It’s always best to have everything in once place.
Answers
B.
to use it only for things which need the benefits of the blockchain.
B.
to use it only for things which need the benefits of the blockchain.
Answers
Suggested answer: B

A Hashing Algorithm is deterministic. What does it mean?

A.
it always produces the same output given the same input.
A.
it always produces the same output given the same input.
Answers
B.
it uses equally distributed data to produce the output given a long input.
B.
it uses equally distributed data to produce the output given a long input.
Answers
C.
it shouldn't be possible to re-generate the input given the output.
C.
it shouldn't be possible to re-generate the input given the output.
Answers
Suggested answer: A
Total 102 questions
Go to page: of 11