ExamGecko

Blockchain CBDE Practice Test - Questions Answers, Page 2

Question list
Search
Search

Question 11

Report
Export
Collapse

What's the correct scientific notation?

A.
1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
A.
1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
Answers
B.
1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
B.
1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
Answers
C.
1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
C.
1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
Answers
D.
1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
D.
1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
Answers
Suggested answer: A
asked 16/09/2024
Peter Klaffehn
45 questions

Question 12

Report
Export
Collapse

What are Private Keys used for?

A.
To Protect the Public Keys by being cryptographically significant.
A.
To Protect the Public Keys by being cryptographically significant.
Answers
B.
To Sign Transactions And To Derive an Address From.
B.
To Sign Transactions And To Derive an Address From.
Answers
C.
To Generate An Address which can sign transactions.
C.
To Generate An Address which can sign transactions.
Answers
Suggested answer: B
asked 16/09/2024
MD NAZRI BEZAMAN
30 questions

Question 13

Report
Export
Collapse

Public Keys vs. Private Keys. Which statement is true?

A.
The Public Key is for Signing Transactions, the Private Key must be given out to verify the signature.
A.
The Public Key is for Signing Transactions, the Private Key must be given out to verify the signature.
Answers
B.
The Private Key signs transactions, the Public Key can verify the signature.
B.
The Private Key signs transactions, the Public Key can verify the signature.
Answers
C.
The Private Key is to generate a Public Key. The Public Key can sign transactions, the address is here to verify the transactions.
C.
The Private Key is to generate a Public Key. The Public Key can sign transactions, the address is here to verify the transactions.
Answers
Suggested answer: B
asked 16/09/2024
Chun Yin Lau
44 questions

Question 14

Report
Export
Collapse

Proof of Work (PoW) vs. Proof of Stake.

A.
PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
A.
PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
Answers
B.
PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
B.
PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
Answers
C.
PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
C.
PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
Answers
Suggested answer: A
asked 16/09/2024
Carlos Cabezas
49 questions

Question 15

Report
Export
Collapse

Externally Owned Accounts:

A.
can be destroyed using the selfdestruct keyword. This way all remaining ether will be sent to the receiver address, regardless if they have a fallback function or not.
A.
can be destroyed using the selfdestruct keyword. This way all remaining ether will be sent to the receiver address, regardless if they have a fallback function or not.
Answers
B.
are bound to a private key which is necessary to sign transactions outgoing from that account.
B.
are bound to a private key which is necessary to sign transactions outgoing from that account.
Answers
C.
are logical opcodes running on the ethereum blockchain very similar to smart contracts.
C.
are logical opcodes running on the ethereum blockchain very similar to smart contracts.
Answers
Suggested answer: B
asked 16/09/2024
Camilo Garrido Lizana
31 questions

Question 16

Report
Export
Collapse

Smart Contracts:

A.
are always living on the same address, because the blockchain is deterministic. So, one account can always have one smart contract.
A.
are always living on the same address, because the blockchain is deterministic. So, one account can always have one smart contract.
Answers
B.
are having the same address as the EOA.
B.
are having the same address as the EOA.
Answers
C.
are sitting on their own address. The Address is created from the nonce and the EOA address and could be known in advance before deploying the smart contract.
C.
are sitting on their own address. The Address is created from the nonce and the EOA address and could be known in advance before deploying the smart contract.
Answers
D.
the address of the smart contract is a random address which gets generated by the miner who mines the contract-creation transaction.
D.
the address of the smart contract is a random address which gets generated by the miner who mines the contract-creation transaction.
Answers
Suggested answer: C
asked 16/09/2024
Ernesto Barba
39 questions

Question 17

Report
Export
Collapse

Transactions containing the same data to create the same smart contract are:

A.
always having the same signature.
A.
always having the same signature.
Answers
B.
having a different signature because of the nonce which changes upon every transaction.
B.
having a different signature because of the nonce which changes upon every transaction.
Answers
Suggested answer: B
asked 16/09/2024
Tim Baas
31 questions

Question 18

Report
Export
Collapse

Sending one Ether is actually internally translated:

A.
to Wei, so it will send the equivalent of 10^18 Wei.
A.
to Wei, so it will send the equivalent of 10^18 Wei.
Answers
B.
to Finney, so it will send the equivalent of 10^3 Finney.
B.
to Finney, so it will send the equivalent of 10^3 Finney.
Answers
C.
to Szabo, so it will send the equivalent of 10^6 Szabo.
C.
to Szabo, so it will send the equivalent of 10^6 Szabo.
Answers
Suggested answer: A
asked 16/09/2024
Ghazi Khan
24 questions

Question 19

Report
Export
Collapse

Hashing Mining uses:

A.
Keccack256 while internally to hash values it's easy to use the Dagger-Hashimoto to create a meaningful hash.
A.
Keccack256 while internally to hash values it's easy to use the Dagger-Hashimoto to create a meaningful hash.
Answers
B.
the Dagger-Hashimoto hashing while internally the EVM uses SHA256 which is an alias for Keccack256.
B.
the Dagger-Hashimoto hashing while internally the EVM uses SHA256 which is an alias for Keccack256.
Answers
C.
the Dagger-Hashimoto hashing while internally the EVM uses Keccack256 which is almost similar to SHA256, but has a different padding so produces different hashes.
C.
the Dagger-Hashimoto hashing while internally the EVM uses Keccack256 which is almost similar to SHA256, but has a different padding so produces different hashes.
Answers
Suggested answer: C
asked 16/09/2024
miquel martin leiva
32 questions

Question 20

Report
Export
Collapse

PoS:

A.
would be better, because it can reduce the amount of energy needed for mining.
A.
would be better, because it can reduce the amount of energy needed for mining.
Answers
B.
would be worse, because it would increase the amount of energy needed for mining.
B.
would be worse, because it would increase the amount of energy needed for mining.
Answers
Suggested answer: A
asked 16/09/2024
Rehan r
38 questions
Total 102 questions
Go to page: of 11