Blockchain level four knowledge test

Source: Internet
Author: User
Tags hash scrypt sha256 algorithm

One, single choice (5 points per topic, total 40 points)

1, encrypted digital currency if set too short confirmation time will be more likely to cause what appears.

A. High efficiency B. inefficiency c. solitary block D. Double Flower

2. If a Bitcoin transaction does not include mining costs, what will eventually happen.

A. Not confirmed B. Normal confirmation speed c.24 hours D. Uncertain time, but will eventually be confirmed

The difference between the 3.sha256 and the Scrypt two encryption algorithms is the correct way to say.

A.scrypt is a later SHA256 algorithm for exceeding Bitcoin, thus more efficient and more advanced

B.scrypt consumes more memory, takes longer to compute, and has high hardware requirements

C. Scrypt makes it easier for miners to mine and reduce energy consumption

D. Scrypt is a symmetric encryption algorithm

4. Which of the following statements is true about the X11 algorithm used by the world currency.

A. A specific hash encryption algorithm

B. Series algorithms for 11 encryption algorithms

C. Parallel algorithms for 11 encryption algorithms

D. This algorithm greatly improves the security of the digital currency system

5. Which of the following blockchain graphs is correct in which order?


A. A. B, A, C. A, B, D.

6. The following statement about the ether-tert-block rate is wrong.

A. The tertiary block cannot enter the main chain, so it is completely invalid.

B. The smaller blocks propagate faster and the tertiary blocks produce lower probabilities.

C. If the network generates higher tertiary-block probabilities, miners will need to reduce fuel limits.

D. tert-Blocks are now a unique concept of ethereum.

7. Five types of blockchain (bitcoin BTC1.0, Ibmhyperledger fabric, notary pass Factom, Rayleigh Ripple, bit BitShare1.0) are correctly compared to TPS in the same number of nodes.

A.ripple>bitshare>fabric>btc>factom

B.fabric>bitshare>ripple>factom>btc

C.fabric>bitshare>factom>ripple >BTC

D.fabric>ripple>bitshare>factom>btc

E.bitshare> fabric>ripple>btc> Factom

8. Which of the following is not part of the Blockchain privacy protection scheme.

A.sharding B. Ring Signature c. homomorphic encryption D. 0 knowledge proof

9. According to the Chinese calculation, which of the following calculation is the largest average in China.

A. Bitcoin

B. Ethereum

C.zcash

D. Dog coin

E. Future coins

10. In Ethereum, bits, Ripple, Openchain, Stellar, which is not the public chain shared by its own community, embodies the applicability of its technical system to the public-chain scenario?

A.ripple b.openchain C. Stellar D. Bitcoin unit E. Ethereum

Second, multi-choice (5 points per topic, total 50 points)

1. Which of the following statements is wrong?

A. Whether hashing is a larger or smaller input, the hash function should consume approximately the same amount of time.

B. For the POS proof blockchain, there is no mining process, so the efficiency is greatly improved.

C. Dpos is analogous to a board vote, which has the principle of allowing each person holding a bit share to vote, resulting in a 101-bit representation that can be interpreted as 101 super-nodes or pools, and the super-nodes ' rights are exactly equal.

D. The national secret SM2 algorithm is based on ECC elliptic curve algorithm.

2. What are the flags for Blockchain 2.0?

A. Virtual machine EVM B. Smart contract c. Smart Asset D. de-centralized autonomous organization E. Alliance chain

3. The following remarks about what points in Ethereum are wrong.

A.gas prices are actually determined by the miners.

When the B.eth is forked out, the old chain loses its value immediately.

C. Only when a transaction is issued by a foreign account does the contract account perform the corresponding operation and the contract account cannot be executed spontaneously.

D.go-ethereum, Cpp-ethereum, Pyethapp, Ruby-ethereum will produce different ethereum forks.

E. A transaction is performed over the EVM of all the nodes in the Ethereum.

4. What is true about smart contracts?

A. Based on block size limitations, the maximum code volume for an Ethereum smart contract is 1M.

B. Because the DAO incident has been preceded, it can be proved that the smart contract is unsafe.

C. Smart contracts are limited blockchain applications.

D. A smart contract is a code on a blockchain that is activated by trading on a blockchain.

E. Smart contracts that pay a certain amount of agricultural policy to the insured according to a month's rainfall the specific implementation process should be: The smart contract will wait until the scheduled time, obtain the weather report from the external service, and then take appropriate action according to the data obtained.

5. Which of the following blockchain is Turing-complete.

A.ibmhyperledger Fabric

B. Ethereum

C. Bitcoin

D. Rui Bo

E. Bit shares

6. The following blockchain is the use of side-chaining technology.

A.ibmhyperledger Fabric

B. Ethereum

C. Bitcoin

D.rootstock

E. Element chain

7. Which of the following blockchain open source code skeleton code is Java developed.

A.ibmhyperledger Fabric

B. Ethereum

C. Future Coins

D. Stellar coins

E. Dragon Chain

8. Which of the following does not belong to the hash function encryption algorithm.

A.md5 B. SCHNORR c.dagger D. SM4 E.ethash

9.51% What the attack can do.

A. Modify your own transactions, which allows him to make double payments

B. Changing the number of Bitcoins generated per chunk

C. Generate Bitcoins from thin air

D. Send Bitcoin to himself or others that does not belong to him

E. Block confirmation of some or all transactions

10. Which of the following is an encrypted digital currency?

A. NET gold B. Baidu c.q coin D. Dog coin E. Pips

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.