Block chain level four knowledge test

Source: Internet
Author: User
Tags scrypt sha256 algorithm

Block chain knowledge level Four examination, examination time 30 minutes, total score 100 points, please seriously answer, the topic person and Proctor Teacher: Gao Zhihao, please reprint note, thank you for your support.

One, single topic (5 points per question, total 40 points)

1, encrypt the digital currency if you set too short a confirmation time will be more likely to cause what appears.

A. High efficiency B. inefficient C. Solitary block D. Double Flower

2. If a bit-currency transaction does not include the cost of digging, what will eventually happen.

A. Not confirmed B. Normal confirmation speed c.24 hours D. Uncertain time, but will eventually be confirmed.

The difference between the 3.sha256 and scrypt two encryption algorithms the correct argument is.

A.scrypt is a SHA256 algorithm for overtaking bitcoin, so it's more efficient and more advanced.

B.scrypt consumes more memory, takes longer to compute, and requires a high amount of hardware

C. Scrypt makes it easier for miners to dig mines and reduce energy consumption

D. Scrypt is a symmetric encryption algorithm

4. Regarding the X11 algorithm used by the world currency, which of the following is true.

A. A specific hash encryption algorithm

B. The series algorithm of 11 kinds of encryption algorithms

C. The parallel algorithm of 11 encryption algorithms

D. This algorithm greatly improves the security of the digital money system

5. Which of the following blocks is the correct sequence in the chain diagram?


A. b c. C. propyl ethyl D. propyl b

6. The following statement about the rate of the ether square is wrong.

A. The tertiary block cannot enter the main chain, so it is completely invalid.

B. Smaller blocks spread faster, and tertiary-block yields are less likely.

C. If the probability of a network-generated tertiary block increases, miners will need to reduce the fuel limit.

D. tert-Block is now a unique concept of the ether square.

7. Five kinds of block chains (bitcoin BTC1.0, Ibmhyperledger fabric, notary Factom, Rayleigh wave ripple, bit-share BitShare1.0) Compare the TPS in the same number of nodes correctly.

A.ripple>bitshare>fabric>btc>factom

B.fabric>bitshare>ripple>factom>btc

C.fabric>bitshare>factom>ripple >BTC

D.fabric>ripple>bitshare>factom>btc

E.bitshare> fabric>ripple>btc> Factom

8. Which of the following do not belong to the block chain of privacy protection scheme.

A.sharding B. Ring signature C. Homomorphic encryption D. 0 Proof of knowledge

9. According to China's strength, which of the following is the largest average in China.

A. Bitcoin

B. The ether Workshop

C.zcash

D. Dog currency

E. Future currency

10. In the ether square, bit stock, ripple, openchain, stellar, which one is not through their own community sharing shared public chain to reflect the applicability of its technical system to the public chain scene?

A.ripple b.openchain C. Stellar D. E. Ether Square

Second, multiple-choice (5 points per question, total 50 points)

1. Which of the following statements is false?

A. The hash function should consume approximately the same amount of time, whether it is a large or a small input.

B. For the Pos-equity proof block chain, there has been no digging process, so the efficiency is greatly improved.

C. Dpos is similar to a board vote, which is based on the idea of having every person holding a bit share vote, resulting in 101 representatives who can interpret it as 101 super nodes or pools, and that the super nodes have equal rights to each other.

D. The national secret SM2 algorithm is based on ECC elliptic curve algorithm

2. What is the mark of the Block chain 2.0?

A. Virtual machine EVM B. Smart Contracts C. Smart assets D. To the Central autonomous organization E. Alliance Chain

3. The following remarks about the points in the ether are wrong.

A.gas prices are actually decided by the miners.

The old chain will lose its value immediately after the B.eth is forked out.

C. The contract account will perform the corresponding operation only when a foreign account issues a transaction, and the contract account cannot be executed spontaneously.

D.go-ethereum, Cpp-ethereum, Pyethapp, Ruby-ethereum will produce different etheric square bifurcation.

E. A transaction is to be performed on the EVM of all nodes in the etheric square.

4. What is true about the idea of a smart contract?

A. Based on block size limits, the code for the Ethernet intelligent contract is 1M.

B. Because the DAO event was previously shown, it is possible to prove that the smart contract is unsafe.

C. Smart contracts are restricted block-chain applications.

D. An intelligent contract is a code on a block chain that is activated by a transaction on a block chain.

E. An intelligent contract for an agricultural policy that pays a certain amount to an insured person in accordance with one month's rainfall should be implemented in such a way that an intelligent contract will wait until the scheduled time, obtain weather reports from outside services, and then take appropriate action according to the data obtained.

5. Which of the following block chains are Turing complete.

A.ibmhyperledger Fabric

B. The ether Workshop

C. Bitcoin

D. Rayleigh wave

E. Bit stocks

6. Which of the following block chains have the use of side-chain technology.

A.ibmhyperledger Fabric

B. The ether Workshop

C. Bitcoin

D.rootstock

E. Element chain

7. Which of the following block chain open source code skeleton code is Java development.

A.ibmhyperledger Fabric

B. The ether Workshop

C. Future currency

D. Star Currency

E. Dragon chain

8. Which of the following does not belong to the hash function encryption algorithm.

A.md5 B. SCHNORR c.dagger D. SM4 E.ethash

9. What 51% attacks can do.

A. Modify your own transaction record, which allows him to double pay

B. Change the number of Bitcoin generated per block

C. Generating Bitcoin in thin air

D. Send your own bitcoin to yourself or others

E. Block confirmation of partial or total transactions

10. Which of the following belong to the encrypted digital currency.

A. Network gold B. Baidu currency c.q currency D. Dog currency E. Dot Currency

Author: Gao Zhihao (Weibo.com/elwingao)

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.