Question

1. A node is a.An exchange b. A computer on a blockchain network c. A blockchain...

1. A node is

a.An exchange

b. A computer on a blockchain network

c. A blockchain

d..A type of cryptocurrency

2. A miner is

a. Computers that validate and process blockchain transactions

b. A type of blockchain

c. A person doing calculations to verity a transaction

d. An algorithm that predicts the next part of the chain

3. A blockchain is

a. A centralized ledger

b. A distributed ledger on a peer to peer network

c. An exchange

d. A type of cryptocurrency

4. Data is permanently recorded on the Bitcoin network through files called

a. Safety file

b. Blocks

c. Node

d. Nounce

5. What is the first block in a blockchain called?

a. Initial block

b. Genesis block

c. First block

d. Alpha block

6. Which of the following is not a cloud computing offering?

a. IaaS

b. SaaS

c. PaaS

d. IcaS

7. Which of the following is not a(n) consensus mechanism

a. Multi-signature

b. Node compliance

c. Practical Byzantine Fault Tolerance

d. Proof of stake

8. The shared ledger has the following characteristics, except for the following

a. Is shared among all participants in the network; through replication, each participant has a duplicate copy of the ledger.

b. Records all transactions across the business network; the shared ledger is the system of record, the single source of truth.

c. Is permission, so participants see only those transactions they’re authorized to view. Participants have identities that link them to transactions, but they can choose the transaction information that other participants are authorized to view

d. Transactions are added to the blockchain after permission is obtained by the primary node

9. Blockchain builds trust through all of the following attributes except for

a. Group of answer choices

b. Being transparent and auditable

c. Being orchestrated and flexible

d. Being consensus-based and transactional

10. Which of the following is true?

a. Group of answer choices

b. Libra currency will be more stable than bitcoin

c. All of the answers are true

d. Libra currency is backed by real assets

11. Which account would be best suited to AI?

a..Taxes

b. Cash

c. Long-term liabilities

d. Retained earnings

12. What is a 51% attack?

a. A second blockchain used by developers for testing new versions of client software without putting a real value at risk

b. There is no such thing

c. A condition in which more than half the computing power of a cryptocurrency network is controlled by a single malicious miner or group of miners

d. An attack on a website where large numbers of request are made with the goal of shutting down the website

Homework Answers

Answer #1

1. A node is a computer on a blockchain network.

Reason- Nodes are the points where the information or messages are created, transmitted and received, that is done through a computer.

2. A miner is computers that validate and process blockchain transactions.

Reason- Bitcoins can be mined by specialized hardware (computer) and software programs. Computers provide a way to process the Bitcoins transactions.

3. A blockchain is a distributed ledger on a peer to peer network.

Reason- Blockchain is a type of protocol that run all the protocols and hold an identical copy of ledger of transactions, enabling P2P value transactions.

4. Data is permanently recorded on the bitcoin network through files called blocks.

Reason- A block records all of the Bitcoin transactions. It acts as a page of a ledger or record book.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
What is a 51% attack? a) A condition in which more than half the computing power...
What is a 51% attack? a) A condition in which more than half the computing power of a cryptocurrency network is controlled by a single malicious miner or group of miners b) A second blockchain used by developers for testing new versions of client software without putting a real value at risk c) An attack on a website where large numbers of request are made with the goal of shutting down the website d) There is no such thing
Classify each of the following as an example of (a) naturalistic observation, (b) laboratory observation, (c)...
Classify each of the following as an example of (a) naturalistic observation, (b) laboratory observation, (c) case study, (d) survey, or (e) correlation. a. A professor compared his students' attendance rates to their grades. She found that students with fewer absences tended to get     higher grades. b. Psychologists studying aggression in early childhood found that an average of four instances of hitting or pushing occurred     during each hour that they spent watching a group of two-year-olds interact in...
I just need the following questions answers Quantitative Research Designs 101 1. Quantitative research attempts to...
I just need the following questions answers Quantitative Research Designs 101 1. Quantitative research attempts to do which of the following? a. Identify, define and measure factors that contribute to a disorder or disease. b. Examine relationships among factors. c. Evaluate the cost-effectiveness of an intervention. d. All of the above 2. Qualitative and quantitative research designs are appropriate to answer different types of public health questions. Which of the following is NOT an objective of qualitative research? a. To...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT