GET 70% Discount on All Products Coupon code: "Board70"
A Smart Contract is most like which classical programming object?
Class
Variable
Method
Function
In the Ethereum EVM there are two types of memory areas. (Select two.)
Storage
Database
Memory
Persistent
Ephemeral
Which of the following blockchain key components state how the transactions will be confirmed?
Distributed Ledger database
Validity Rules
Consensus Algorithm
Encryption
Validity rules (validation) state how the user and the transactions will be validated. This is predetermined by the consensus algorithm.
What are some likely repercussions that could occur as a result of a 51% attack to the Bitcoin network? (Select three.)
Unplanned Fork
Double Spending
Cancelling Transactions
Planned Fork
Selfless Mining
The 4 main attacks that can happen directly as a result of the 51% attack are: Selfish mining. Cancelling transactions. Double Spending. Random forks.
TESTED 22 Feb 2025