Download Blockchain.CBDE.BrainDumps.2019-10-29.61q.vcex

Download Exam

File Info

Exam BTA Certified Blockchain Developer - Ethereum
Number CBDE
File Name Blockchain.CBDE.BrainDumps.2019-10-29.61q.vcex
Size 31 KB
Posted Oct 29, 2019
Download Blockchain.CBDE.BrainDumps.2019-10-29.61q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Consensus is reached:


  1. by the miner nodes which make sure that a transaction is valid.
  2. by every single node in the blockchain network executing the same transaction.
  3. by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
Correct answer: B



Question 2

Having a bug-bounty program early on:


  1. can help to engage the community in testing your smart contracts and therefore help to find bugs early.
  2. might be a burden as it is an administrative overhead mainly.
  3. is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
Correct answer: A



Question 3

Which is the right order for Denominations?


  1. Wei, Finney, Szabo, Ether, Tether.
  2. Finney, Szabo, Mether, Gwei.
  3. Gwei, Szabo, Finney, Ether.
Correct answer: C



Question 4

Which statement is true about the EVM?


  1. While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
  2. The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
  3. The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
Correct answer: C



Question 5

To get most out of the blockchain, it is best:


  1. to use it for the whole business logic. It’s always best to have everything in once place.
  2. to use it only for things which need the benefits of the blockchain.
Correct answer: B



Question 6

A Hashing Algorithm is deterministic. What does it mean?


  1. it always produces the same output given the same input.
  2. it uses equally distributed data to produce the output given a long input.
  3. it shouldn't be possible to re-generate the input given the output.
Correct answer: A



Question 7

What's the correct scientific notation?


  1. 1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
  2. 1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
  3. 1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
  4. 1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
Correct answer: A



Question 8

What are Private Keys used for?


  1. To Protect the Public Keys by being cryptographically significant.
  2. To Sign Transactions And To Derive an Address From.
  3. To Generate An Address which can sign transactions.
Correct answer: B



Question 9

Proof of Work (PoW) vs. Proof of Stake.


  1. PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
  2. PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
  3. PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
Correct answer: A



Question 10

Transactions containing the same data to create the same smart contract are:


  1. always having the same signature.
  2. having a different signature because of the nonce which changes upon every transaction.
Correct answer: B



Question 11

Consensus is reached:


  1. by the miner nodes which make sure that a transaction is valid.
  2. by every single node in the blockchain network executing the same transaction.
  3. by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
Correct answer: B



Question 12

Having a bug-bounty program early on:


  1. can help to engage the community in testing your smart contracts and therefore help to find bugs early.
  2. might be a burden as it is an administrative overhead mainly.
  3. is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
Correct answer: A



Question 13

Which is the right order for Denominations?


  1. Wei, Finney, Szabo, Ether, Tether.
  2. Finney, Szabo, Mether, Gwei.
  3. Gwei, Szabo, Finney, Ether.
Correct answer: C



Question 14

Which statement is true about the EVM?


  1. While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
  2. The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
  3. The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
Correct answer: C



Question 15

To get most out of the blockchain, it is best:


  1. to use it for the whole business logic. It’s always best to have everything in once place.
  2. to use it only for things which need the benefits of the blockchain.
Correct answer: B



Question 16

A Hashing Algorithm is deterministic. What does it mean?


  1. it always produces the same output given the same input.
  2. it uses equally distributed data to produce the output given a long input.
  3. it shouldn't be possible to re-generate the input given the output.
Correct answer: A



Question 17

What's the correct scientific notation?


  1. 1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
  2. 1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
  3. 1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
  4. 1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
Correct answer: A



Question 18

What are Private Keys used for?


  1. To Protect the Public Keys by being cryptographically significant.
  2. To Sign Transactions And To Derive an Address From.
  3. To Generate An Address which can sign transactions.
Correct answer: B



Question 19

Proof of Work (PoW) vs. Proof of Stake.


  1. PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
  2. PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
  3. PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
Correct answer: A



Question 20

Transactions containing the same data to create the same smart contract are:


  1. always having the same signature.
  2. having a different signature because of the nonce which changes upon every transaction.
Correct answer: B



Question 21

Consensus is reached:


  1. by the miner nodes which make sure that a transaction is valid.
  2. by every single node in the blockchain network executing the same transaction.
  3. by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
Correct answer: B



Question 22

Having a bug-bounty program early on:


  1. can help to engage the community in testing your smart contracts and therefore help to find bugs early.
  2. might be a burden as it is an administrative overhead mainly.
  3. is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
Correct answer: A



Question 23

Which is the right order for Denominations?


  1. Wei, Finney, Szabo, Ether, Tether.
  2. Finney, Szabo, Mether, Gwei.
  3. Gwei, Szabo, Finney, Ether.
Correct answer: C



Question 24

Which statement is true about the EVM?


  1. While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
  2. The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
  3. The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
Correct answer: C



Question 25

To get most out of the blockchain, it is best:


  1. to use it for the whole business logic. It’s always best to have everything in once place.
  2. to use it only for things which need the benefits of the blockchain.
Correct answer: B



Question 26

A Hashing Algorithm is deterministic. What does it mean?


  1. it always produces the same output given the same input.
  2. it uses equally distributed data to produce the output given a long input.
  3. it shouldn't be possible to re-generate the input given the output.
Correct answer: A



Question 27

What's the correct scientific notation?


  1. 1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
  2. 1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
  3. 1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
  4. 1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
Correct answer: A



Question 28

What are Private Keys used for?


  1. To Protect the Public Keys by being cryptographically significant.
  2. To Sign Transactions And To Derive an Address From.
  3. To Generate An Address which can sign transactions.
Correct answer: B



Question 29

Proof of Work (PoW) vs. Proof of Stake.


  1. PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
  2. PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
  3. PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
Correct answer: A



Question 30

Transactions containing the same data to create the same smart contract are:


  1. always having the same signature.
  2. having a different signature because of the nonce which changes upon every transaction.
Correct answer: B



Question 31

Consensus is reached:


  1. by the miner nodes which make sure that a transaction is valid.
  2. by every single node in the blockchain network executing the same transaction.
  3. by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.
Correct answer: B



Question 32

Having a bug-bounty program early on:


  1. can help to engage the community in testing your smart contracts and therefore help to find bugs early.
  2. might be a burden as it is an administrative overhead mainly.
  3. is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.
Correct answer: A



Question 33

Which is the right order for Denominations?


  1. Wei, Finney, Szabo, Ether, Tether.
  2. Finney, Szabo, Mether, Gwei.
  3. Gwei, Szabo, Finney, Ether.
Correct answer: C



Question 34

Which statement is true about the EVM?


  1. While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.
  2. The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.
  3. The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.
Correct answer: C



Question 35

To get most out of the blockchain, it is best:


  1. to use it for the whole business logic. It’s always best to have everything in once place.
  2. to use it only for things which need the benefits of the blockchain.
Correct answer: B



Question 36

A Hashing Algorithm is deterministic. What does it mean?


  1. it always produces the same output given the same input.
  2. it uses equally distributed data to produce the output given a long input.
  3. it shouldn't be possible to re-generate the input given the output.
Correct answer: A



Question 37

What's the correct scientific notation?


  1. 1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney
  2. 1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney
  3. 1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney
  4. 1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney
Correct answer: A



Question 38

What are Private Keys used for?


  1. To Protect the Public Keys by being cryptographically significant.
  2. To Sign Transactions And To Derive an Address From.
  3. To Generate An Address which can sign transactions.
Correct answer: B



Question 39

Proof of Work (PoW) vs. Proof of Stake.


  1. PoW is computationally intensive which requires lots of energy. On the other hand, miners earn straightforward a reward for mining a block and incorporating transactions.
  2. PoW is better than PoS, because with PoS we increase the amount of energy spent on the network.
  3. PoS is mining with specialized new hardware that has to be purchased with a stack of Ether in the network. Hence the Name: Proof of Stake, which derives from Stack.
Correct answer: A



Question 40

Transactions containing the same data to create the same smart contract are:


  1. always having the same signature.
  2. having a different signature because of the nonce which changes upon every transaction.
Correct answer: B









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files