100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Blockchain Development Final UPDATED ACTUAL Exam Questions and CORRECT Answers

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
05-03-2025
Written in
2024/2025

Blockchain Development Final UPDATED ACTUAL Exam Questions and CORRECT Answers Why is establishing identity and ensuring privacy and security difficult in decentralized systems? - CORRECT ANSWER - This is difficult because in decentralized systems there is no notion of a user identity such as usernames and a central database for storing authentication data such as passwords. Also, there are no frameworks in place to ensure the privacy of user data such as HIPAA for medical information and FERPA for student records

Show more Read less
Institution
Blockchain
Course
Blockchain









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Blockchain
Course
Blockchain

Document information

Uploaded on
March 5, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Blockchain Development Final UPDATED
ACTUAL Exam Questions and CORRECT
Answers
Why is establishing identity and ensuring privacy and security difficult in decentralized systems?
- CORRECT ANSWER - This is difficult because in decentralized systems there is no
notion of a user identity such as usernames and a central database for storing authentication data
such as passwords. Also, there are no frameworks in place to ensure the privacy of user data such
as HIPAA for medical information and FERPA for student records.


What is cryptography used for in decentralized systems? - CORRECT ANSWER --
Creating a digital identity
- Securing data and transactions
- Ensuring privacy of data
- Signing documents digitally


What is symmetric cryptography and why is it an issue in decentralized systems? - CORRECT
ANSWER - Symmetric cryptography is where the same key is used for both encryption
and decryption. This is an issue in decentralized systems as it becomes difficult to safely share
the key amongst multiple individuals. If the key is stolen, then an adversary can easily decrypt
encrypted data.


What is asymmetric cryptography and why is it a better fit for decentralized networks? -
CORRECT ANSWER - Asymmetric cryptography is where we have two keys a private
key and a public key. The private key is only known to the holder and the public key is publicly
available. Also, anything encrypted with the private key can only be decrypted with the public
key and vice versa. This is a better fit for decentralized systems because an individual can
encrypt data with their private key and their publicly available public key is able to decrypt it
which makes sharing keys easier. It also allows for verification as if an individual's public key
can decrypt data it means their private key encrypted it which proves identity.


How are Ethereum addresses generated? - CORRECT ANSWER - - 256-bit random
number becomes private key.

, - An elliptic curve algorithm is used to derive a public key from the private key.
- A hashing 160-bit hashing function is used to generate an address from the public key.


If someone steals your private key, what does it give them access to? - CORRECT
ANSWER - They will have access to all your accounts and tokens within your wallet.



What does Metamask use to sign your transactions? - CORRECT ANSWER - Your private
key


How does the BIP39 standard create a mnemonic? - CORRECT ANSWER - - A 128-bit
entropy is generated from your private key.
- A 4-bit checksum is added to it to make it 132-bits.
- It is then divided into 11-bit parts with each part mapping onto a word from a 2048- word list.


How does a hash function work? - CORRECT ANSWER - Transforms data of an arbitrary
size to a fixed size value.


What items are hashed in the blockchain world? - CORRECT ANSWER - Block,
transactions, data.


What are the uses of hashing? - CORRECT ANSWER - - Digitally signing documents
- Hash block header
- Hash data on distributed ledger (for storing large data off chain)


What are 3 hash functions provided by solidity? - CORRECT ANSWER - - RIPEMD160
- SHA256
- Keccak (256)


What are the different kinds of on-chain data? - CORRECT ANSWER - - Blocks

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1091
Member since
1 year
Number of followers
102
Documents
68972
Last sold
22 hours ago
MGRADES (Stanford Top Brains)

Welcome to MGRADES Exams, practices and Study materials Just think of me as the plug you will refer to your friends Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

175 reviews

5
75
4
31
3
46
2
8
1
15

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions