Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Blockchain CBDE - BTA Certified Blockchain Developer - Ethereum

Page: 1 / 3
Total 102 questions

If you need more fine-grained functionality than solidity offers out of the box:

A.

you can incorporate inline-assembly to get better controls.

B.

you have to import pre-compiled assembly files which are then hard-copied into the bytecode of the compiled solidity file.

C.

you can use Viper, the experimental assembly like language specifically to offer more flexibility.

Hashing Mining uses:

A.

Keccack256 while internally to hash values it's easy to use the Dagger-Hashimoto to create a meaningful hash.

B.

the Dagger-Hashimoto hashing while internally the EVM uses SHA256 which is an alias for Keccack256.

C.

the Dagger-Hashimoto hashing while internally the EVM uses Keccack256 which is almost similar to SHA256, but has a different padding so produces different hashes.

To get most out of the blockchain, it is best:

A.

to use it for the whole business logic. It’s always best to have everything in once place.

B.

to use it only for things which need the benefits of the blockchain.

Single line comments in Solidity are:

A.

working with either // or ///

B.

working with /* comment */ or /** @.. natspec style */

C.

not possible, all comments must be multi-line.

Files can be imported:

A.

using relative and absolute paths, where the "." And the ".." depict that it's a relative path.

B.

only via GitHub using the Repository and Username.

C.

using the special requirefile(...) statement, which looks in a specific library path to import files.

Which statement is true about the EVM?

A.

While the EVM is Sandboxed, it isn't as powerful as the Bitcoin Network, because it's not Turing Complete.

B.

The EVM can't access hardware layers or anything outside a blockchain node because it's sandboxed.

C.

The EVM is extremely powerful, turing complete and perfect for doing computational intensive things, because of the direct access to the graphics card.

Having a bug-bounty program early on:

A.

can help to engage the community in testing your smart contracts and therefore help to find bugs early.

B.

might be a burden as it is an administrative overhead mainly.

C.

is completely useless. Who wants to test beta-ware software? It’s better to start with the bug-bounty program after the contract is released on the main-net.

When you are programming a game like poker of battleships where you need to hide opponents values is:

A.

with private state variables. This way nobody else other than the smart contract itself can see the information

B.

with external contracts holding those values. This way we can make sure that the information flow is following a clear logic and nobody else can access this information.

C.

You can't hide anything on the blockchain, because the information is public, just the call is private which means only other smart contracts would be limited in accessing that information.

What are Private Keys used for?

A.

To Protect the Public Keys by being cryptographically significant.

B.

To Sign Transactions And To Derive an Address From.

C.

To Generate An Address which can sign transactions.

A version pragma is a great way to make it clear:

A.

for which compiler version a smart contract was developed for. It helps to avoid breaking changes.

B.

for which blockchain a smart contract was developed for. It helps to avoid confusion with beta-customers.

C.

for which blockchain node a smart contract was developed for. It helps to avoid mixing up different versions of go-ethereum.