A blockchain is a

Blockchain Technology UK Quiz 1

Quiz
•
Computers
•
University
•
Hard
Udhayakumar Shanmugam
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
distributed database or ledger shared among a computer network's nodes.
advanced database mechanism that allows transparent information sharing within a business network.
a distributed ledger with growing lists of records (blocks) that are securely linked together via cryptographic hashes.
A block is a collection of data that is linked to other blocks chronologically in a virtual chain.
All are correct
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the network security .................................... means the science of transforming the messages to make them secure and immune to attacks.
Encryptionography
Cryptography
Steganography
Hashography
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Asymmetric-Key Encipherment .........................
To send a secure message, the sender first encrypts the message using senders public key. To decrypt the message, the receiver uses its own private key.
To send a secure message, the sender first encrypts the message using receiver’s public key. To decrypt the message, the receiver uses its own private key.
To send a secure message, the sender first encrypts the message using receiver’s private key. To decrypt the message, the receiver uses its own Public key.
To send a secure message, the sender first encrypts the message using receiver’s private key. To decrypt the message, the receiver uses its senders private key.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is not an HASH algorithm
SHA256
MD5
Blake256
Diffe-Helman
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Digital Signature
They are created using symmetric encryption techniques.
The sender uses their private key to generate a digital signature, which can be verified by anyone who has access to the sender's public key.
They are created using asymmetric encryption techniques.
The sender uses their private key to generate a digital signature, which can be verified by anyone who has access to the sender's public key.
They are created using asymmetric encryption techniques.
The sender uses receivers private key to generate a digital signature, which can be verified by anyone who has access to the sender's public key.
They are created using asymmetric encryption techniques.
The sender uses their private key to generate a digital signature, which can be verified by anyone who has access to the receivers public key.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a Consensus mechanisms
Proof of Work(POW)
Proof of Stake(POS)
Byzantine Fault Tolerance (BFT)
Hierarchical Deterministic Wallets(HDW)
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the equation for elliptic curve
y2 = x3 + Ax + B
y3 = x3 + Ax + B
y2 = x2 + Ax + B
y2 = x3 + Ax + By+C
Create a free account and access millions of resources
Similar Resources on Quizizz
6 questions
Croteau SY110 L18&19 AY25

Quiz
•
University
15 questions
Cryptology

Quiz
•
9th Grade - University
13 questions
C1-3.1 The Rules of Communication

Quiz
•
11th Grade - University
8 questions
WJEC ICT - Chapter 2 - The Internet: Packets & Routing

Quiz
•
10th Grade - University
15 questions
CN - ERROR CORRECTION & DETECTION

Quiz
•
University
10 questions
Error detection techniques

Quiz
•
University
10 questions
Data communication & Networks

Quiz
•
University
10 questions
External Devices

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade