Blockchain-UX-Designer Set 1
Free Online Best Blockchain-UX-Designer MCQ Questions for improve your basic knowledge of Blockchain-UX-Designer. This Blockchain-UX-Designer set 1 test that contains 25 Multiple Choice Questions with 4 options. You have to select the right answer to a question.
Start
Congratulations - you have completed Blockchain-UX-Designer Set 1.
You scored %%SCORE%% out of %%TOTAL%%.
Your performance has been rated as %%RATING%%
Your answers are highlighted below.
Question 1 |
What is a ledger?
A | ledger is typically a database or a record book |
B | ledger works on the principle of ECCDLP |
C | ledger provides equivalent security for a much lesser key size which makes ECC faster and more secure |
D | ledger is a cryptocurrency |
Question 2 |
What is distributed denial-of-service ?
A | Distributed denial-of-service attack happens when multiple systems are attacking a target’s system resource/bandwidth. |
B | Distributed denial-of-service is the first and most popular mechanism used by bitcoin and Ethereum, which are the most popular cryptocurrencies at the time of writing |
C | Distributed denial-of-service is a slang term coined in association with cryptocurrency to describe holding cryptocurrency disregarding price fluctuation. |
D | Distributed denial-of-service provides a similar hashing block scheme to bitcoin’s PoW, but it limits the number of peers |
Question 3 |
Which of the following is asymmetric encryption Algorithm?
A | Blowfish |
B | Twofish |
C | RSA |
D | Triple DEA |
Question 4 |
List of some popular cryptocurrency coins that use PoS---
A | Dash |
B | NEO |
C | LSK |
D | All of the Above |
Question 5 |
What is Blockchain ?
A | Blockchain is used to verify the transaction in the quickest time and less space complexity |
B | Blockchain is a cryptocurrency |
C | Blockchain is a record book |
D | Blockchain is a technology behind cryptocurrency and just one case of technology |
Question 6 |
What is Proof of Work?
A | POW is the first and most popular mechanism used by bitcoin and Ethereum, which are the most popular cryptocurrencies at the time of writing |
B | POW attack happens when multiple systems are attacking a target’s system resource/bandwidth. |
C | POW provides a similar hashing block scheme to bitcoin’s PoW, but it limits the number of peers |
D | POW is a slang term coined in association with cryptocurrency to describe holding cryptocurrency disregarding price fluctuation. |
Question 7 |
Asymmetric encryption uses___
A | Public keys only |
B | Private keys only |
C | Public and Private keys |
D | Proof of Stake |
Question 8 |
What is the core requirement(s) for a business BlockChain?
A | Shared ledger, smart contract, privacy, and trust |
B | Optimized cryptographic mining |
C | A new cryptocurrency |
D | Technical services, business services, and solution |
Question 9 |
What makes a good Block Chain use case?
A | All of these |
B | An identifiable business network |
C | A business problem to be solved |
D | The need for trust |
Question 10 |
Which of these facts about a ledger is NOT CORRECT?
A | A ledger is used purely for the reporting of cash |
B | A ledger consists of transactions, often governed by contracts |
C | A ledger is a system of record |
D | A ledger describes the inputs and outputs of a business. |
Question 11 |
What is a private key?
A | A key on your key chain |
B | A key given to the public |
C | A key NOT to be given to the public |
D | A key that opens a secret door |
Question 12 |
What are the different types of Blockchains?
A | 2 |
B | 3 |
C | 4 |
D | 5 |
Question 13 |
What is Proof of Stake?
A | Proof of Stake provides a similar hashing block scheme to bitcoin’s PoW, but it limits the number of peers |
B | Proof of Stake is a slang term coined in association with cryptocurrency to describe holding cryptocurrency disregarding price fluctuation. |
C | Proof of Stake is the first and most popular mechanism used by bitcoin and Ethereum, which are the most popular cryptocurrencies at the time of writing |
D | Proof of Stake attack happens when multiple systems are attacking a target’s system resource/bandwidth. |
Question 14 |
What is HODL?
A | HODL is a slang term coined in association with cryptocurrency to describe holding cryptocurrency disregarding price fluctuation. |
B | HODLprovides a similar hashing block scheme to bitcoin’s PoW, but it limits the number of peers |
C | HODL attack happens when multiple systems are attacking a target’s system resource/bandwidth. |
D | HODL is the first and most popular mechanism used by bitcoin and Ethereum, which are the most popular cryptocurrencies at the time of writing |
Question 15 |
What is Cold storage?
A | Cold storage is a place to hang your coat |
B | Cold storage is a private key not connected to internet |
C | Cold storage is a private key connected to internet |
D | Cold storage is a desktop Wallet |
Question 16 |
What is Cryptocurrency?
A | Cryptocurrency is a process of converting your message into code so that only authorized parties can access it. |
B | Cryptocurrency is reversing the encryption process so that the message can be converted to the original message |
C | Cryptocurrency is using the techniques of encryption and decryption to send and receive messages. |
D | Cryptocurrency is a digital asset designed so that electronic cash is able to be exchanged using strong cryptography |
Question 17 |
What is a Merkle Tree?
A | is used to verify the transaction in the quickest time and less space complexity |
B | is a cryptocurrency |
C | is a record book |
D | is a technology behind cryptocurrency and just one case of technology |
Question 18 |
What does P2P stands for?
A | Password to Password |
B | Peer to Peer |
C | product to product |
D | Private Key to Public Key |
Question 19 |
Define BlockChain in the simplest words.
A | BlockChain is a distributed ledger, which has a shared database based on consensus algorithm |
B | BlockChain is a ledger describes the inputs and outputs of a business. |
C | BlockChain is a typically a database or a record book |
D | BlockChain is a Technical services, business services, and solution |
Question 20 |
What is the process of creating new bitcoins popularly known as?
A | Finding |
B | Panning |
C | Sourcing |
D | Mining |
Question 21 |
What is Encryption?
A | Encryption is a process of converting your message into code so that only authorized parties can access it. |
B | Encryption is reversing the encryption process so that the message can be converted to the original message |
C | Encryption is using the techniques of encryption and decryption to send and receive messages. |
D | Encryption is using cryptography the same way as the earlier SSL or video example but specifically to fit the needs of a digital asset. |
Question 22 |
Cryptocurrency wallet used to____
A | stores one or multiple public key and private key combinations and is used to receive or spend cryptocurrency |
B | verify and add transactions to the blockchain digital ledger. |
C | distributed ledger, which has a shared database based on consensus algorithm |
D | All of these |
Question 23 |
What is Decryption?
A | Decryption is a process of converting your message into code so that only authorized parties can access it. |
B | Decryption is reversing the encryption process so that the message can be converted to the original message |
C | Decryption is using the techniques of encryption and decryption to send and receive messages. |
D | Decryption is using cryptography the same way as the earlier SSL or video example but specifically to fit the needs of a digital asset. |
Question 24 |
What is Cryptography?
A | Cryptography is a process of converting your message into code so that only authorized parties can access it. |
B | Cryptography is reversing the encryption process so that the message can be converted to the original message |
C | Cryptography is using the techniques of encryption and decryption to send and receive messages. |
D | Cryptography is using cryptography the same way as the earlier SSL or video example but specifically to fit the needs of a digital asset. |
Question 25 |
What powers the Ethereum Virtual Machine?
A | Gas |
B | Ether |
C | Bitcoin |
D | Block Rewards |
Once you are finished, click the button below. Any items you have not completed will be marked incorrect.
Get Results
There are 25 questions to complete.
← |
List |
→ |
Return
Shaded items are complete.
1 | 2 | 3 | 4 | 5 |
6 | 7 | 8 | 9 | 10 |
11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 |
21 | 22 | 23 | 24 | 25 |
End |
Return
You have completed
questions
question
Your score is
Correct
Wrong
Partial-Credit
You have not finished your quiz. If you leave this page, your progress will be lost.
Correct Answer
You Selected
Not Attempted
Final Score on Quiz
Attempted Questions Correct
Attempted Questions Wrong
Questions Not Attempted
Total Questions on Quiz
Question Details
Results
Date
Score
Hint
Time allowed
minutes
seconds
Time used
Answer Choice(s) Selected
Question Text
All done
Need more practice!
Keep trying!
Not bad!
Good work!
Perfect!