Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

EXAM : CERTIFIED BLOCKCHAIN SOLUTIONS ARCHITECT QUESTIONS & ANSWERS(GRADED A+)

Beoordeling
-
Verkocht
-
Pagina's
22
Cijfer
A+
Geüpload op
21-11-2025
Geschreven in
2025/2026

"If a hardfork appears on a public blockchain software - 20 running nodes choose not to update - What can be said about the 20 nodes ? - ANSWER" "The 20 nodes are running on a different blockchain network - than the nodes that were updated " "What is the best practice - preventing contract addresses from changing - when a new contract is released - ANSWER" "Use the ""- addressForce"" parameter - when releasing a new contract " "Data structure to create a lightweight data fingerprint - of all transactions in the block - ANSWER" Merkle Tree Proof of Stake is most required and implemented by - ANSWERBlockchains that manage wealth and asset Transsactions can only be added to the blockchain - ANSWERTRUE "To prevent duplicate addresses/accounts from being generated, on the same blockchain network - the input for the hash function that generates the address - ANSWER" should contain enough entropy/randomness To determine the anticipated load on an application, the number of end users should be considered along with - ANSWERThe average no of transactions per user In public key cryptography, the private key is used to.. - ANSWER"Sign/Approve any transaction, - that might be made by any holder of the key pair " Records on the public blockchain are deleted by - ANSWERThey cannot be deleted Two main types of transactions that can be performed are - ANSWER"Deploy Transactions Invoke Transactions " 21. To approve pending ledger transactions, consensus algorithms often implement - ANSWERBizantyne Fault Tolerance 22. It is impossible to persist media types such as MP3 and MOV on any distributed ledger - ANSWERFALSE 23. Which of the following is TRUE regarding Smart Contracts on the Ethereum Blockchain - ANSWERThey are Turing Complete and deterministic in nature In public key cryptography, public key is used in - ANSWEREncrypt the private key

Meer zien Lees minder
Instelling
CERTIFIED BLOCKCHAIN
Vak
CERTIFIED BLOCKCHAIN

Voorbeeld van de inhoud

EXAM : CERTIFIED BLOCKCHAIN
SOLUTIONS ARCHITECT
QUESTIONS & ANSWERS(GRADED
A+)

"If a hardfork appears on a public blockchain software
- 20 running nodes choose not to update
- What can be said about the 20 nodes ? - ANSWER" "The 20 nodes are running on
a different blockchain network
- than the nodes that were updated

"
"What is the best practice
- preventing contract addresses from changing
- when a new contract is released - ANSWER" "Use the ""- addressForce""
parameter
- when releasing a new contract

"
"Data structure to create a lightweight data fingerprint
- of all transactions in the block - ANSWER" Merkle Tree

Proof of Stake is most required and implemented by - ANSWERBlockchains that
manage wealth and asset

Transsactions can only be added to the blockchain - ANSWERTRUE

"To prevent duplicate addresses/accounts from being generated, on the same
blockchain network
- the input for the hash function that generates the address - ANSWER" should
contain enough entropy/randomness

To determine the anticipated load on an application, the number of end users should
be considered along with - ANSWERThe average no of transactions per user

In public key cryptography, the private key is used to.. - ANSWER"Sign/Approve any
transaction,
- that might be made by any holder of the key pair

"
Records on the public blockchain are deleted by - ANSWERThey cannot be deleted

Two main types of transactions that can be performed are - ANSWER"Deploy
Transactions

,Invoke Transactions

"
21. To approve pending ledger transactions, consensus algorithms often implement -
ANSWERBizantyne Fault Tolerance

22. It is impossible to persist media types such as MP3 and MOV on any distributed
ledger - ANSWERFALSE

23. Which of the following is TRUE regarding Smart Contracts on the Ethereum
Blockchain - ANSWERThey are Turing Complete and deterministic in nature

In public key cryptography, public key is used in - ANSWEREncrypt the private key

How are blocks of data chained together to ensure integrity of transactions -
ANSWER"The hash of the previous block
- is writtent to the header of the current block

"
A Smart Contract is most like which classical programming object -
ANSWERFunction

Which scenario would be most appropriate for a blockchain solution to implement a
Proof of Work or Proof of Stake Consensus ? - ANSWER"Aim of the blockchain
- to be trustless as possible

"
Byzantine Fault Tolerance can be achieved only through Proof of Work - ANSWERA.
FALSE

Complex application components should try to be concentrated in which App Layer -
ANSWERPresentation / Top

"When a blockchain software is updated with new functionality that breaks/modifes
- the rules of the prev version of the software
- What has just occurred - ANSWER" A Hard Fork

Blockchain addresses or "Accounts" are generated by - ANSWER"Creating a hash
based on a cryptographic public key
- and various meta data

"
In a Proof - Of -Work group consensus , the nounce refers to - ANSWER"The
random data
- that can be combined with the block data
- which will produce a hash output
- matching the current difficulty level

"

, Types of data are able to be stored on any given blockchain ledger -
ANSWEREncrypted textual and numerical data

Identity and transaction approval is possible through - ANSWERNone of the above

"A product's supply chain data is stored on blockchain
- Only members of the Product Supply chain can write announcements to the
blockchain
- Any consumer can query the data in a store to learn more about the product they
want to buy.
This is an example of - ANSWER" Private / Open - Blockchain Type

Ownership or Partial Ownership of an asset can be tracked with which type of token
- ANSWERUtility

Proof of Stake offers which advantage over Proof of Work - ANSWER"* Greater
Transaction speed
* Compatible with new generation chipsets
* Longer History / Deeper Knowledge Base
* Answer : None of the above

"
Transactions can only be added to a blockchain - ANSWERFALSE

A consideration that must be taken into account when working with Hyperledger
Fabric - ANSWERHow often Hard Forks occur on the software

What is true about Hyperledger Fabric - ANSWER"Because it is permissioned
- It is impossible to display data to the public

"
"A Large departmental store chain is being pressured by Lawmakers to
- provide evidence that proves that stores clothing is not produced through child
labour.
- Store's clothing is being transferred between atleast 6 different parties in between
creation and placement at the storefront
- The store is considering use of blockchain
-- Descretion in the reading and writing of transactions
- How will you design the solution - ANSWER" "Use a public blockchain
- that supports Assets | Create a new clothing ""Asset""
- When the clothing is transferred to the next party in the process
- the associated blockchain asset be transferred to the next party's blockchain
account
-- with relevant meta data.
- The lawmakers can now view the transactions and transfers at any time

"
A private blockchain such as HyperLedger would be the right choice for which
scenario - ANSWER"An enterprise that needs to build
- scalable, secure, permissioned blockchain application

Geschreven voor

Instelling
CERTIFIED BLOCKCHAIN
Vak
CERTIFIED BLOCKCHAIN

Documentinformatie

Geüpload op
21 november 2025
Aantal pagina's
22
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
papersbyjol West Virginia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
443
Lid sinds
3 jaar
Aantal volgers
254
Documenten
14151
Laatst verkocht
3 dagen geleden

3.7

78 beoordelingen

5
29
4
20
3
18
2
2
1
9

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen