Which methods are used for securing various elements of the blockchain? -
Answer hashing and encryption
How many hash values need to be updated if the value of one transaction changes? -
Answer Take the height of the tree, that's how many values would need to be
updated (log of base 2)
The transaction Merkle Tree root value in a Bitcoin block is calculated using ____ -
Answer hash of transactions
When encrypting a message with the public key, which key is required to decrypt
the message? - Answer Private key
What type of hashing algorithm does Bitcoin blockchain use to determine the hash of
a block? - Answer SHA-256
What is the purpose of using a digital signature? - Answer It supports both user
authentication and integrity of messages
In Ethereum, hashing functions are used for which of the following? -
Answer Generating: state hash, account addresses, block header hash
, Ethereum, which algorithm is applied to the private key in order to get a unique public
key. - Answer ECC
Which of the following methods can be used to obtain the original message from its
generated hash message using SHA-256? - Answer Original message cannot be retrieved
Encryption of a message provides ____ - Answer security
A public key is derived from the ____ - Answer private key
Method or protocol to choose the next block in Bitcoin or Ethereum uses: -
Answer Hashing
Characteristics of blockchain - Answer Immutability, unhackability, persistence of data
Difference Between Private and Public blockchain - Answer "Private blockchains may
have an administrator that can make changes, used in private databases for private
usage. Need permissions to join.. Public blockchains are used by the public and
cannot have an administrator, are decentralized networks to verify transactions in a
trustless enviornment.
Permissioned vs Permissionless Blockchain - Answer Permissioned blockchain - need
permission to join. permissionless blockchain - no permisisons needed to join
Blockchain representation - json - Answer what?? manilich literally refused to explain
jsons no matter how many times i asked or why she wants us to use them and then she
does this i literally ****ing hate her i am so tired of this i hate her i hate blockchain i
hate bitcoin this is dumb everything is dumb i want the semester to end **** this ****
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller KenAli. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.79. You're not tied to anything after your purchase.