A. Chaincode
B. Ripple
C. CordApps
D. DApps
E. Ledger
F. Programmatic Logic
A. EVM
B. Turing Incomplete
C. Turing Complete
D. JVM
E. Solidity
F. Mist
A. Validity Rules
B. Distributed Ledger database
C. Consensus Algorithm
D. Encryption
A. State Data, Transaction logs
B. Transaction Logs, CouchDB
C. LevelIDb, CouchDB
D. State Data, Transactional Data
A. Use the "- -addressForce" parameter when releasing a new contract
B. Delete the old contract and add the new version in its place
C. Move your contract to a new blockchain
D. Addresses always change so use a calling contract
A. LTC
B. ICON
C. EOS
D. Golem
A. Neo Generals' problem
B. Byzantine Generals' problem
C. Renaissance Generals' problem
D. Byzantine Admirals' problem
A. Decrypt the private key so valid transactions/actions can be performed
B. Encrypt the private key
C. Verify the digital signature of a given key pair
D. Sign/approve any transaction/action that might be made by the holder of the key pair
A. Select an optimal algorithm for your networks
B. Add permission as needed
C. Add user as needed
D. Select a specific API that manages the blockchain
A. Unencrypted textual and numerical data
B. Encrypted textual and numerical data
C. Each blockchain software specifies its own data storage rules
D. Any data that is within the UTC-8 standard
A. Backup
B. Legally Enforcable
C. Autonomy
D. Efficiency
E. Cast Savings
A. MD5
B. PGP
C. RSA
D. AES
A. Scenario: Online game, Dataset: Unique Items In Game, Battles Won, Quests Completed
B. Scenario: Sales (CRM) website; Dataset: Hot Lead Count, Lead Score, Lead Fullname, Today's Tasks
C. All of the above
D. Scenario: Mobile app for inspirational quotes; Dataset: First Name, Last Name, Quote of the Day