Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

CBDE Exam Dumps - BTA Certified Blockchain Developer - Ethereum

Question # 4

When you do external calls to other smart contracts:

A.

you should follow the checks-effects-interactions pattern and avoid state changes after the call.

B.

you should follow the effects-checks-interactions pattern and avoid state changes before the call.

C.

you should follow the checks-effects-interactions pattern, which is only necessary when you do calls to contracts where a direct contract call is not possible.

Full Access
Question # 5

Importing from GitHub:

A.

works across all compilers and platforms the same way.

B.

is generally possible, but currently works only in Remix, but doesn't work in Truffle.

Full Access
Question # 6

A Blockchain Node:

A.

can never become a mining node.

B.

can always become a mining node.

C.

can become a mining node, depending if the implementation has the functionality implemented.

Full Access
Question # 7

Smart Contracts can be written in:

A.

Java, C++, Solidity and JavaScript, because the Ethereum Blockchain is completely language agnostic and cross compilers exist for every major language.

B.

Solidity, Viper, LLL and Serpent, because those are high level languages that are compiled down to bytecode.

C.

Solidity and JavaScript, because those are the official first implementations for Distributed applications and the Blockchain supports those languages fully.

Full Access
Question # 8

Consensus is reached:

A.

by the miner nodes which make sure that a transaction is valid.

B.

by every single node in the blockchain network executing the same transaction.

C.

by a cryptographic secure signature algorithm called ECDSA which makes sure that cheating is impossible.

Full Access
Question # 9

Single line comments in Solidity are:

A.

working with either // or ///

B.

working with /* comment */ or /** @.. natspec style */

C.

not possible, all comments must be multi-line.

Full Access
Question # 10

To send ether to a contract without a function call:

A.

a fallback function must be declared and it must be made payable. If there is no fallback function or the fallback function is not payable it will throw an exception.

B.

either a fallback function which is payable exists, or no fallback function at all exists.

C.

you cannot send ether to a contract without explicitly calling a function. The fallback function can never receive ether.

Full Access
Question # 11

DApps are:

A.

great, because they cut the middle man, run on a trusted platform, apply logic to the blockchain where already economic assets are running and thus allow peer to peer trade.

B.

an amazing way to create new applications. Those applications run entirely separated from other applications on the platform and allow for logical interactions. They can't access any funds to add an additional layer of trust.

C.

a new way of applying logical operations for banks and big financial institutions. This way they can reduce the staff while operating at increased security.

Full Access
Question # 12

Transactions containing the same data to create the same smart contract are:

A.

always having the same signature.

B.

having a different signature because of the nonce which changes upon every transaction.

Full Access
Question # 13

What's the correct scientific notation?

A.

1 Ether = 10^18 wei, 10^9 Gwei, 10^3 Finney

B.

1 Ether = 10^19 wei, 10^13 Gwei, 10^3 Finney

C.

1 Ether = 10^16 wei, 10^13 Gwei, 10^3 Finney

D.

1 Ether = 10^18 wei, 10^6 Gwei, 10^6 Finney

Full Access
Question # 14

The JSON-RPC Protocol:

A.

is used to communicate between blockchain nodes.

B.

is used to ensure safe communication between miners.

C.

is a mean of dumping the blockchain data in a so-called consensus export.

D.

is used to communicate between the blockchain node and externally running applications.

Full Access
Question # 15

Hashing Mining uses:

A.

Keccack256 while internally to hash values it's easy to use the Dagger-Hashimoto to create a meaningful hash.

B.

the Dagger-Hashimoto hashing while internally the EVM uses SHA256 which is an alias for Keccack256.

C.

the Dagger-Hashimoto hashing while internally the EVM uses Keccack256 which is almost similar to SHA256, but has a different padding so produces different hashes.

Full Access