0% found this document useful (0 votes)
29 views2 pages

Distributed Systems & Cryptography Guide

notes

Uploaded by

Usri Devi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views2 pages

Distributed Systems & Cryptography Guide

notes

Uploaded by

Usri Devi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

What is distributed database?

Define two general problems.


Write about the byzantine general problem (BGP).
What is Handoop?
What is Name-node?
Write about distributed hash table.
Define cryptography.
List the types in cryptography.
Write about Hashing algorithm.
Define ECDSA.
State the difference between Ethereum and Bitcoin.
Write about the digital signature.
What is hash function?
Write about memory hard algorithm.
Define zero knowledge proof

How to you ensure fault tolerance

Define ASIC resistance

What is the meaning of Turing complete

What is Handoop distributed file system

What is symmetric key cryptography

Remembering (Recall basic facts and concepts)

1. What is a distributed database?


2. What is a hash function?
3. Define cryptography.
4. What is a Name-node?

Understanding (Explain ideas or concepts)

1. Explain the Byzantine General Problem (BGP).


2. Describe the Hadoop Distributed File System (HDFS).
3. Explain symmetric key cryptography.
4. What does it mean for a system to be Turing complete?
5. Describe ASIC resistance.

Applying (Use information in new situations)

1. How does the Distributed Hash Table (DHT) structure work in a network?
2. How do you ensure fault tolerance in a distributed system?

Analyzing (Differentiate between concepts)

1. Compare and contrast Ethereum and Bitcoin.


2. Analyze the role of the memory-hard algorithm in cryptography.
3. What are the challenges and solutions for ensuring fault tolerance in distributed
databases?

Evaluating (Justify a decision or choice)

1. Evaluate the effectiveness of the ECDSA (Elliptic Curve Digital Signature Algorithm) in
cryptographic systems.
2. Assess the security implications of using a hashing algorithm.

Creating (Create something new based on learned concepts)

1. Design a zero-knowledge proof protocol for a secure authentication system.


2. Propose a model for enhancing Hadoop with an additional fault tolerance mechanism.

You might also like