Crypto internship questions :-
1. What is the primary cryptographic technique used in Bitcoin to generate wallet addresses?
*
Symmetric-key cryptography
Elliptic Curve Cryptography (ECC)
RSA
SHA-256
2. Which consensus mechanism ensures transaction finality by selecting block producers based
on their stake and an election process?
*
Proof of Work (PoW)
Delegated Proof of Stake (DPoS)
Proof of Elapsed Time (PoET)
Proof of Authority (PoA)
3. What is the main distinction between ERC-20 and ERC-721 tokens?
*
ERC-20 tokens represent unique assets, ERC-721 tokens are fungible.
ERC-721 tokens are unique, while ERC-20 tokens are fungible.
ERC-20 tokens are used for decentralized governance, while ERC-721 is used for DeFi protocols.
ERC-20 tokens are for NFTs, ERC-721 for stablecoins.
4. What is the purpose of a canister in ICP DApp development?
*
It acts as a traditional database.
It is a container for code and state, similar to a smart contract.
It is a server for hosting websites on the blockchain.
It replaces the need for frontend code.
5. Which of the following cryptographic algorithms is widely used in Ethereum for hashing
purposes?
*
SHA-256
Keccak-256
MD5
ECDSA
6. In the context of ERC-20, what is the approve function used for?
*
To transfer tokens between accounts
To approve a smart contract to spend tokens on behalf of the user
To mint new tokens
To burn existing tokens
7. Which of the following best describes the Byzantine Fault Tolerance (BFT) problem in
Blockchain?
*
Handling malicious nodes to achieve consensus
Improving transaction speed without compromising security
Ensuring block immutability
Optimizing resource consumption in PoW
8. What is a significant limitation of Proof of Work (PoW)?
*
It is not secure against attacks.
It requires minimal computational power.
It is energy-intensive and slow.
It does not involve any cryptographic functions.
9. Which function is mandatory in an ERC-721 smart contract implementation?
*
transferOwnership
balanceOf
totalSupply
burnToken
10. What is the unique feature of the Internet Computer Protocol (ICP) compared to traditional
blockchain platforms?
*
It provides decentralized storage for NFTs only.
It eliminates the need for traditional blockchains by hosting apps directly on the blockchain.
It uses PoW for scalability.
It primarily focuses on anonymous transactions.
11. Which type of cryptography ensures that data is only accessible to its intended recipient in a
Blockchain system?
*
Hash-based cryptography
Asymmetric cryptography
Symmetric cryptography
Zero-Knowledge Proofs
12. In the Proof of Stake (PoS) consensus mechanism, what determines the likelihood of a node
validating the next block?
*
The amount of computational power it contributes
The size of its stake in the network
Its geographical location
The age of its account
13. What is the purpose of the transferFrom function in an ERC-721 contract?
*
To approve token spending on behalf of the owner
To transfer ownership of an NFT from one address to another
To mint a new token
To check the balance of tokens
14. Which component of ICP allows developers to build fully decentralized applications?
*
Boundary nodes
Canister smart contracts
Chain keys
Network neurons
15. Which of the following accurately describes Merkle Trees in Blockchain?
*
A data structure used for storing transaction metadata
A cryptographic algorithm for hashing transactions
A tree structure where each leaf node is a hash of a transaction
A method for validating public keys