Files
survey-manager/survey-nginx/secure_html/data/tests/blkchn3.masters
2024-07-19 10:05:36 +00:00

12 lines
4.6 KiB
Plaintext
Executable File
Raw Blame History

This file contains ambiguous Unicode characters
This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.
id&qtp&qim&qil&qtx&qca&qia&qrm&qnxt&qprv&qalb&subj&wght&pts&flr&ded&layout&qfixed&qptsbyans&flags
blkchn3.001&esa&1&N&The advent of the ___________ platform has spawned
;thousands of startup companies in the blockchain
;space.&ethereum&&The advent of the Ethereum platform has spawned
;<br>;thousands of startup companies in the blockchain
;<br>;space.&&&&undefined.0&&&&&1&&&N.
blkchn3.002&esa&0&N&The ________ _____ has always been high for high-
;tech startups and blockchain is no different.&failure rate&&The failure rate has always been high for high-
;tech startups and blockchain is no different.&&&&undefined.0&&&&&1&&&N.
blkchn3.003&esa&0&N&But there is a twist in that a blockchain app can
;try to create a new _______________. Startups have
;been issuing and selling their own currency tokens
;in exchange for Bitcoin and Ether.&cryptocurrency&&But there is a twist in that a blockchain app can
;<br>;try to create a new cryptocurrency. Startups have
;<br>;been issuing and selling their own currency
;tokens <br>;in exchange for Bitcoin and Ether.&&&&undefined.0&&&&&1&&&N.
blkchn3.004&esa&0&N&ICO stands for _______ _____ _______ and is the
;new process for raising funds necessary for
;development and expansion.&initial coin offering&&The process is called an Initial Coin Offering <br>;
;(ICO) and its a new way to raise funds necessary
;<br>;for development and expansion.&&&&undefined.0&&&&&1&&&N.
blkchn3.005&esa&0&N&Fortune Magazine has cast a curious but frequently
;skeptical eye on ICOs, which from the get-go were
;ripe for ______.&scams,scam,scamming&&Fortune Magazine has cast a curious but frequently
;<br>;skeptical eye on ICOs, which from the get-go were
;<br>;ripe for scams.&&&&undefined.0&&&&&1&&&N.
blkchn3.006&esa&0&N&Blockchain technology has created quite a stir
;among innovators and investors world-wide who
;predict it will ultimately change how the
;_________ works when intermediaries in any
;given market are no longer needed to handle
;payment, clearing, and settlement.&economy&&Blockchain technology has created quite a
;stir<br>among innovators and investors world-
;wide who predict it will ultimately change how
;the economy works when intermediaries in any
;given market are no longer needed to handle
;payment, clearing, and settlement.&&&&undefined.0&&&&&1&&&N.
blkchn3.007&esa&0&N&The majority of blockchain attacks have been
;designed to steal ______________ keys rather than
;attack the actual blockchain.&cryptographic,encryption,crypto,cryptography&&The majority of blockchain attacks have <br>;
;<br>;been<br>designed to steal cryptographic keys
;<br>;<br>;rather than attack the actual blockchain.&&&&undefined.0&&&&&1&&&N.
blkchn3.008&esa&0&N&Cryptography is an art, not a science. And the
;state of the art can advance over time.
;Advances in code cracking, or technical
;advances such as the development of __________
;___________, could present risks to
;cryptocurrencies.&quantum computers,quantum computing&&Cryptography is an art, not a science. And the
;<br>;<br>;state of the art can advance over time.
;<br>;Advances <br>;in code cracking, or technical
;<br>;advances such as <br>;the development of
;<br>;quantum computers, could <br>;present risks to
;<br>;cryptocurrencies.&&&&undefined.0&&&&&1&&&N.
blkchn3.009&esa&0&N&Risk of Ether Mining Attacks -
;As with other cryptocurrencies, the blockchain
;used for the Ethereum Platform is susceptible
;to mining attacks, including:
;● Double-_________ attacks
;● Majority mining power attacks,
;● “Selfish-mining” attacks
;● Race condition attacks.&spend&&Risk of Ether Mining Attacks<br>As with other
;cryptocurrencies, the blockchain used for
;the<br>Ethereum Platform is susceptible to
;mining attacks, including:<br>● Double-spend
;attacks<br>● Majority mining power attacks,
;<br>● “Selfish-mining” attacks<br>● Race
;condition attacks.&&&&undefined.0&&&&&1&&&N.
blkchn3.010&esa&0&&If the Ethereum Platform is rapidly adopted,
;the demand for ETH could rise dramatically and
;at a pace that exceeds the rate with which ETH
;miners can create new ETH tokens. Under such a
;scenario, the entire Ethereum Platform could
;become _______________, due to the increased
;cost of running distributed applications.&destabilized&&If the Ethereum Platform is rapidly adopted,
;the demand for ETH could rise dramatically and
;at a pace that exceeds the rate with which ETH
;miners can create new ETH tokens. Under such a
;scenario, the entire Ethereum Platform could
;become destabilized, due to the increased cost
;of running distributed applications.&&&&undefined.0&&&&&1&&&N.