Login
Remember
Register
Recent
Hot!
Most votes
Most answers
Most views
Ask a Question
Recent questions
0
votes
1
answer
Which of the following is a type of cyber security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
Which one of the following refers to the technique used for verifying the integrity of the message?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
software-integration
cyber-security
0
votes
1
answer
Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
steal
spy
cyber-security
0
votes
1
answer
Which of the following refers to the violation of the principle if a computer is no more accessible?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
computer-principle
cyber-security
0
votes
1
answer
Who is the father of computer security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
computer-security
0
votes
1
answer
What does cyber security protect?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
What is Cyber Security?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
0
votes
1
answer
Which of the following refers to exploring the appropriate, ethical behaviors related to the online environment and digital media platform?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
cyber-security
ethical-behaviors
0
votes
1
answer
Read the following statement carefully and find out whether it is correct about the hacking or not?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
hacking
cyber-security
0
votes
1
answer
Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?
asked
Feb 8, 2022
in
Cyber Security
by
Robindeniel
idea
invention
idea-steal
0
votes
1
answer
The benefits of Solution Envisioning using the design thinking process include the following
asked
Feb 7, 2022
in
Growth and Transformation
by
sharadyadav1986
solution-envisioning
0
votes
1
answer
Oracles are an external piece of information used by contracts.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
What happens when shared facts associated with a node change?
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
___________ is the core business logic on which CorDapps run.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
What are the two types of transactions?
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
A _______ is a database in the node where all states are stored.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
Every node in an R3 Corda network has ______ associated with it.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
blockchain
0
votes
1
answer
Corda states are immutable objects.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
blockchain
0
votes
1
answer
A Flow Library contains a set of ______ used for common tasks like notarizing a transaction, gathering required signatures, etc.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
___________ is the core business logic on which CorDapps run.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
Communication between nodes occur in the context of flows, and is point to point.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
________ are a set of rules that determine the execution of a transaction.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
blockchain
0
votes
1
answer
_______ include data shared between two more or more nodes in a network.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
__________ is a distributed ledger technology where data is stored in the form of blocks.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
R3 Corda is a private, permissioned blockchain.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
Every node in the R3 Corda network has the same view of the ledger.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
The Corda vision is a _______ in which all economic factors can transact with full privacy, autonomy, and security, and in an auditable manner.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
Smart Contracts in R3 Corda are written using programming languages like ______ and _____.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
0
votes
1
answer
In R3 Corda, _______ is used as a consensus mechanism.
asked
Feb 7, 2022
in
BlockChain
by
GeorgeBell
r3-corda-interview-question-answer
Page:
« prev
1
...
575
576
577
578
579
580
581
582
583
584
585
...
667
...
next »
Recent questions
...