你还在为考试焦头烂额?找我们就对了!
我们知道现在是考试月,你正在为了考试复习到焦头烂额。为了让更多留学生在备考与学习季更轻松,我们决定将Gold会员限时免费开放至2025年12月31日!原价£29.99每月,如今登录即享!无门槛领取。
助你高效冲刺备考!
题目
未知题型
A simplified version of the Bitcoin Consensus Algorithm is shown below: 1. New transactions are broadcast to all nodes 2. Each node collects new transactions into a block 3. In each round a random node gets to broadcast its block 4. Other nodes accept the block only if all transactions in it are valid (unspent, valid signatures) 5. Nodes express their acceptance of the block by including its hash in the next block they create Using this algorithm, can a user such as Alice, who really dislikes Bob, deny service to Bob by not including Bob’s transactions in any block that she proposes to get onto the blockchain?
选项
A.Alice will be able to make all other nodes deny Bob's transaction.
B.If Bob’s transaction doesn’t make it into the next block that Alice proposes, he will just wait until an honest node gets the chance to generate a block and then his transaction will get into that block.
C.Alice cannot stop Bob from broadcasting to other nodes.
D.Yes, Alice can deny Bob’s transaction.
查看解析
标准答案
Please login to view
思路分析
First, restating the scenario helps set the context: In this simplified Bitcoin-like protocol, transactions are broadcast to all nodes, blocks are proposed at random, and blocks are accepted only if all transactions are valid. Nodes indicate acceptance by including the block's hash in their next block. Now, let's evaluate each answer choice in turn.
Option 1: 'If Bob’s transaction doesn’t make it into the next block that Alice proposes, he will just wait until an honest node gets the chance to gener......Login to view full explanation登录即可查看完整答案
我们收录了全球超50000道考试原题与详细解析,现在登录,立即获得答案。
类似问题
The author points out several benefits of the proof-of-stake protocol, including: 1. Elimination of expenses related to maintaining the ledger's history. 2. Enhanced permanence of the network's regulations. 3. Raised expense for executing a brute-force assault. 4. Conservation of resources (such as energy) which is then used for coin deflation. 5. Minimal tolerance for errors. 6. Improved oversight over the communication's chain of custody. 7. Dependence on specific verification (check) points. 8. Facilitation of a concept called maximal extracted value. A. 1 & 2 are advantages. B. 3 & 4 are advantages. C. 5 & 6 are advantages. D. 7 & 8 are advantages. E. All of the above are advantages.
What is the main reason that Bitcoin has a consensus protocol?
A 51‐percent attacker is someone who controls 51 percent or more of the mining power in the Bitcoin network. Let’s say the 51 percent attacker creates an invalid block that contains an invalid transaction that represents stealing bitcoins from an existing address not belonging to the attacker and transferring them to his own address. Can the attacker subvert the consensus process? Which of the following statement(s) is/are true?
In blockchain, the longest-chain criterion is based on the idea that the blockchain data structure that comprises the least number of blocks represents the most aggregated computational effort.
更多留学生实用工具
希望你的学习变得更简单
为了让更多留学生在备考与学习季更轻松,我们决定将Gold 会员限时免费开放至2025年12月31日!