quiz Informatique · 22 questions

Fundamentals of Blockchain and Smart Contracts

help_outline 22 questions
timer ~11 min
auto_awesome AI-generated
0 / 22
Score : 0%
1

Which property of a blockchain ensures that every participant can view the entire transaction history since its inception?

2

In a proof‑of‑work system, what must a miner achieve before a new block can be added to the chain?

3

Which consensus mechanism selects validators proportionally to the amount of cryptocurrency they hold?

4

What is the main security guarantee provided by cryptographic hash functions in a blockchain?

5

In a public blockchain, who is allowed to become a block validator?

6

Why is a 51 % attack considered practically infeasible on a well‑distributed blockchain?

7

Which type of blockchain would be most appropriate for a consortium of competing logistics companies sharing shipment data?

8

What is the primary advantage of a smart contract over a traditional legal contract in a blockchain context?

9

If a transaction is signed with a private key, which key can be used by other network participants to verify its authenticity?

10

Which of the following best describes the role of a ‘validator’ in a proof‑of‑authority blockchain?

11

In the context of blockchain, what does ‘immutability’ refer to?

12

Why would a blockchain be unsuitable for a scenario where a single trusted entity already controls all data exchanges?

13

When a miner includes transactions in a new block, which piece of information links this block to its predecessor?

14

Which of the following statements about peer‑to‑peer (P2P) networks is FALSE?

15

In a blockchain‑based supply‑chain traceability system, which technology is commonly combined with the ledger to provide real‑time product status?

16

What is the main reason that a smart contract bug cannot be fixed after deployment?

17

Which consensus algorithm is most suitable for a blockchain with a small, known set of validators that require fast transaction finality?

18

During the creation of a new block, what determines the 'difficulty' parameter in a proof‑of‑work blockchain like Bitcoin?

19

Which of the following best explains why a blockchain transaction must be signed by the sender’s private key?

20

In a blockchain consortium, how is governance typically established among the participating organizations?

21

What is the primary function of a hash pointer in a blockchain block header?

22

Why does a blockchain require at least 51 % honest nodes to maintain security?

menu_book

Fundamentals of Blockchain and Smart Contracts

Review key concepts before taking the quiz

Fundamentals of Blockchain and Smart Contracts

Blockchain technology has become a cornerstone of modern decentralized systems. Understanding its core concepts—such as transparency, consensus mechanisms, cryptographic security, and the role of smart contracts—is essential for anyone interested in the future of finance, supply chain, or digital identity. This course breaks down the key ideas tested in a typical introductory quiz, providing clear explanations, real‑world examples, and practical tips for retention.

Transparency and Immutability in a Blockchain

One of the most celebrated properties of a blockchain is its transparency. Every participant can view the complete transaction history from the very first block, often referred to as the genesis block. This openness does not mean that personal data is exposed; rather, the ledger records cryptographic hashes of transactions, allowing anyone to verify that the data has not been altered.

  • Transparency enables auditability and trust without a central authority.
  • Immutability ensures that once a block is added, its contents cannot be changed without detection.
  • Both properties together create a tamper‑evident system that is ideal for public and consortium networks.

Proof‑of‑Work: The Original Consensus Mechanism

In a proof‑of‑work (PoW) system, miners compete to solve a computational puzzle. The puzzle requires finding a hash value that meets a predefined difficulty target—typically a hash that begins with a certain number of leading zeros. The first miner to discover such a hash broadcasts the new block to the network, and other nodes verify the solution before appending the block to their copy of the chain.

This process serves two critical purposes:

  • It secures the network by making it costly to rewrite history.
  • It fairly distributes new cryptocurrency tokens to participants who contribute computational power.

Because the puzzle is deliberately hard to solve but easy to verify, PoW provides a robust defense against malicious actors, albeit at the expense of high energy consumption.

Proof‑of‑Stake: Selecting Validators by Economic Weight

Proof‑of‑Stake (PoS) replaces computational effort with economic stake. Validators are chosen proportionally to the amount of cryptocurrency they lock up as collateral. The more tokens a validator holds, the higher the probability they will be selected to propose the next block.

Key advantages of PoS include:

  • Significant reduction in energy usage compared to PoW.
  • Faster block finality, which improves transaction throughput.
  • Economic penalties (slashing) that discourage dishonest behavior.

PoS is the foundation of many newer blockchains, such as Ethereum 2.0, Cardano, and Polkadot.

Cryptographic Hash Functions: The Security Backbone

Cryptographic hash functions provide the primary security guarantee in a blockchain. Their essential property is that any alteration of input data changes the hash output dramatically. This avalanche effect makes it virtually impossible to tamper with a block without changing its hash, which would immediately break the chain’s continuity.

Below is a concise summary of the most important points, adapted from a quiz explanation:

Résumé des points clés
  • Les fonctions de hachage cryptographique assurent l’intégrité des données.
  • Un petit changement dans l’entrée modifie de façon imprévisible le hachage produit.
  • Cette propriété rend toute altération détectable dans une blockchain.
Comment s'en souvenir
  • Mnémotechnique : « Hash = Hache », comme une hache qui coupe tout ce qui touche le bloc.
  • Conseil : Imaginez que chaque bloc est scellé avec une hache ; si vous essayez de le modifier, la hache le brise et le hachage change immédiatement.

Public Blockchains and Open Validation

In a public blockchain, anyone who meets the protocol’s technical requirements can become a validator (or miner, depending on the consensus model). This openness is a hallmark of decentralization, ensuring that no single entity can control the network. Validators must run the full node software, maintain sufficient hardware, and, in PoS systems, stake the required amount of tokens.

Because participation is permissionless, the network benefits from a diverse set of actors, which enhances security and resilience.

51 % Attacks: Why They Are Rare on Well‑Distributed Networks

A 51 % attack occurs when an adversary controls more than half of the network’s mining (PoW) or staking (PoS) power. With this majority, the attacker could rewrite recent blocks, double‑spend coins, or censor transactions. However, achieving such dominance on a well‑distributed blockchain is practically infeasible for several reasons:

  • The required computational or economic resources are astronomically high.
  • Acquiring more than half of the total hash rate or stake would likely drive the cryptocurrency’s price up, making the attack even more costly.
  • Even if an attacker succeeded, the resulting loss of trust would cause the token’s value to collapse, negating any financial gain.

Consortium Blockchains: Tailored for Collaborative Industries

When multiple competing organizations need to share data securely, a consortium blockchain offers the ideal balance between privacy and decentralization. Unlike public blockchains, access is restricted to a pre‑approved group of participants, yet the ledger remains immutable and auditable.

Use cases include:

  • Logistics companies exchanging shipment status and customs documents.
  • Banking consortia settling inter‑bank payments.
  • Healthcare networks sharing patient records while complying with regulations.

Because the participants are known and vetted, consensus can be reached faster using algorithms such as Practical Byzantine Fault Tolerance (PBFT) or Raft.

Smart Contracts: Automation Without Intermediaries

A smart contract is a self‑executing piece of code stored on the blockchain. Its primary advantage over traditional legal contracts is automatic execution without a trusted third party. Once predefined conditions are met, the contract triggers the agreed‑upon actions—such as transferring tokens, updating a state, or invoking another contract.

Key benefits include:

  • Reduced transaction costs by eliminating intermediaries.
  • Instantaneous settlement, which improves efficiency.
  • Transparency and auditability, as the contract code is visible to all network participants.

While smart contracts are powerful, they are immutable after deployment, so thorough testing and formal verification are crucial to avoid costly bugs.

Summary and Further Learning

By mastering the concepts covered in this course—transparency, consensus mechanisms (PoW and PoS), cryptographic hashing, validator roles, 51 % attack resistance, consortium blockchains, and smart contracts—you will be well‑prepared to navigate the rapidly evolving blockchain ecosystem. To deepen your knowledge, consider exploring:

  • Technical whitepapers of leading blockchains (Bitcoin, Ethereum, Hyperledger Fabric).
  • Hands‑on labs that deploy smart contracts using Solidity or Rust.
  • Security audits that focus on hash function vulnerabilities and consensus attacks.

Stay curious, keep experimenting, and remember the mnemonic: "Hash = Hache"—the hash protects the block just like an axe protects a tree from unwanted changes.

Stop highlighting.
Start learning.

Join students who have already generated over 50,000 quizzes on Quizly. It's free to get started.