• 2
    Replies
  • Difficulty - Medium
    Total Plays - 26
    Allowed Time - 10 sec
    Best time - 1.663 sec

    How do fashion brands use NFTs?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    They link physical goods to NFTs. This proves ownership and authenticity.
  • #A
    #B
    #C
    #D
    Explanation:
    Whitelists let selected users mint first. It rewards loyal fans and avoids gas spikes.
  • Difficulty - Medium
    Total Plays - 26
    Allowed Time - 10 sec
    Best time - 1.631 sec

    What is a token standard?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    A token standard, like ERC-20, defines rules for creating tokens on a blockchain. It ensures compatibility for cross-chain transfers and DeFi applications.
  • 5
    Replies
  • 4
    Replies
  • Difficulty - Medium
    Total Plays - 32
    Allowed Time - 10 sec
    Best time - 1.466 sec

    Which is a risk of using oracles?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    Centralized oracles can be a single point of failure. If they provide false data, contracts relying on them can be exploited.
  • #A
    #B
    #C
    #D
    Explanation:
    Royalties ensure creators earn money each time their NFT is resold. This gives artists ongoing income.
  • #A
    #B
    #C
    #D
    Explanation:
    Decentraland is a virtual world where users buy land and items as NFTs. It blends gaming and digital ownership.
  • #A
    #B
    #C
    #D
    Explanation:
    Rust’s async programming, with crates like Tokio, enables high-throughput transaction processing in blockchain nodes. It supports concurrent handling of network requests and validations.
  • #A
    #B
    #C
    #D
    Explanation:
    Many people co-own one NFT. This makes pricey NFTs affordable.
  • #A
    #B
    #C
    #D
    Explanation:
    In an Eclipse attack, an attacker isolates a node from the network, feeding it false data. This can lead to incorrect transaction processing or vulnerability to double spending.
  • 3
    Replies
  • 4
    Replies
  • 2
    Replies
Home Channels Search Login Register