Blockchain Interview Questions and Answers | Blockchain Technology | Blockchain Tutorial | Edureka

Hello everyone this is Aryaa from
Edureka today’s video is all about blockchain interview questions so first
of all we’re going to discuss the Blockchains in the market next we are going to discuss the general blockchain questions that are asked in the
interviews and we’re also going to go through the advanced blockchain
questions so let’s begin now if you see this graph you’ll see that since 2013
and 14 the job positions on LinkedIn have increased with an upward curve all
these job postings have been across multiple job segments so if you observe
the graph the most number of job opportunities are coming up in the
technology that is the software field and the financial services and insurance
services then there are opportunities in non technical domains as well like media
industries telecommunication professional services and many more so
on an average first 2015 you’ll find blockchain has been quite a happening
place to be in because everyone is exploring proof of concepts trying to
build solutions around blockchain and that is what is driving then there are
job postings in the market now just look at the forecast going by the past trends
you see that what you see today is nothing compared to what we will see in
the next seven years so in the next seven years the number of jobs in
blockchain are going to grow by 16 times which is quite a big number so this is
an opportunity I mean I personally feel that this is the right time to be in
this field and if you see on the right side of the slide you’ll find that if
you know blockchain there are 14 jobs for you so that is quite a mismatch in
the demand and supply all right so let’s come to the next part I have divided the
interview questions into two parts namely advanced and general we’ll start
with some of the basics but important questions asks and blockchain interviews
then we move on to the more advanced interview questions so let’s get started
with the general interview questions so the most basic question is what do you
know about blockchain and the answer to that is blockchain is a decentralized
distributed database of immutable records where transactions are protected
by strong cryptographic algorithms and the network status is maintained by a
consensus algorithm now the blockchain is devised in such a way that will
access any previous transaction you have to travels from the last created block
to the whose data you want to access now the
second question is what is the principle on which blockchain technology is based
on the answer to that is basically we can see that blockchain is a subset of
distributed ledger technology so we can say that all block chains are deities
but all the LDS are not exactly block chains moving on to the next question
what are the different type of block chains that are available so basically
at high level there are three different type of block chains one is public
blockchain which is open block chains so blockchain platforms like Bitcoin
ethereum Monero all come and the public blockchains which anyone can join so if
you want to become a part of any public network you just have to download the
software and you can start running the node on your own
you don’t need to take anyone’s permission which basically makes these
networks permissionless then the next type of blockchain is private blockchain
all permissions are kept centralized to an organization private blockchains
allow only specific people in the organization to verify and add
transaction to blocks but everyone on the Internet is generally allowed to
view them some of the examples are multi chain locks tax and so on now the third
type of block chain is called consortium this is also a type of private
blockchain but this is managed by a group of individuals or by a consortium
of members only predefined set of nodes have access to write the data or block
hyper ledger is the most popular example of a consortium blockchain moving on to
the next question which is why is blockchain called a trusted approach now
the reason why blockchain is trusted is because of its immutability which means
that once a transaction is being written on to the ledger you cannot modify it
also every participant has a shared source of truth basically it distributes
trust among different individuals of the network by an economic game wherein the
individuals are incentivized to maintain the state and validate the
transactions now the next question is what type of Records can be kept on the
blockchain is there any restrictions on the same so the answer to that is there
are no restrictions as such on any kind of data that you can actually store on
the blockchain there are different companies using different types of block
chains for holding all sorts of Records some of common types that you see here
are records of medical transactions identity management transactions
processing business transactions manager activities documentation and so on so
there is ethically no limit on the kind of data
that you are pushing onto the blockchain all right the next question is
blockchain is a decentralized database how does it differ from traditional
databases so if you look at the table it says that the record in block chains are
stored in a decentralized database whereas in traditional databases the
records are centralized talking about the operations blockchain only has in
third only operations violent databases you can perform crud operations which
stands for create read update and delete since the ledger and blockchain is
distributed to the entire nodes of network the traditional databases have
more for multi master and master slave architecture then there is consensus
amongst appears for coming to an agreement on the outcome of transactions
whereas in traditional databases there is two-phase commit
also since blockchain is an open network anybody can validate the transaction
across the network whereas in traditional databases there are
integrity constraints and not everybody is allowed to validate the transactions
okay the next question is what are the key features of blockchain so the most
important feature of blocking you can see that it is a decentralized network
also and it runs by using a distributional a joke where immutability
is a very important feature wherein data cannot be modified or deleted which is
why we can say that it is a safe and secure ecosystem and the last feature is
that it has a concept of mining which is very specific to a blockchain okay so
the next question that we have is what is encryption and what is its role in
blocking so encryption is basically a way to secure the data encryption is
used when you don’t want someone else to be exposed to your data the data is
passed through some sort of cryptographic algorithm to scramble the
data in such a form that it is not readable to human beings so that data is
basically protected by the keys and only the person that the cryptographic keys
can be crypt or decode the encrypted data now this approach is really useful
in blockchain because it makes the system secure and adds to the overall
authenticity of the blocks and the blockchain any data in blockchain is
encrypted using state-of-the-art cryptography algorithms and the blocks
are linked together using the encryption techniques that is what makes it so
useful and secure ok let’s move on to the next question so the next question
says what do you mean by blocks in a blockchain technology well we said that
blockchain is a distribution ledger that contain
the list of transactions now these transactions or records are stored in
the form of blocks the blocks are necessary to maintain the order of
transactions and blockchain and each of this block is linked to each other in a
sequential form so whenever a new transaction comes in it is added to the
block this block is linked to this latest previous block and so on and so
forth now the next question is how is a block recognized in the blockchain
approach so every block in the blockchain census of a pointer which
acts as a link to the block prior to it so every blockchain has a header which
has the transaction data timestamp and also the hash of the previous block so
every block is linked to the previous block using the hash pointer okay so
moving on to the next question this should be very basic is it possible
to modify the data once it is written in a block so as we all know blockchain is
immutable so the answer is obviously no we saw earlier that transactions or
records in a blockchain can only be written in once and it
cannot be changed since all the records are secured by cryptographic algorithms
any changes in any of these records will result in the change in the hash of all
the blocks prior to it so the chain breaks so because of this it cannot be
modified because it will change the hash of the entire directory now the next
question is what are block identify us in a blockchain there are ways to
identify blocks and these are called block island files basically there are
two ways to do that every block has a block header which points to the
previous block and then we have a block height the block height is nothing but
the number of blocks in the blockchain so basically you can identify the block
with the block Hedera hash or the block height moving on to the next question is
it possible in blockchain to remove one or more blocks well this is a very easy
question and the answer is no this is not possible as removing or detaching
any block will disrupt the hash header of all the previous blocks so we just
cannot do this moving on what exactly do you know about a security of a block so
the primary method of protecting a blockchain is by using cryptography hash
algorithms and each block is linked to another using a hash pointer so any
modification and any records will change the hash identifier of the whole block
also one more thing which makes the blockchain secure is a consensus
algorithm the consensus mechanism maintains the state of
Jeanne and also acts as a network servicing protocol moving on to the next
question what are local trees and how important
are Merkle trees and blockchain so Merkle tree is also known as the hash
tree it is the data structure in blockchain in which each leaf node is a
hash of a block of data and each non leaf node is a hash of its own child
nodes multiple tree helps you identify a specific data very quickly let’s say we
have a million blocks and we quickly want to identify a transaction or block
so the Merkle helps us do it without traversing the dart history of
transaction all right let’s have a look at the diagram shown here so if you see
the Merkle tree summarizes the transactions in a block by producing a
digital fingerprint of the entire set of transactions so what do we mean by this
is that Merkle trees are created by repeating Li hashing the records
together until there is only one hash left in the diagram you can see that
there is a transaction route at every block and this transaction route is
derived from local tree and the smoky tree actually derived from hashes of
pair of transactions moving on to the next question what is the ledger and
blockchain an incorruptible ledger let’s have a look at the first part of the
question so the ledger is simply a record of transactions and these
transactions are nothing but transfer of value person a transfers some money to
person B and that becomes a transaction and such type of transactions are
recorded in a ledger now block chain is considered incorruptible and so what do
we mean by this what we mean is that you cannot hack or
corrupt the ledger simply because it is distributed and if you want to corrupt
the ledger you have to control more than half of the network’s computational
power or nodes and doing this is not an easy job because if an attacker wants to
control this and try to control the money for himself he has to invest huge
computational resources so should it happen basically if someone has control
of more than 51% computing power in a network that person would take every
precaution to avoid being noticed but the resources required to take control
of such a system is huge but it is near impossible for one person of community
to have such huge computational power all right so let’s move ahead so the
next question is name the common type of network systems that are extensively
being used in various applications so there are three types of network systems
one you have a centralized network connealy are decentralized and third a
distributed type so what happens in a centralized network is that every
participant or node in the network can talk to each other only through a
centralized node or server you can see that from the leftmost diagram if you
look at the second one it represents a decentralized Network so instead of
nodes talking to one single server you can actually group nodes such that few
of them has single centralized soul and each of these centralized servers talk
to each other now in a network like Bitcoin and etherium where we say that
it is a distributed network what happens is that every node talks in a
peer-to-peer mono there is no centralized server of any kind in the
system at all moving on to the next question how is a blockchain layer
different from the ordinary one so in a blockchain same copy of Ledger’s exists
in the entire network while in the ordinary system the ledger may or may
not be the same in blocks in you only have options to create and read whereas
in ordinary Ledger’s you can perform all CR UD options now these are some of the
basic differences between blockchain and ordinary Ledger’s moving on to the next
question and this is a very interesting one which says what do you mean by
mining so mining is the process of transaction verification and adding
those transactions to the block now how does this happen so there are special
nodes called miners which use state-of-the-art cryptographic
algorithms to validate the transaction across the network and add these
transactions to the block okay so moving on to the next question again a
distributive digital ledger is used for recording transactions on a blockchain
what does the system rely on so the answer to that is when we say that what
we are recording transactions in a distributed ledger the underlying
network is basically composed of different nodes so the system relies on
the nodes or the full nodes and the mining nodes which are responsible for
maintaining the security and smooth running of the system next question can
you explain the components of a blockchain system okay so the answer
it’s pretty simple the basic confidence in abduction ecosystem are the shared
ledger which is the digital ledger distributed among the peers and then
there is a node application which you install and run on a computer to become
a part of a particular blockchain network then there is a virtual machine
where the instructions are implemented and every participant in the ecosystem
branstad virtual machine lastly of course
there is a consensus mechanism which is implemented as a part of the node
application it provides the rule for how the ecosystem will arrive at a single
view of the ledger moving on to the next question we have state the difference
between how proof of work and proof of stakes so we have properties of proof of
work and proof of stake and proof of work the probability of mining a block
depends on the amount of work a miner does for validating the mining of a
block whereas proof of work has take holders
and B validate new blocks by utilizing their share of coins on the network next
point is that proof of work takes more energy than proof of stakes which is why
it helium is gradually shifting to the proof of stake consensus mechanism proof
of work takes up computer speed for mining blocks while in proof of stake
user needs to own a majority of coins in order to attack the network moving on to
the next question names some of the popular platforms for developing
blockchain applications so people are experimenting a lot with lakhtin
technology which is why there are so many platforms coming up for the
building of blockchain applications some of the popular platforms are aetherium
high pillage of fabric Gorda Cardno iota and Gorham so some of these networks are
public networks that also work in a private setting like aetherium
is a public network but you can also deploy it in a local setting whereas
hyper ledger fabric is completely private and permission network where it
has no concept of a coin and it is purely used in a consortium and privates
manner now moving on to the next question is what is double spending and
is it possible to double spend in a blockchain system so double spending is
a condition where one digital token is spent multiple times because it’s the
token is a digital file which can be easily copied now what happens is a
person named a try to send some coins to person B and person C at the same time
the blockchain prevents such a case since the transactions are confirmed by
multiple parties and it is not possible to double spend a crypto token in a
blockchain moving on to the next question what are the benefits of
blockchain that you know of so there are some major benefits of using blockchain
which is why blockchain has become popular in recent times
transaction settlement and blockchain happens in real time so any transaction
is peer-to-peer and the network itself verify the transaction which makes the
transaction much much faster since there are non third parties
involved the transaction cost is also minimal again the transaction and the
system is secured by strong cryptographic algorithms which in turn
accounts for the immutability then there is an important property called user
pseudonymity which means that flow of transactions are tracked by user
addresses okay guys that was the end of the general interview questions now we
will move on to the more advanced section which you might be asked to you
in your interviews regarding your blockchain carrillo so let’s dive into
them so the first question is can you tell me about some of the widely used
cryptography algorithms used in blocked in so some of the widely use algorithms
and blockchain include algorithms like Triple DES where DES stands for digital
encryption system then we also have the RSA algorithm which is used in numerous
areas concerned with digital certificates other algorithms include
two-fish Blowfish and AES out of all these algorithms AES is the strongest
encryption algorithm to break moving on to the next question we have what do you
know about foking in blockchain and name the types of foking okay so at the most
basic level a folk is what happens when a blockchain diverges into two potential
paths forwards either with regards to a network transaction history or new rule
in deciding what makes a transaction valid but folks can also be willingly
introduced into the network this occurs when developers seek to change the rules
the software uses to decide whether a transaction is valid or not
forking in each and every blockchain is different and based on the design
architecture and use case for which the chain is meant for so essentially there
are two types of foking the first kind is a soft book and this means that in
any change is backwards compatible then we have a hard folk and in this the
software upgrade that introduces a new rule to the network is incompatible with
the older software okay so the next question is explain the significance of
blind signatures and how it is useful so let’s tackle the first part of the
question force so a blind signature in cryptography is when digital signature
is generated for a certain content with the content itself being disguised or
blinded this generated blind sign can be verified against the original unblinded
messages using conventional decryption techniques the message is
blinded by the author and signed by a different party the system
is generally deployed in privacy related protocols for example electoral
processes polling campaigns digital caching systems etc so moving on to the
next question which is what is secret sharing and does it have any benefit in
blockchain technology so secret sharing also called secret splitting refers to
methods for distributing a secret amongst a group of participants each of
whom is allocated a share of the secret the secret can be reconstructed only
when a sufficient number of possibly different types of shares are combined
together individual shares are of no use on their own secret sharing essentially
allows data to be stored in a decentralized way across n parties such
that any k parties can work together to reconstruct the data but k1 parties
cannot recover any information at all N and K can be set to any values desired
all it takes is a few simple parameters tweaks in the algorithm now it has its
benefits in blockchain technology as it allows private content to be divided
into small parts and be sent to the destination on a decentralized network
so moving on to the next question which is can you explain what are off chain
transactions so off chain transactions refer to those transactions occurring on
a cryptocurrency network which moved the values outside the blockchain due to the
0 or low cost often transactions are gaining a lot of popularity especially
among large participants of chain transactions can be better understood
when compared to on chain transactions and on chain transaction which is simply
called a transaction occurs and is considered valid when the blockchain is
modified to reflect the transaction on the public ledger it involves a
transaction being validated and authenticated by a suitable number of
participants recording of the details of the transaction on the suitable block
and broadcasting the necessary information to the whole blockchain
network which makes it irreversible this kind of transaction can be reversed only
after a majority of the network’s hashing power comes to an agreement
essentially every step linked to an on chain transaction occurs on the
blockchain and the blockchain status is modified to reflect the occurrence and
validity in the transaction in contrast an option transaction takes the value
outside the blockchain it can be executed using multiple methods
okay so moving on to the next question which states what do you mean by
anonymity and pseudonymity in cryptocurrencies well an anonymity
network enables users to access the network while blocking any tracking or
tracing of their identity on the Internet this type of online anonymity
moves Internet traffic through a worldwide network of volunteer servers
anonymity networks prevent traffic analysis and network surveillance or at
least make it very very difficult a good example of this is Z cache
now let’s discuss pseudonymity so sometimes it is desired that a person
can establish a long-term relationship with some other entity without
necessarily disclosing personal identifying information to that entity
in this case it may be useful for the person to establish a unique identifier
called a pseudonym with other entities examples of pseudonyms are pen names
nicknames credit card numbers or student numbers bank account numbers etc well
for a blockchain it is mostly the block address or the account address a
pseudonym enables the other entity to link different messages from the same
person and thereby to establish a long-term relationship now let’s move on
to the next question which says how does pure discovery work in a p2p Network so
the answer to that is on a decentralized network when a node boots up it has no
idea about the network since there is no centralized resource the most practical
way would be to connect to the first discoverable node this has certain
drawbacks though as the trust and integrity of that node is completely
unknown to address this problem developers have hard-coded a list of
trusted node parties into the network when a node boots up it initially
connects to these trusted nodes and then began their node discovery process by
just connecting to the other node connected to these trusted nodes these
trusted list is a very small fraction of the entire number of systems on the
network and therefore do not hurt the decentralized aspect of the entire
system moving on to the next question which is what is a 51% attack in my
opinion this is one of the most important questions when looking at a
blockchain interview so let’s see the answer so as its name implies a
blockchain is a chain of blocks bundles of data that record
all completed transactions during a given period of time once a block is
finalized mined in the jargon it cannot be altered since a fraudulent version of
the public would quickly be spotted rejected by the
networks users however by controlling a majority of the computing power of the
network which is basically 51% Anadarko or group of attackers can interfere with
the process of recording new blocks they can prevent other miners from completing
blocks theoretically allowing them to monopolize mining of new blocks and earn
all of the rewards they can block other users transactions also they can send
transactions can reverse it making it appear as though they still had the coin
that they just spent this vulnerability known as double spending is the digital
equivalent of a perfect counterfeit and the basic cryptographic hurdle the
blockchain was built to overcome so a network that allowed for double spending
would quickly suffer a loss of confidence now moving on to the next
question which says name organisations that can use blockchain technology so
any service that follows the current centralized architecture could implement
blockchain in their business services that have any sort of online or
financial transactions could make their process seamless with the help of
blockchain nowadays with private blockchain services like hyper ledger
even confidential processes regarding government and defense could be
implemented through blockchain the possibilities are really endless and we
are just on the road of discovery moving on to the next question we have what are
the cool requirements for a business blockchain so let’s first look at what
exactly is a business blockchain so business blockchain as the name suggests
the blockchain service that can be implemented for businesses mostly
private in nature in these cases mostly a private or consortium blockchain is
used the requirements of a business block chains are as follows firstly we
need the shared ledger which is common aspect of every blockchain secondly
there needs to be privacy and permissions most businesses have certain
rules regarding content sharing amongst this organisation in this case a high
amount of privacy and permissions at different levels of the network are
required this is essentially provided by a consortium blockchain thirdly we need
smart contracts the business always needs to implement business logic on the
blockchain and the only way to do this currently is with the implementation of
smart contracts on the system last but not least we need the consensus
algorithm just like every blockchain a consensus protocol is obviously required
for the validation of blocks into the new chain now moving on to the next
quest what are the key principles in
blockchain that are helpful in eliminating the security threats that
needs to be followed okay so there are a few principles to be followed for
eliminating proper security threats but this is not specific to blockchain as
they can be applied to any general networks so firstly we need to have a
proper auditing process secondly applications must be secured with proper
role based access control system and there should be proper testing of every
unit and the integration also next the database that is distributed ledger in
this case must be secured and encrypted using up-to-date encryption functions
also there should be sufficient continuity planning and there must be
amply training of the workforce to follow these best practices okay so
moving on to the next question which is is the blockchain different from banking
Ledger’s okay so banking uses Ledger’s for time
stamps and transaction records just like a blockchain but the main difference
lies is in the fact that Bank Ledger’s are not public they’re controlled by
centralized authorities that is a bank unlike a blockchain which is completely
public and open source moving on to the next question can you list some of the
popular consensus algorithms and why do we need different consensus mechanisms
okay so some of the most popular consensus mechanisms are pbft which
stands for practical Byzantine fault tolerance proof of work proof of stake
then there’s also proof of Bourne delegated proof of stake and proof of
elapsed time now we need different consensus mechanisms mostly to cater to
different business models also new consensus mostly provide an optimization
in terms of storage and performance other things can also be implemented
like regularization requirements implementation performance tokenization
security privacy etc so moving on to the next question is is there any network
specific conditions for using blockchain technology in an organization so the
only basic requirements for a network to implement blockchain is that it must be
a p2p Network it helps validate the new block simply and helps organisations to
keep up the pace in this matter without investing in third party applications
moving on to the next question name the steps are involved in the blockchain
project implementations well there are a total of six steps involved in this
process firstly we need to decide if we can use an existing blockchain for our
purposes for this we need to do some requirement
after the requirement identification has been done we need to screen all the
ideas that have been come up while brainstorming was being done next we
actually take the idea that has been chosen and implemented through a some
successful project development cycle next we have to do some feasible study
on the security and implementation last but not the least we have to also take
care of controlling and monitoring the project so these are the six simple
steps that you need to follow when deploying your brockton project moving
on explain a real-life use case where blockchain is being used so this is very
easy I have an example in front of you which is store G so store J is an open
source decentralized file storage solution it uses encryption file
sharding and a blockchain based hash table to store files on a peer-to-peer
network the goal is to make cloud file storage faster cheaper and private
traditionally cloud storage solutions like Dropbox or Google Drive have
limitations while files are backed up redundantly bandwidth from a data center
or unexpected outages can restrict access to your files there are also
issues of privacy and these companies have complete control over your files
including the ability to access them the storage app project uses blockchain and
peer-to-peer network to solve these problems it distributes the files so
redundancy is well established it also guarantees your only one who can access
your files now moving on to the next questions which is what are side chains
so a side chain is a separate blockchain that is attached to its parent
blockchain using a two-way peg the two-way peg enables interchangeability
of assets at a predetermined rate between the parent blockchain and the
sidechain the original blockchain is usually referred to as a main chain and
all additional block chains are referred to the side chain the blockchain
platform ardor refers to its side chains as child James a user on the parent
chain first has to send their coins to an output address but the coins become
locked so the user is unable to spend them elsewhere once the transaction has
been completed a confirmation is communicated across the chains following
by a waiting period for extra security after waiting the period the equivalent
number of coins is released on the side chain
allowing the user to access and spend them there the reverse happens when
moving back from a side chain to the main chain now moving on to the next
question is can you name one major limitation of blockchain so
everyone knows cryptocurrencies has had a fantastic year in 2017 but now with
more tokens users investors exchanges and startups involved than ever
scalability is emerging as a serious issue with transaction data piling up
the current system is bringing to strain under its own weight
with every purchase the blockchain adds one more block to its ladder of
transactions and every block increases with data as it carries the history of
the block before it as more users join the network and transaction histories of
individual coins grow the current system is in danger of buckling so as we see
scalability is basically the major issue in block chains today now moving on to
the next questions are there any alternatives to blockchain so yeah there
are actually alternatives to blockchain hash graph is a new consensus
alternative to blockchain it uses a gossip protocol that works in the
following manner every node in hash graphs can spread signed information
called events or newly created transactions and transactions received
from others to its randomly chosen neighbors these neighbors will aggregate
received events with information received from other nodes into a new
event and then send it on to a other randomly chosen label this process
continues until all the nodes are aware of information created or received at
the beginning user the rapid convergence property of gossip protocol every piece
of new information can reach each node in the network in a fast and very easy
manner okay now moving on to the next questions do you know the means to scale
a blockchain technology well the first method to actually scale a blockchain
technology is a lightning Network now this was proposed to a solution to
Bitcoin scalability so what it does is implement off chain transactions which
means basically not the entire list of transactions happen on some main chain
only the first transaction may happen on the chain then all the following
transactions happen on the side chain which takes less of work and less of
space and that the final transaction is again updated maintain maintaining the
integrity of the bet work well this is a skewed approach it kind of works in
today’s world next we have seg width which stands for segregated witness so
in seg with the signature data we’ll move on from the main chain to the
extended block in the parallel chain what this will do is that it will free
a lot of space in the block itself for more transaction it was envisioned that
the signature data would be arranged in the form of a Merkel tree in the side
chain the Merkel route of the transaction was placed in the block
along with the coinbase transactions however on doing this developers
stumbled upon something unexpected they discovered that on putting the Merkel
route in the particular place they somehow increase the overall dock size
without actually increasing the block size limit after that we have another
practical approach which is increasing the block size so with increasing
transactions the possible solution is to actually increase the block size to just
accommodate more transactions but in my opinion that’s just a lazy approach
lastly we have sharding now sharding is a scaling technique that was inspired by
a traditional concept of databases sharding whereby a database is
partitioned into several pieces and pasted on different servers in the
context of a public blockchain the transaction load on the network would be
divided into different shards comprising different nodes on the network as a
consequence each node would process only a fraction of incoming transactions and
it would do so in parallel with other nodes on the network breaking the
network into shards would result in more transactions being processed and
verified simultaneously as a result it becomes possible to process more and
more transactions as a network rose this property is also referred to as
horizontal scaling now we could imagine that existing blockchain operates like a
busy highway with one toll station operating only on one toll booth the
result would be a traffic jam as people wait in long lines to pass the toll
station implementing a sharding based blockchain is like adding fifteen or
twenty toll booths to the highway it would dramatically improve the rate at
which traffic can progress through the station’s sharding would make a
tremendous amount of difference and dramatically improve transactions beeps
so moving on to the last question of the session for today we have with dogshit
came the web 3.0 can you name some of the decentralized blockchain based
application that would bring about the next level of the Internet so the answer
to that is you could name some of the applications that have been actually
implemented through blockchain for example browsers like chrome have been
implemented in a decentralized manner called a brave browser then we have
storage file systems like storge and ipfs we have operating systems like
essentia and gos and social networks like Steam a–the so as you guys can see
there are lot of blockchain based applications
that are actually replacing all the currently centralized services so yes
indeed we can actually call the internet run on
blockchain the web 3.0 so guys that was the end of all the blockchain based
questions that you might face during your interviews I wish you the best of
luck all the interviews that you might be appearing for that’s it from me
goodbye I hope you have enjoyed listening to this video please be kind
enough to like it and you can comment any of your doubts and queries and we
will reply them at the earliest do look out for more videos in our playlist and
subscribe to Eddie Rica channel to learn more happy learning

, , , , , , , , , , , , , , , , ,

Post navigation

8 thoughts on “Blockchain Interview Questions and Answers | Blockchain Technology | Blockchain Tutorial | Edureka

  1. Got a question on the topic? Please share it in the comment section below and our experts will answer it for you. For Edureka Blockchain Certification Training Curriculum, Visit our Website:

Leave a Reply

Your email address will not be published. Required fields are marked *