Carlos Amaya Hands-On Project 6-6 Blockchain Tutorial
.docx
keyboard_arrow_up
School
Ivy Tech Community College, Indianapolis *
*We aren’t endorsed by this school
Course
105
Subject
Computer Science
Date
Apr 27, 2024
Type
docx
Pages
1
Uploaded by ChiefWrenMaster426 on coursehero.com
Carlos Amaya
Ivy Tech Community College
CSIA 105
2/4/2024
Hands-On Project 6-6: Blockchain Tutorial
5. Now change the 1 to 2. What happens to the hash?
The hash gave out different sorts of code or encryption.
7. What new fields have been added?
I don’t think there have been any new fields.
8. Click 4. Blockchain. Scroll to the right to see all the blocks in the chain. Look at the Prev: for Block #5. Compare that with the Hash: of Block #4. Are they identical? Why?
As far as I can’t tell, yes, they are similar. A hash pointer is like a pointer, but instead of only storing the position of the preceding block, it also saves the hash of the data contained within it.
10. Return to Block #5. Enter This is data set 5. What happens to the color of the block? Why is this block
now invalid?
Color changes from default Because the entry was valid.
11. Go to Block #4. Enter This is data set 4. What happens to the color of Blocks #4 and #5? Why?
The color changed; I am assuming because it went back to its original form.
13. Return to Block #3. Enter This is data set 3. What happens to Block #3, #4, and #5? Why? How does this illustrate that the blockchain resists change?
Each block's hash is calculated using the data stored inside it as well as the previous block's hash.
14. In Block #3 click Mine. What happens to the color of this block?
It has changed color once again.
17. If you were to make a change to Block #5, on which block must you click Mine to correct it? If you were to make a change to Block #3, on which blocks must you click Mine? Why the difference?
I think it is for security reasons. To achieve data security, blockchains rely significantly on encryption.
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Procedure:
1. Create a folder named LastName_FirstName in your local drive. (ex. Reyes_Mark)
2. Using NetBeans, create a Java project named StudentList. Set the project location to your own
folder.
3. Import Scanner, Map, and HashMap from the java.util package.
4. Create an empty hash map named students.
5. The output shall:
5.1. Ask three (3) of your classmates to enter their student number (key) and first name (value).
5.2. Display the keys and values of the map.
5.3. Delete the mapping of the third entry.
5.4. Enter your student number and first name. This would be the new third entry.
5.5. Display the entries in separate lines.
6. Create a Python script that meets the same specifications. Feel free to use lists to store input.
7. Save the script as student_list.py to your folder.
Sample output:
Enter student number 1: 2018-0004
Enter first name 1: Mark
Enter student number 2: 2018-0017
Enter first name 2: Nika
Enter student number 3: 2018-0134
Enter first name 3: Mairo
Student…
arrow_forward
Procedure:
1. Create a folder named LastName_FirstName in your local drive. (ex. Reyes_Mark)
2. Using NetBeans, create a Java project named StudentList. Set the project location to your own
folder.
3. Import Scanner, Map, and HashMap from the java.util package.
4. Create an empty hash map named students.
5. The output shall:
5.1. Ask three (3) of your classmates to enter their student number (key) and first name (value).
5.2. Display the keys and values of the map.
5.3. Delete the mapping of the third entry.
5.4. Enter your student number and first name. This would be the new third entry.
5.5. Display the entries in separate lines.
6. Create a Python script that meets the same specifications. Feel free to use lists to store input.
7. Save the script as student_list.py to your folder.
Sample output:
Enter student number 1: 2018-0004
Enter first name 1: Mark
Enter student number 2: 2018-0017
Enter first name 2: Nika
Enter student number 3: 2018-0134
Enter first name 3: Mairo
Student…
arrow_forward
What is the difference between clc and clear commands?
B I
A-
CLC: Clear the contents of the command window without any effect on all variables in the working
environment
Clear: Clear all variables from the workspace
D (丁欣朔)
11:44:57
Create a matrix 20 by 20. Fill it in the following way. Each matrix entry in the intersection of two
middle rows and two middle columns should be assigned number 10, and all other matrix entries
should be assigned number 5.
A- BI
A=10*ones(20,20) - 5*eye(20,20)-5fliplr(eye(20,20))
arrow_forward
variants/3212612/take/5/
CATEGORY
Sort the items into whether they are benefits or risks of a search engine keeping a record
of your search history.
To place a category, press the item in the answer box, then press the box under the corre-
sponding category.
benefits
Add an answer item!
Answer Bank
risks
Add an answer item!
You can refer back to information you read earlier.
You can see which search result links you have not yet pressed.
A friend may see an embarrassing web search.
A family member may see an ad for a gift you secretly bought for them.
A related search will auto-complete so you do not need to type the whole thing.
Someone with access to search cata could create a scam related to your interests.
arrow_forward
There are three examples of when the main key of a link needs to be replaced with a replacement key.
arrow_forward
hi I was just wondering if there is a different way instead of using Hash because I don't believe we learned that just yet. thank you!
arrow_forward
Please do not give solution in image format thanku
Finish the PHP code below to connect to a database with the given server, database name, username, and password, using PDO (object-oriented).
$connString = "mysql:host=localhost; dbname=webprogram";
$user = "instructor";
$pass = "mypassword";
$pdo = ______________ ;
arrow_forward
You have 10 billion URLs. How do you detect the duplicate documents? In thiscase, assume "duplicate" means that the URLs are identical.
arrow_forward
Which of the following statements are true and which are false? Add circles around the selected
answers. Note that each wrong answer cancels a correct one.
1. A hub contains more advanced features than a switch.
True False
2. The last node of a circular linked list contains pointer to the null.
True False
3. The physical topology describes the communication mechanism used by devices for the
transmission of the data.
True False
4. In CSMA CD, collision is avoided by checking whether the transmission media is busy or
not.
True False
5. A peer-to-peer network is more expensive than a client/server one.
True False
6. In bus topology, a failure in one node will not have any effect on other nodes.
True False
7. The most common access method of the ring topology is token passing.
True False
8. One of the disadvantages of star topology is a central point of failure.
True False
9. Tree topology combines the characteristics of bus topology and star topology.
True False
10. A walkie-talkie is an…
arrow_forward
Q3: Jami is an intern on a sales team at a large insurance company. On the first day of the internship, Jami is asked to download a list of all of her friends and contacts from Facebook and upload them to the company database. The team lead explains "This database keeps track of all of our employees, and well as their customers and prospects. This makes it really easy to avoid redundant customer interactions, and also keeps us from cannibalizing customers and business from one another." Jami is wondering if there are ethical issues she should be concerned about. Do you think there are ethical issues involved with this situation? If yes- what are those issues, specifically, and how would you advise Jami?
arrow_forward
Please solve this problem. Using react.js, create a inventory page as follows below. There will be submit button, after click submit button it will show back, edit, delete button. For better uderstanding show the screenshort of the code(Folder name also, I want to see which folder I have to create and write) and output.
• Inventory: • Name • Storage Type • Max Item Capacity
Resources: • Resource Name • Resource Type • Max Number of Resources • Current Number of Resources
arrow_forward
q3B-
Bob has set up a website to collect donations for his new sponge. Alice has decided to donate money to Bob’s sponge and submitted a transaction with her financial details and a donation sum of $10. The financial transaction has been altered before reaching it to the server, and the donation sum was changed to $100.
Q- Which CIA element(s) was/were targeted by the threat and why do you think so?
arrow_forward
In your initial post, describe the function of hashing tools you can use to verify that two files are identical. For example, you can compare the hash value of a file on a website with the hash value of that file after you download it. If the hash values match, you downloaded the unmodified version of the website file. Research and discuss at least two examples other than the one provided.
arrow_forward
How can you erase data that your JavaScript commands have stored in local storage?
a.
No action is necessary; this data will be erased automatically when the user closes the browser window or tab.
b.
Call thedrop()method on thelocalStorageobject, passing in the index for thekey: valuepair you want to remove.
c.
Call theremoveItem()method on thelocalStorageobject, passing in the key for the data item you want to remove.
d.
Call thedelete()method on thelocalStorageobject with no arguments.
arrow_forward
2- What is padding sizer
06: If the password contains 3 different lowercase letters and its hash is "00b03726ba42c3aeaf53df65552eff92" based on MD5. Find the original password.
arrow_forward
Make a php web page that uses a cookie to keep track of how many times a uses has viewd the page. The first time a particular user looks at the page, it should print something like "Number of views: 1." The second time the user looks at the page, it should print "Number of views: 2", and so on. Also, it prints out a special message on the 5th, 10th and 15th time the user looks at the page. And modify it so that on the 20th time the user looks at the page, it deletes the cookie and the page count starts over.
arrow_forward
Computer science In MS Excel, what does it mean when a cell is populated with hashtags?
arrow_forward
Use pandas library on python to solve the following problems :1. Load titanic.csv dataset. (how can I upload it ??)2. Print the first 10 rows of the titanic dataset.3. Print the total number of titanic passengers.4. Print the number of passengers who survived.5. Print the name of passengers that survived and age 50 and above.6. Is there any null values in the dataset? If yes, which attribute?
arrow_forward
&. What is the different between tiers and layers? Do the layers maps to
tiers on a one-to-one base?
arrow_forward
Create a webpage A2-Task2.html.
The webpage is displaying one image. Each time the user moves the mouse out of the image, the image is
changed to another one and one more 'sun' emoji is displayed under the image. When the number of 'suns'
reaches seven (7), all 'suns are deleted (reset) and start to be displayed again. For example, the 8th time user
moves the mouse out of the image, one 'sun' is shown, the 9th time - two 'suns', and so on.
Note:
- You should use two images. Each time the user moves the mouse out of the image, the image is changing. If
an image of "Winter" is displayed it will change to "Summer", and opposite, if an image of "Summer" is
displayed it will change to "Winter".
The special character code for the 'sun' is "☀".
Put the source code of your website A2-Task2.html here.
Make sure you also upload the A2-Task2.zip of all files below.
arrow_forward
Create struct HashNode and class HashTable that will be used to store students' data. For each student,
it'll store the ID (string) as the key, and the first name (string), last name (string), and email (string) as
the value. You can imagine a single HashNode as follows:
"123456789"
"Jessica"
"Wolf"
"abcdef@bartleby.com"
HashTable should have the following attributes and methods:
Attributes
1. The dynamic array that stores the data.
2. The number of elements currently stored.
3. The maximum number of elements the container can store.
Methods
1. Constructor that takes from the user the maximum size of the container.
2. void insert(string ID, string firstName, string lastName, string email): uses the
following hash function h2(h1(ID)) to map the key to a specific index in the table:
• h1(ID):
ww
IDLength -1
Σ
ID
• h2(K) -> [0, N-1], where N is the table size
In case the index that the hash function generated was already full, the insert
function should add the student information in a…
arrow_forward
Suppose you’re developing an application which stores a user’s browser history. Explain which collection class will help to retrieve information of the last visited page?
arrow_forward
JavaScript triggers? It has a "onclick" function.
arrow_forward
JAVA PROGRAMMING
1. Create a folder named LastName_FirstName in your local drive. (ex. Reyes_Mark)
2. Using NetBeans, create a Java project named BirthMonth. Set the project location to your ownfolder.
3. Import Scanner, Set, HashSet, and Collections from the java.util package.
4. Create empty hash sets named group1, group2, and self.
5. The output shall:
Ask six (6) of your classmates to enter their birth month. The first three (3) values shall be addedto the group1 set and the remaining to group2.
Display the values entered by each group.
Ask you to type your birth month, which is to be stored to the set named self.
Show the union, intersection, and difference based on the two (2) groups.
Display a message to tell whether you have the same birth month with any of your classmates.
arrow_forward
ANSWER TO BE SUBMITTED:
SOURCE CODE
AND NO.6-10
1: Create a new class with attributes name and address. Both data type will be String. Create a constructor and assign the parameters to the attributes. Now override the toString() method. Is this possible?
2: Create a class with the main method and create an instance of the class that you created in Test Stem 1. What method can you call to get the hashCode of your class?
3: What is the return type of the hash code ?
4: Create an instance of the string in your test class and assign a value. Which of the following operators can be used in conjunction with a string object?
+
-
&
.
+=
5: Supposed that we have a string with a value “This is my string.”. Which method can be used to extract a specific word from the given string?
6: Supposed that we have a string with a value “This is my string.”. Which expression can be used to extract the word “my” from the given string?
7: Now create an String and assign a value with spaces…
arrow_forward
I need an answer as soon as possible, but i need only unique answer. If I find you copied then I will give multiple dislikes. I have only the last question to post.
arrow_forward
The compareTo method. First you compare this.ticker which is a String, then if they are the same then you compare by the this.purchasePrice which is a double
hashCode
public int hashCode()
The hashCode method using the Code-> Generate equals and hashCode with no changes
Overrides:
hashCode in class Object
Returns:
int Representing the hashCode
compareTo
public int compareTo(Stock another)
The compareTo method not auto generated Compares first by ticker and if the tickers are the same secondarily compares by price
Specified by:
compareTo" in interface Comparable<stock>
Parameters:
another - the object to be compared.
Returns:
int Representing order
Throws:
IllegalArgumentException"- if another is null.
arrow_forward
Consider that you are developing an application that will keep users' browsing
histories. Indicate which collection class will be useful when trying to get
information from the most recent page visited.
arrow_forward
How many rows can be added to a table by executing the INSERT INTO … VALUEScommand?a. 1b. 2c. 3d. unlimited
arrow_forward
Consider the following fictitious URL: http://www.acme.com/products/info.html. What does each part of this URL (separated by slashes) specify?
arrow_forward
Create a website for searching information regarding plants using Node JS and Mongo DB.
The user should be able to search the plants using their local name or scientific name. The plant details with names in different local languages, scientific names, pictures of the tree/plant and its flowers are
displayed. The website also should support search based on partial scientific or common name and all the plant names that match the result should be displayed as a hyperlink and on clicking the hyperlink the
entire details of the plant should be displayed. The website also should provide search based on different types of plants such as flowering plants, vegetable/fruit plants trees, ornamental, medicinal or any
other types. If the user clicks on search without clicking any of the buttons, they display all the plant details as an HTML table.
arrow_forward
True or False:
We can use BLOG term in 110 blocks to remember the wire order, and remember to start with the white striped
wire first.
Select one:
O True
O False
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage
Related Questions
- Procedure: 1. Create a folder named LastName_FirstName in your local drive. (ex. Reyes_Mark) 2. Using NetBeans, create a Java project named StudentList. Set the project location to your own folder. 3. Import Scanner, Map, and HashMap from the java.util package. 4. Create an empty hash map named students. 5. The output shall: 5.1. Ask three (3) of your classmates to enter their student number (key) and first name (value). 5.2. Display the keys and values of the map. 5.3. Delete the mapping of the third entry. 5.4. Enter your student number and first name. This would be the new third entry. 5.5. Display the entries in separate lines. 6. Create a Python script that meets the same specifications. Feel free to use lists to store input. 7. Save the script as student_list.py to your folder. Sample output: Enter student number 1: 2018-0004 Enter first name 1: Mark Enter student number 2: 2018-0017 Enter first name 2: Nika Enter student number 3: 2018-0134 Enter first name 3: Mairo Student…arrow_forwardProcedure: 1. Create a folder named LastName_FirstName in your local drive. (ex. Reyes_Mark) 2. Using NetBeans, create a Java project named StudentList. Set the project location to your own folder. 3. Import Scanner, Map, and HashMap from the java.util package. 4. Create an empty hash map named students. 5. The output shall: 5.1. Ask three (3) of your classmates to enter their student number (key) and first name (value). 5.2. Display the keys and values of the map. 5.3. Delete the mapping of the third entry. 5.4. Enter your student number and first name. This would be the new third entry. 5.5. Display the entries in separate lines. 6. Create a Python script that meets the same specifications. Feel free to use lists to store input. 7. Save the script as student_list.py to your folder. Sample output: Enter student number 1: 2018-0004 Enter first name 1: Mark Enter student number 2: 2018-0017 Enter first name 2: Nika Enter student number 3: 2018-0134 Enter first name 3: Mairo Student…arrow_forwardWhat is the difference between clc and clear commands? B I A- CLC: Clear the contents of the command window without any effect on all variables in the working environment Clear: Clear all variables from the workspace D (丁欣朔) 11:44:57 Create a matrix 20 by 20. Fill it in the following way. Each matrix entry in the intersection of two middle rows and two middle columns should be assigned number 10, and all other matrix entries should be assigned number 5. A- BI A=10*ones(20,20) - 5*eye(20,20)-5fliplr(eye(20,20))arrow_forward
- variants/3212612/take/5/ CATEGORY Sort the items into whether they are benefits or risks of a search engine keeping a record of your search history. To place a category, press the item in the answer box, then press the box under the corre- sponding category. benefits Add an answer item! Answer Bank risks Add an answer item! You can refer back to information you read earlier. You can see which search result links you have not yet pressed. A friend may see an embarrassing web search. A family member may see an ad for a gift you secretly bought for them. A related search will auto-complete so you do not need to type the whole thing. Someone with access to search cata could create a scam related to your interests.arrow_forwardThere are three examples of when the main key of a link needs to be replaced with a replacement key.arrow_forwardhi I was just wondering if there is a different way instead of using Hash because I don't believe we learned that just yet. thank you!arrow_forward
- Please do not give solution in image format thanku Finish the PHP code below to connect to a database with the given server, database name, username, and password, using PDO (object-oriented). $connString = "mysql:host=localhost; dbname=webprogram"; $user = "instructor"; $pass = "mypassword"; $pdo = ______________ ;arrow_forwardYou have 10 billion URLs. How do you detect the duplicate documents? In thiscase, assume "duplicate" means that the URLs are identical.arrow_forwardWhich of the following statements are true and which are false? Add circles around the selected answers. Note that each wrong answer cancels a correct one. 1. A hub contains more advanced features than a switch. True False 2. The last node of a circular linked list contains pointer to the null. True False 3. The physical topology describes the communication mechanism used by devices for the transmission of the data. True False 4. In CSMA CD, collision is avoided by checking whether the transmission media is busy or not. True False 5. A peer-to-peer network is more expensive than a client/server one. True False 6. In bus topology, a failure in one node will not have any effect on other nodes. True False 7. The most common access method of the ring topology is token passing. True False 8. One of the disadvantages of star topology is a central point of failure. True False 9. Tree topology combines the characteristics of bus topology and star topology. True False 10. A walkie-talkie is an…arrow_forward
- Q3: Jami is an intern on a sales team at a large insurance company. On the first day of the internship, Jami is asked to download a list of all of her friends and contacts from Facebook and upload them to the company database. The team lead explains "This database keeps track of all of our employees, and well as their customers and prospects. This makes it really easy to avoid redundant customer interactions, and also keeps us from cannibalizing customers and business from one another." Jami is wondering if there are ethical issues she should be concerned about. Do you think there are ethical issues involved with this situation? If yes- what are those issues, specifically, and how would you advise Jami?arrow_forwardPlease solve this problem. Using react.js, create a inventory page as follows below. There will be submit button, after click submit button it will show back, edit, delete button. For better uderstanding show the screenshort of the code(Folder name also, I want to see which folder I have to create and write) and output. • Inventory: • Name • Storage Type • Max Item Capacity Resources: • Resource Name • Resource Type • Max Number of Resources • Current Number of Resourcesarrow_forwardq3B- Bob has set up a website to collect donations for his new sponge. Alice has decided to donate money to Bob’s sponge and submitted a transaction with her financial details and a donation sum of $10. The financial transaction has been altered before reaching it to the server, and the donation sum was changed to $100. Q- Which CIA element(s) was/were targeted by the threat and why do you think so?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Np Ms Office 365/Excel 2016 I NtermedComputer ScienceISBN:9781337508841Author:CareyPublisher:Cengage
Np Ms Office 365/Excel 2016 I Ntermed
Computer Science
ISBN:9781337508841
Author:Carey
Publisher:Cengage