UniBlue Finance Airdrop 400 token UBF ~2800$

Airdrop 400 token UBF ~2800$ (very potential project!!!)

✅Link Form: https://docs.google.com/forms/d/e/1FAIpQLScfbFovida1VUSbbeYFDKB8Z8T78Vf34DU1IPfitDy90AZt0g/viewform

🔥 “ Twitter username invite you? “ use: @haydenvadams

✴️ 6 Question and Quiz :

Question 1. Tell us about a few major applications of cryptography in the modern world?

👉 There are lots of benefits of cryptography in the modern world and a few of them are:
1. Chip based payment cards
2. Computer and other passwords
3. E-commerce
4. Defense communications
5. Digital Currencies
6. Designing protocols
7. Data authenticity

Question  2. What are the major threats to any data or information for which it needs cryptography?

👉 Hackers can steal data and any sensitive information upon leaking can create issues for the business, a government, financial institution as well as for a person individually. Leak of confidential information can put entire organization at risk. Therefore data needs to be secured.

Question  3. What is Digital Signature Algorithm? *

👉 The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures, based on the mathematical concept of modular exponentiation and the discrete logarithm problem. DSA is a variant of the Schnorr and ElGamal signature schemes.

Question  4. How you will generate a sequence of binary bits in cryptography?

👉 Using the natural binary system, one can present binary fixed point numbers. A certain part of the bits is used for storage of the fractional part of the number.
A decimal value of a n-digit binary number stored using the natural binary system as:
an-1 … a2a1a0
is equal to:
2n-1an-1 + … + 22a2 + 21a1 + 20a0
where:
ai can be equal to either 0 or 1.

Question 5. Define Cryptography in your own way along with its benefits?

👉 cryptography refers to secure information and communication techniques derived from mathematical concepts and a set of rule-based calculations called algorithms, to transform messages in ways that are hard to decipher. These deterministic algorithms are used for cryptographic key generation, digital signing, verification to protect data privacy, web browsing on the internet, and confidential communications such as credit card transactions and email.

Question 6. UniBlue is layer-2 scaling on what?
👉 Uniswap

JOIN OUR SOCLIAL CHANEL TO GET NOTIFICATIONS:
Telegram Channel
Telegram Group
Twitter
Facebook Group

Leave a Reply

Your email address will not be published. Required fields are marked *