I'm not entirely sure, but I think encrypted storage on-chain is a requirement for data that might be deleted? Seems like a good idea to prevent unauthorized access.
I'm a bit confused by this question. The options cover a lot of different aspects of the Scenarios dimension, and I'm not sure which ones are considered the "characteristics." I'll need to review my notes and try to remember the key elements of this dimension.
This seems like a classic Sybil attack to me. Flooding the network with a bunch of fake mining nodes is a common tactic to try and gain majority control. I feel pretty confident about this one.
Hmm, I'm a bit confused by this question. I'm not sure if adding the @testVisible annotation is the right approach here. Wouldn't that just make the method visible to the test class, but not necessarily improve the code coverage?
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Winfred
4 months agoMammie
4 months agoAlonzo
4 months agoMarisha
4 months agoEmeline
5 months agoJame
5 months agoMakeda
5 months agoDominga
5 months agoIrma
5 months agoKris
5 months agoAlline
5 months agoMarget
5 months agoMeaghan
5 months agoRima
5 months ago