115
What are the most widely used cryptography algorithms Some of the most extensively used cryptographic algorithms are
●
RSA
●
AES
● Triple DES
●
Two fish ●
Blowfish
Explain the Public key and Private key.A public key is a cryptographic key that allows all users/peers in a Blockchain network to receive funds in their wallet. This key is an alphanumeric string that is unique to a specific node or address. On the other hand, a private key is an alphanumeric phrase used to encrypt and decode data in conjunction with a public key. This key is kept by a single person who is also the key generator. The data in the generator's wallet will be jeopardized if anyone else gets their hands on the private key.
What are the security issues in Blockchain? ● Routing attacks
●
Phishing attacks ● Transaction Privacy leakage
● 51% attacks
●
Endpoint Vulnerabilities What are the applications of Blockchain? ● Smart Contracts
● Electronic Voting
●
Cloud Storage ● Supply-Chain Communications & Proof-of-Provenance
● Paying Employees
● Financial
exchanges and money transfer ● Healthcare
116
Robotic process automation (RPA) What is RPA? Robotic Process Automation (RPA) is the process of automating corporate procedures with the use of robots in order to reduce human intervention. Robots are robotic beings that mimic human behavior. A process is a set of stages that leads to a specific outcome. For instance, the process of making coffee or preparing your favorite dish. Any process carried out by a robot without human intervention is referred to as automation. When we put
all of these phrases together, we get Robotic Process Automation, which is defined as the mimicking of human behaviors to conduct a sequence of stages that leads to meaningful activity without the need for human participation.
Share with your friends: