1/13
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Bitcoin security
Bitcoin relies on public/private key cryptography, cryptographic hash functions, proof-of-work mining, and a distributed blockchain ledger.
Key cryptographic elements of Bitcoin
1. Public/private key pairs for ownership and transfers 2. SHA-256 hashing to secure block contents 3. Digital signatures to verify transactions.
Proof-of-work system in Bitcoin
Miners solve computational puzzles to validate new blocks. This makes it computationally expensive to alter the blockchain.
Blockchain
An append-only, distributed ledger of transactions grouped into blocks, each linked cryptographically to the previous one.
Amazon Dynamo
A distributed key-value storage system optimized for high availability, eventual consistency, and partition tolerance.
Core principles of Dynamo
1. Partitioning 2. Replication 3. Vector clocks 4. Eventual consistency 5. Decentralized membership and request routing.
Handling conflicting data updates in Dynamo
By using vector clocks and allowing applications to reconcile divergent versions of data.
Cross-tabulation in analytics
A method for displaying the relationship between two or more categorical variables in a table format.
Insights from cross-tabulation
It helps identify patterns, correlations, or distributions across groups in a dataset.
ACID in databases
Atomicity, Consistency, Isolation, Durability.
Atomicity in database transactions
That all parts of a transaction complete successfully, or none at all.
Consistency in database transactions
That a transaction brings the database from one valid state to another, preserving constraints.
Isolation in database transactions
That concurrent transactions do not interfere with each other.
Durability in database transactions
That once a transaction is committed, its changes persist even after a system failure.