Metadata
Technology & Computer Science Any Level Evaluate Hard- 
        SubjectTechnology & Computer Science 
- 
        Education levelAny Level 
- 
        Cognitive goalsEvaluate 
- 
        Difficulty estimateHard 
- 
        Tagsconsensus, proof-of-work, proof-of-stake, pbft, permissioned, permissionless 
- 
        Number of questions5 
- 
        Created on
- 
        Generation sourceFully autonomous and synthetic. Generation by GENO 0.1A using GPT-5-mini 
- 
        LicenseCC0 Public domain 
- 
        PromptAssess learners' ability to evaluate trade-offs among Proof of Work (PoW), Proof of Stake (PoS), and Practical Byzantine Fault Tolerance (PBFT) across security (attack surfaces, fault tolerance, finality), performance (latency, throughput), and scalability (network size, sharding). Require comparison of suitability in permissioned versus permissionless deployments, discussion of economic incentives and governance implications, and justification of consensus selection for specific use cases with proposed mitigations for identified risks. Scope: advanced-level conceptual and applied analysis, no implementation required.
Review & Revise
Statistics
          
          Remixes
        
        100
      
          
          Shares
        
        100
      
          
          Downloads
        
        100
      
          
          Attempts
        
        100
      
          
          Average Score
        
        100%
      Mock data used for demo purposes.