๐ Cess ์์ด๋๋ ์์
ํด๋๊ธฐ
CESSCESS์์ ์งํํ๋
์์ด๋๋ ์์
์์ด๋๋ ์์
์ด ์์ต๋๋ค.
๋
ธ๋ ๊ตฌ๋๋
ธ๋ ๊ตฌ๋์
๋ฉ์ธ๋ท๋ฉ์ธ๋ท ๋์์ผ ์์ํ๋ค๊ณ ์์ง ๊ธฐ๋ค๋ ค์ผํ๋ค๊ณ ํ๋ค์.
์ฐ์ ๋ฉ์ธ๋ท ๋์ค๊ธฐ ์ ๊น์ง ์ด ์์
์ด๋ผ๋ ํด๋์์ผ๊ฒ ์ต๋๋ค.
โก๏ธโก๏ธ
์ฐธ์ฌ ๋ฐฉ๋ฒ
1. CESS ์ ์
2. ์ด๋ฉ์ผ / ํธ์ํฐ ์ฐ๊ฒฐ๋ก ๋ก๊ทธ์ธ
3. ์ฐ์ธก ์๋จ Resources ํด๋ฆญ ํ Wallet ์์ ์ง๊ฐ ์ฐ๊ฒฐ
4. ๋ฐ์ผ๋ฆฌ ์ถ์ฒต ๋ฑ ๋ฏธ์
ํด๋ฆฌ์ด
5. ํด์ฆ ํ๊ธฐ
CESS ์ ์
2. ์ด๋ฉ์ผ / ํธ์ํฐ ์ฐ๊ฒฐ๋ก ๋ก๊ทธ์ธ
3. ์ฐ์ธก ์๋จ Resources ํด๋ฆญ ํ Wallet ์์ ์ง๊ฐ ์ฐ๊ฒฐ
4. ๋ฐ์ผ๋ฆฌ ์ถ์ฒต ๋ฑ ๋ฏธ์
ํด๋ฆฌ์ด
5. ํด์ฆ ํ๊ธฐ
โ
ํด์ฆ๋ ์๋ ์ค ๋๋ค์ผ๋ก ๋์จ๋ค๊ณ ํฉ๋๋ค.
ยท In which year was the CESS team formed?
> 2019
ยท In which year was CESS Testnet v0.1 launched?
> 2021
ยท What is the token name for the CESS testnet?
> TCESS
ยท CESS Network has 4 types of nodes, including: Consensus Nodes, ___ Nodes, Cache Nodes, and Retrieval Nodes.
> Storage
ยท What does the PoDRยฒ mechanism do?
> Prevents data loss and ensures availability
ยท CESS Proof of Data Reduplication and Recovery (PoDR) mechanism prevents data loss and guarantees data integrity, while continuously challenging storage nodes to prove data validity and availability, all executed within ___.
> TEE
ยท Proxy Re-encryption Technology secures the ___ of data.
> Circulation
ยท Can $CESS Tokens be transferred through Metamask? (Yes/No)
> YES
ยท Which mechanism prevents any data loss and guarantees data availability?
> PoDRยฒ
ยท Which proof algorithm is used to validate space for generated idle files?
> PoIS
ยท Which technology ensures data privacy with compliance routing, keeping data within borders and addressing national security concerns?
> Location-based Storage Selection (LLBS)
ยท Achieve millisecond-level hot data access in a decentralized storage system with CESS's ___.
> CDยฒN
ยท The Distributed Content Delivery Layer (DCDL) includes ___ Nodes and Cache Nodes.
> Retrieval
ยท How many validators are selected to produce blocks in Random Rotational Selection?
> 11
ยท DeOSS is the ___ to the CESS Network.
> Gateway
ยท How many SDKs does CESS support?
> 3
ยท CESS proposed IEEE P___ decentralized storage standard protocol.
> 3220.02
ยท What is the maximum file size that can be uploaded to Deshare?
> 100MB$CESS Tokens be transferred through Metamask? (Yes/No)
> YES
ยท Which mechanism prevents any data loss and guarantees data availability?
> PoDRยฒ
ยท Which proof algorithm is used to validate space for generated idle files?
> PoIS
ยท Which technology ensures data privacy with compliance routing, keeping data within borders and addressing national security concerns?
> Location-based Storage Selection (LLBS)
ยท Achieve millisecond-level hot data access in a decentralized storage system with CESS's ___.
> CDยฒN
ยท The Distributed Content Delivery Layer (DCDL) includes ___ Nodes and Cache Nodes.
> Retrieval
ยท How many validators are selected to produce blocks in Random Rotational Selection?
> 11
ยท DeOSS is the ___ to the CESS Network.
> Gateway
ยท How many SDKs does CESS support?
> 3
ยท CESS proposed IEEE P___ decentralized storage standard protocol.
> 3220.02
ยท What is the maximum file size that can be uploaded to Deshare?
> 100MB