- What is the PoW consensus mechanism in Bitcoin Network, and PoS in Ethereum Network?
- What is the gas mechanism prior to EIP-1559 and how does it work?
- What is EIP-1559 and what does it solve?
- What is testing network and mainnet? What is a faucet? What can it do?
- What is the difference between Externally-owned account (EOA) and Contract Account(CA)?
- What is the difference between the private, internal, public and external functions?
- What is the difference between pure and view functions?
- Are private visibility state variables able to be fetched from the blockchain?
- What is the difference between call, staticcall and delegatecall?
- What is the storage slot and its rules?
- What is the difference between receive and fallback?
- What does a modifier work? What is the execution order if there are multiple modifier?
- What is the difference between tx.origin and msg.sender?
- How to send native ether? What is the difference between call, send, transfer?
- What is
event
, what is the purpose of emitting an event?
- What is the difference between
transfer
andtransferFrom
inERC20
? - What is the mechanism for
approve
function? What does it do? - What is the difference between
ERC-20
andERC-721
? Why isERC-721
equivalent toNFT
? - What is the difference between
transferFrom
andsafeTransferFrom
inERC-721
? - What is the difference between
approve
andapproveForAll
inERC-721
?
- What is DEX? What is the difference between AMM and order book?
- What is slippage in AMM? How to prevent them?
- What is impermenant loss? How to calculate the loss?
- What is sandwitch attack? How can it affect your swap?
- What is the structure of Uniswap V2 (Related to core/periphery and Router/Pair/Factory)
- What is the formula for Uniswap V2 and how it works?
- What is the formula when minting liquidity in Uniswap V2 and how it works?
- How to calculate the pair address in
pairFor
function? - What is arbitrage and how it works? How to calculate the reward?
- What is liquidity mining?
- What is DoS (Denial of Service) issue? Are there any real-world examples?
- What is reentrancy attack and examples of such vulnerability? How to mitigate the risk of potential exploit?
- What is front-run attack, how can it affect your transaction?
- What is 51% attack?
- What is the purpose of smart contract auditing and its procedure?
- What is the difference between verified and unverified smart contract?
- What is reentrancy attack and examples of such vulnerability? How to mitigate the risk of potential exploit?
- What is poisoning address and related phishing attack?
- What is risk management and its fundamental principle?
- What is the formula for Kullback-Leibler divergence? How does it operate, and what is the underlying rationale?
- What is the Maximum Entropy Principle, and how is it analyzed, including the mechanism behind it?
- What is the VIX index, and what defines its nature?
- What are the effects following a Bitcoin halving event? Especially related to miner on the network?