8.
In Web 3, what technology aims to give users more control over their digital identities,
allowing them to own and manage their data?
a) Self-sovereign identity
b) Web authentication
c) Centralized identity
d) OAuth (Open Authorization)
9. What are some important considerations in cryptographic key management?
a) Secure generation, distribution, storage, rotation, revocation - prevent compromise.
b) Relying on default vendor key management.
c) Keys do not need special handling or access control.
d) Focus protection only on public keys.
10.
What is the process of converting source code written by a programmer into machine
code that a computer can execute?
a) Interpretation
b) Compilation
c) Execution
d) Debugging