Archives: Quizzes

Race of Sloths: Gamifying Open-Source Contributions

Login with NEAR{“questions”:{“ehv5t”:{“id”:”ehv5t”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”What is the primary goal of Race of Sloths?\r\n”,”desc”:””,”hint”:””,”answers”:{“lu28r”:{“id”:”lu28r”,”image”:””,”imageId”:””,”title”:”To speed up open-source development”},”4d9jv”:{“id”:”4d9jv”,”image”:””,”imageId”:””,”title”:”To gamify open-source contributions”,”isCorrect”:”1″},”6nq3w”:{“id”:”6nq3w”,”image”:””,”imageId”:””,”title”:”To replace traditional version control systems\r\n”},”unvka”:{“id”:”unvka”,”image”:””,”imageId”:””,”title”:”To create a new programming language”}}}}}

Ref Finance 2

Login with NEAR{“questions”:{“pqtip”:{“id”:”pqtip”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”Which CEX listed $REF?”,”desc”:””,”hint”:””,”answers”:{“4rzrw”:{“id”:”4rzrw”,”image”:””,”imageId”:””,”title”:”Binance”},”y07ny”:{“id”:”y07ny”,”image”:””,”imageId”:””,”title”:”Coinbase”},”nzm7s”:{“id”:”nzm7s”,”image”:””,”imageId”:””,”title”:”Gate, Mxc”,”isCorrect”:”1″},”gg17c”:{“id”:”gg17c”,”image”:””,”imageId”:””,”title”:”Bybit”}}}}}

Ref Finance

Login with NEAR{“questions”:{“pqtip”:{“id”:”pqtip”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”How much is the total supply of $REF”,”desc”:””,”hint”:””,”answers”:{“4rzrw”:{“id”:”4rzrw”,”image”:””,”imageId”:””,”title”:”10,000,000″},”y07ny”:{“id”:”y07ny”,”image”:””,”imageId”:””,”title”:”100,000,000″,”isCorrect”:”1″},”nzm7s”:{“id”:”nzm7s”,”image”:””,”imageId”:””,”title”:”1,000,000,000″},”gg17c”:{“id”:”gg17c”,”image”:””,”imageId”:””,”title”:”10,000,000,000″}}}}}

Guide on how to use Reclaim Protocol with Near Blockchain 3

Login with NEAR{“questions”:{“wfzkf”:{“id”:”wfzkf”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”What standards does Reclaim Protocol use to ensure the security of user data?”,”desc”:””,”hint”:””,”answers”:{“ru5ps”:{“id”:”ru5ps”,”image”:””,”imageId”:””,”title”:”SSL and HTTP”},”uxo34″:{“id”:”uxo34″,”image”:””,”imageId”:””,”title”:”HTTPS and TLS”,”isCorrect”:”1″},”eqq40″:{“id”:”eqq40″,”image”:””,”imageId”:””,”title”:”SSH and FTP”},”tharv”:{“id”:”tharv”,”image”:””,”imageId”:””,”title”:”WEP and WPA”}}}}}

Guide on how to use Reclaim Protocol with Near Blockchain 2

Login with NEAR{“questions”:{“n48al”:{“id”:”n48al”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”What is the primary function of Reclaim Protocol’s zkTLS infrastructure?”,”desc”:””,”hint”:””,”answers”:{“y85by”:{“id”:”y85by”,”image”:””,”imageId”:””,”title”:”To generate cryptographic proofs without revealing any sensitive information”,”isCorrect”:”1″},”elz7v”:{“id”:”elz7v”,”image”:””,”imageId”:””,”title”:”To provide a browser extension for secure data sharing”},”j7olx”:{“id”:”j7olx”,”image”:””,”imageId”:””,”title”:”To enable blockchain transactions without any proof”},”1kess”:{“id”:”1kess”,”image”:””,”imageId”:””,”title”:”To create social media profiles for Web3 users”}}}}}

Guide on how to use Reclaim Protocol with Near Blockchain 1

Login with NEAR{“questions”:{“m9od1”:{“id”:”m9od1″,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”Reclaim Protocol can be integrated with both front-end and backend?”,”desc”:””,”hint”:””,”answers”:{“hmfmz”:{“id”:”hmfmz”,”image”:””,”imageId”:””,”title”:”True”,”isCorrect”:”1″},”5upvq”:{“id”:”5upvq”,”image”:””,”imageId”:””,”title”:”False”}}}}}

NEAR Wallets 2

Login with NEAR{“questions”:{“00bkp”:{“id”:”00bkp”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”What cold\/hardware wallet brand is recommended for storing NEAR?”,”desc”:””,”hint”:””,”answers”:{“7pb0h”:{“id”:”7pb0h”,”image”:””,”imageId”:””,”title”:”Trezor”},”tmulc”:{“id”:”tmulc”,”image”:””,”imageId”:””,”title”:”MyNearWallet”},”bdmfv”:{“id”:”bdmfv”,”image”:””,”imageId”:””,”title”:”Guarda Wallet”},”7gxj0″:{“id”:”7gxj0″,”image”:””,”imageId”:””,”title”:”Ledger”,”isCorrect”:”1″}}}}}

NEAR Wallets 1

Login with NEAR{“questions”:{“kcrkk”:{“id”:”kcrkk”,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”What is the most secure type of crypto wallet”,”desc”:””,”hint”:””,”answers”:{“297ij”:{“id”:”297ij”,”image”:””,”imageId”:””,”title”:”Hot Wallet”},”r1an0″:{“id”:”r1an0″,”image”:””,”imageId”:””,”title”:”Cold Wallet”,”isCorrect”:”1″},”y21io”:{“id”:”y21io”,”image”:””,”imageId”:””,”title”:”Paper Wallet”},”8ncis”:{“id”:”8ncis”,”image”:””,”imageId”:””,”title”:”Custodial Wallet”}}}}}

NEAR Wallets 3

Login with NEAR{“questions”:{“uivs4”:{“id”:”uivs4″,”mediaType”:”image”,”answerType”:”text”,”imageCredit”:””,”image”:””,”imageId”:””,”video”:””,”imagePlaceholder”:””,”imagePlaceholderId”:””,”title”:”Which wallet is the official successor to NEAR Wallet?”,”desc”:””,”hint”:””,”answers”:{“p9d7n”:{“id”:”p9d7n”,”image”:””,”imageId”:””,”title”:”HERE Wallet”},”u0ao7″:{“id”:”u0ao7″,”image”:””,”imageId”:””,”title”:”MyNearWallet”,”isCorrect”:”1″},”kxmtt”:{“id”:”kxmtt”,”image”:””,”imageId”:””,”title”:”Guarda Wallet”},”1ekpq”:{“id”:”1ekpq”,”image”:””,”imageId”:””,”title”:”Meteor Wallet”}}}}}

Scroll to Top