2020 case study: Difference between revisions
Mr. MacKenty (talk | contribs) |
Mr. MacKenty (talk | contribs) |
||
Line 2: | Line 2: | ||
== Introduction == | == Introduction == | ||
Higher-level students must write 3 papers. The case study is the third paper. Every year, the case study discusses a different topic. Students must become '''very very familiar''' with the case study. The IB recommends spending about a year studying this guide. | |||
This page will help you organize and understand the 2020 case study. | This page will help you organize and understand the 2020 case study. |
Revision as of 05:43, 30 May 2019
Introduction[edit]
Higher-level students must write 3 papers. The case study is the third paper. Every year, the case study discusses a different topic. Students must become very very familiar with the case study. The IB recommends spending about a year studying this guide.
This page will help you organize and understand the 2020 case study.
The case study[edit]
Click here for the full pdf case study
Terms worth deeply understanding[edit]
These articles have been written by students. Any article with a green checkmark has been approved by a teacher and can be used reliably to study.
- Template for student-defined terms
- 51% attack
- Block
- Blockchain
- Block header
- Candidate block
- Collision resistance
- Cryptocurrency
- Cryptographic hash
- Determinism
- Digital signature
- Distributed consensus
- Double-spend problem
- Entropy
- Genesis block
- Immutable transactions
- Key pair generation
- Ledger
- Merkle proof
- Merkle tree
- Miner
- Mining
- Nonce
- Non-invertibility
- Non-repudiation
- One-way function
- Proof of work
- PuTTYgen
- Self-referential data structure
- SHA256
- Takeover attack
- Transaction pool
Previous years case study[edit]
- Click here for 2019 case study wiki-notes
- Click here for 2018 case study wiki-notes
- Click here for 2017 case study wiki-notes
- Click here for the 2018 case study
- Click here for the 2017 case study
- Click here for the 2016 case study