Blockchain and its Applications | Week 9

Session: JAN-APR 2024

Course Name: Blockchain and its Applications

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 9 Answers


Q1. Which of the following is true about Single Sign-on
a. The same identity can be used to access multiple services
b. Decentralized providers always maintain the identity of individuals participating in single sign-on
c. All individuals use a fixed same identity for every one of them
d. All identity holders are also identity providers

Answer: a. The same identity can be used to access multiple services


Q2. Which of the following sequence of steps is valid for Algorand?
i. A block is prepared
ii. Run Byzantine agreement on the block
iii. Prepare the digital signature and propagate
iv. Block is propagated through gossiping
a. i, ii, iv, iii
b. i, ii, iii, iv
c. i, iv, ii, iii
d. i, iii, ii, iv

Answer: c. i, iv, ii, iii


These are Blockchain and its Applications Assignment 9 Answers


Q3. Which of the following statements regarding Solidity is true?
a. Solidity is compiled to bytecode which is executed by Ethereum Virtual Machine.
b. Solidity interpreter executes the program by Ethereum Virtual Machine.
c. Solidity interpreter executes smart contracts in Ethereum nodes.
d. Solidity is compiled to bytecode which is executed by Ethereum node’s interpreter.

Answer: a. Solidity is compiled to bytecode which is executed by Ethereum Virtual Machine.


Q4. Which of the following can be used for setting up Verifiable Credentials?
a. Hyperledger Aries
b. Litecoin
c. Ethereum
d. Solidity

Answer: a. Hyperledger Aries

See also  Blockchain and its Applications | Week 12

These are Blockchain and its Applications Assignment 9 Answers


Q5. Which of the following is true about the selection of the random committee in the
Algorand network?

a. There is a dedicated node which chooses the nodes to form the committee
b. A distributed algorithm decides the list of nodes participating in the committee
c. A specific pool of node choose are given the responsibility of forming the committee
d. The nodes elect themselves as a committee member by winning a local computation

Answer: d. The nodes elect themselves as a committee member by winning a local computation


Q6. Which of the following is not a valid distinct component in Distributed Identifiers(DID) Architecture.
a. DID Controller
b. Verifiable Data Registry
c. DID Subject
d. DID Randomizer

Answer: d. DID Randomizer


These are Blockchain and its Applications Assignment 9 Answers


Q7. Consider the following statement – “Say Alice has generated two Distributed Identifiers (DID) DID1 and DID2 for her pairwise relationships maintained in Hyperledger Indy”. Which part of the above statement is false with respect to the concepts of Hyperledger Indy?
a. Generation of DID by Alice
b. Assignment of SEED to Steward
c. Acceptance of incoming invitation by Alice
d. None of the above

Answer: b. Assignment of SEED to Steward


Q8. In Verifiable Credential (VC), a claim is a statement about a non participant.
a. True
b. False

Answer: b. False


These are Blockchain and its Applications Assignment 9 Answers


Q9. Which of the following statement(s) is/are true
i. In Hyperledger Indy, any authorised party can read the ledger.
ii. In Hyperledger Indy, only registered parties and can write to the ledger.
a. i
b. i, ii
c. ii
d. None of the above

See also  Blockchain and its Applications | Week 11

Answer: b. i, ii


Q10. Data transfer is an important aspect of interoperability in which of the following blockchains?
a. Hyperledger Indy
b. Corda
c. Hyperledger Fabric
d. None

Answer: a. Hyperledger Indy


For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 9 Answers

More Solutions of Blockchain and its Applications: Click Here

More Nptel Answers: Click here


Session: JAN-APR 2022

Course Name: Blockchain and its Applications

Course Link: Click Here

These are Blockchain and its Applications Assignment 9 Answers


Q1. Which of the following statements is true for Byzantine Fault Tolerant (BFT) protocol.
a. The system should work correctly even in presence of malicious users within
the defined limit of faulty nodes.
b. BFT Protocol is used generally in a permissioned system in its basic form.
c. RAFT is a type of BFT protocol
d. None of the above

Answer: a, b


Q2. Algorand in general is safe under weak synchrony.
a. True
b. False

Answer: a. True


These are Blockchain and its Applications Assignment 9 Answers


Q3. Which of the following is/are applicable for standard Algorand
a. Forking issue not present
b. Highly scalable
c. Need large network to perform optimally
d. Uses random committee

Answer: a, b, c, d


Q4. Which of the following is/are true for Single Sign-On(SSO) based systems.
a. Single identity for various purposes
b. One password to access multiple services
c. Single identity provider can maintain the identity
d. None of the above

Answer: a, b,c


These are Blockchain and its Applications Assignment 9 Answers

See also  Blockchain and its Applications | Week 6

Q5. Which of the following is/are true for Decentralized Identifier (DID)
a. Digital representation of physical identity
b. Individuals can control the usage of their own identity
c. Provides Verifiable presentation of the ID
d. DID helps in trusted data exchange

Answer: a, b, c


Q6. Which of the following is/are true for a DID document.
a. A set of data describing the DID subject
b. Includes cryptographic mechanism
c. Consists mapping of entries
d. None of the above

Answer: a, b, c, d


These are Blockchain and its Applications Assignment 9 Answers


Q7. DIDs only allow a DID controller to prove its control over its DID Document.
a. True
b. False

Answer: a. True


Q8. In Verifiable Credential (VC), a claim is a statement about a
a. Holder
b. Subject
c. Issuer
d. Verifier

Answer: b. Subject


These are Blockchain and its Applications Assignment 9 Answers


Q9. Censoring of data registry is a major problem mainly in centralized systems
a. False
b. True

Answer: b. True


Q10. Which of the following steps is/are valid for DID Registration?
a. Register DID
b. Create DID Document
c. Authenticate DID Controller
d. Update DID Document

Answer: a, b, c, d


These are Blockchain and its Applications Assignment 9 Answers

More Solutions of Blockchain and its Applications: Click Here

More NPTEL Solutions: Click here


These are Blockchain and its Applications Assignment 9 Answers