Blockchain and its Applications | Week 1
Session: JAN-APR 2024
Course Name: Blockchain and its Applications
Course Link: Click Here
For answers or latest updates join our telegram channel: Click here to join
These are Blockchain and its Applications Assignment 1 Answers
Q1. What are the features of a hash function?
a. Puzzle-friendly
b. Collision-resistance
c. Deterministic
d. Post image resistance
Answer: a. Puzzle-friendly
b. Collision-resistance
c. Deterministic
Q2. For a SHA 256 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs?
a. 0.3 x2^128
b. 0.2×10^50
c. 0.25X2130
d. 1 x2256
Answer: c. 0.25X2130
Q3. What is the hash value of 6666 if SHA-256 is used?
a.
b.
c.
d.
Answer: a.
For answers or latest updates join our telegram channel: Click here to join
These are Blockchain and its Applications Assignment 1 Answers
Q4. Which of the statements below is/are true for decentralized distributed systems?
a. Players may or may not trust each other
b. Players must trust each other
c. Central body should govern the communication
d. None of the above
Answer: a. Players may or may not trust each other
Q5. Miner nodes only execute new transactions but can not verify previous transaction hash?
a. True
b. False
Answer: b. False
Q6. Which of the following is/are true for blockchains?
a. Works based on Push technique
b. Existing data can be deleted easily
c. Tamper-proof
d. None of the above
Answer: a, c
For answers or latest updates join our telegram channel: Click here to join
These are Blockchain and its Applications Assignment 1 Answers
Q7. Where are the ledger logs stored in a blockchain?
a. On a SQL Database
b. On a central immutable ledger
c. On a metadata table
d. In ledger of each peer
Answer: d. In ledger of each peer
Q8. Which of the following is an avalanche effect to a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts large change the hash value
d. None of the above
Answer: c. a small change in the message, impacts large change the hash value
Q9. Genesis blocks may not contain the
a. First transaction
b. First transaction block
c. Last transaction block
d. None of the above
Answer: c. Last transaction block
These are Blockchain and its Applications Assignment 1 Answers
Q10. Which of the below is/are blockchain based app examples?
a. Cross-border payments
b. Supply chain
c. Anti-money laundering tracking system
d. UTXO
Answer: a. Cross-border payments
b. Supply chain
c. Anti-money laundering tracking system
For answers or latest updates join our telegram channel: Click here to join
These are Blockchain and its Applications Assignment 1 Answers
More Solutions of Blockchain and its Applications: Click Here
More Nptel Answers: Click here
Session: JAN-APR 2022
Course Name: Blockchain and its Applications
Course Link: Click Here
These are Blockchain and its Applications Assignment 1 Answers
Q1) Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should cooperate
Answer: d. No one should trust each other, however they should cooperate
Q2) Which of the statements below is/are true for successful run of decentralized distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above
Answer: a, c
Q3) Where are the transactions logs recorded in a blockchain?
a. Centralized editable database
b. Editable log file
c. On centralized immutable database
d. On append only distributed immutable ledger
Answer: d. On append only distributed immutable ledger
These are Blockchain and its Applications Assignment 1 Answers
Q4) What are the properties of cryptographic hash function?
a. It should be deterministic
b. It should be collision free
c. Ability to hide the input message
d. Puzzle friendly
Answer: a, b, c, d
Q5) For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260
Answer: c. 2256
Q6) Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash
Answer: c. a small change in the message, impacts the hash value
These are Blockchain and its Applications Assignment 1 Answers
Q7) What are the security features of a hash function?
a. Non-deterministic
b. Puzzle-friendly
c. Collision-resistance
d. Preimage resistance
Answer: b, c, d
Q8) SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is True or False.
a. True
b. False
Answer: b. False
Q9) For hash computation in SHA-512, what is the size of the block that the message is divided into?
a. 1024
b. 512
c. 256
d. 1248
Answer: a. 1024
These are Blockchain and its Applications Assignment 1 Answers
Q10) What is the message for hash value of “__” if SHA-256 is used? (case sensitive)
a. Consensus
b. Swayam
c. SWAYAM
d. Consensus
Answer: a. Consensus
These are Blockchain and its Applications Assignment 1 Answers
More Solutions of Blockchain and its Applications: Click Here
More NPTEL Solutions: https://progiez.com/nptel-assignment-answers