Blockchain and its Applications | Week 1

Course Name: Blockchain and its Applications

Course Link: Click Here

These are Blockchain and its Applications Assignment 1 Answers


Q1) Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should cooperate

Answer: d. No one should trust each other, however they should cooperate


Q2) Which of the statements below is/are true for successful run of decentralized distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above

Answer: a, c


Q3) Where are the transactions logs recorded in a blockchain?
a. Centralized editable database
b. Editable log file
c. On centralized immutable database
d. On append only distributed immutable ledger

Answer: d. On append only distributed immutable ledger


These are Blockchain and its Applications Assignment 1 Answers


Q4) What are the properties of cryptographic hash function?
a. It should be deterministic
b. It should be collision free
c. Ability to hide the input message
d. Puzzle friendly

Answer: a, b, c, d


Q5) For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260

Answer: c. 2256


Q6) Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash

Answer: c. a small change in the message, impacts the hash value


These are Blockchain and its Applications Assignment 1 Answers


Q7) What are the security features of a hash function?
a. Non-deterministic
b. Puzzle-friendly
c. Collision-resistance
d. Preimage resistance

Answer: b, c, d


Q8) SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is True or False.
a. True
b. False

Answer: b. False


Q9) For hash computation in SHA-512, what is the size of the block that the message is divided into?
a. 1024
b. 512
c. 256
d. 1248

Answer: a. 1024


These are Blockchain and its Applications Assignment 1 Answers


Q10) What is the message for hash value of “8abe09bf65aefdb8e84bd8564efb765179cc01ee3f45809e47c8c9a02f72ff83” if SHA-256 is used? (case sensitive)
a. Consensus
b. Swayam
c. SWAYAM
d. Consensus

Answer: a. Consensus



These are Blockchain and its Applications Assignment 1 Answers

More Solutions of Blockchain and its Applications: Click Here

More NPTEL Solutions: https://progiez.com/answers/nptel/


These are Blockchain and its Applications Assignment 1 Answers
These are Blockchain and its Applications Assignment 1 Answers

This content is uploaded for study, general information, and reference purpose only.