Blockchain and its Applications | Week 1

Session: JAN-APR 2024

Course Name: Blockchain and its Applications

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 1 Answers


Q1. What are the features of a hash function?
a. Puzzle-friendly
b. Collision-resistance
c. Deterministic
d. Post image resistance

Answer: a. Puzzle-friendly
b. Collision-resistance
c. Deterministic


Q2. For a SHA 256 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs?
a. 0.3 x2^128
b. 0.2×10^50
c. 0.25X2130
d. 1 x2256

Answer: c. 0.25X2130


Q3. What is the hash value of 6666 if SHA-256 is used?
a.
b.
c.
d.

Answer: a.


For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 1 Answers


Q4. Which of the statements below is/are true for decentralized distributed systems?
a. Players may or may not trust each other
b. Players must trust each other
c. Central body should govern the communication
d. None of the above

Answer: a. Players may or may not trust each other


Q5. Miner nodes only execute new transactions but can not verify previous transaction hash?
a. True
b. False

Answer: b. False


Q6. Which of the following is/are true for blockchains?
a. Works based on Push technique
b. Existing data can be deleted easily
c. Tamper-proof
d. None of the above

Answer: a, c


For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 1 Answers


Q7. Where are the ledger logs stored in a blockchain?
a. On a SQL Database
b. On a central immutable ledger
c. On a metadata table
d. In ledger of each peer

Answer: d. In ledger of each peer


Q8. Which of the following is an avalanche effect to a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts large change the hash value
d. None of the above

Answer: c. a small change in the message, impacts large change the hash value


Q9. Genesis blocks may not contain the
a. First transaction
b. First transaction block
c. Last transaction block
d. None of the above

Answer: c. Last transaction block


These are Blockchain and its Applications Assignment 1 Answers


Q10. Which of the below is/are blockchain based app examples?
a. Cross-border payments
b. Supply chain
c. Anti-money laundering tracking system
d. UTXO

Answer: a. Cross-border payments
b. Supply chain
c. Anti-money laundering tracking system


For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 1 Answers

More Solutions of Blockchain and its Applications: Click Here

More Nptel Answers: Click here


Session: JAN-APR 2022

Course Name: Blockchain and its Applications

Course Link: Click Here

These are Blockchain and its Applications Assignment 1 Answers


Q1) Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should cooperate

Answer: d. No one should trust each other, however they should cooperate


Q2) Which of the statements below is/are true for successful run of decentralized distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above

Answer: a, c


Q3) Where are the transactions logs recorded in a blockchain?
a. Centralized editable database
b. Editable log file
c. On centralized immutable database
d. On append only distributed immutable ledger

Answer: d. On append only distributed immutable ledger


These are Blockchain and its Applications Assignment 1 Answers


Q4) What are the properties of cryptographic hash function?
a. It should be deterministic
b. It should be collision free
c. Ability to hide the input message
d. Puzzle friendly

Answer: a, b, c, d


Q5) For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260

Answer: c. 2256


Q6) Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash

Answer: c. a small change in the message, impacts the hash value


These are Blockchain and its Applications Assignment 1 Answers


Q7) What are the security features of a hash function?
a. Non-deterministic
b. Puzzle-friendly
c. Collision-resistance
d. Preimage resistance

Answer: b, c, d


Q8) SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is True or False.
a. True
b. False

Answer: b. False


Q9) For hash computation in SHA-512, what is the size of the block that the message is divided into?
a. 1024
b. 512
c. 256
d. 1248

Answer: a. 1024


These are Blockchain and its Applications Assignment 1 Answers


Q10) What is the message for hash value of “__” if SHA-256 is used? (case sensitive)
a. Consensus
b. Swayam
c. SWAYAM
d. Consensus

Answer: a. Consensus


These are Blockchain and its Applications Assignment 1 Answers

More Solutions of Blockchain and its Applications: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers


These are Blockchain and its Applications Assignment 1 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.