Blockchain and its Applications | Week 4
Course Name: Blockchain and its Applications
Course Link: Click Here
These are Blockchain and its Applications Assignment 4 Answers
Q1. “We can achieve consensus with a single crash failure in a perfect asynchronous network.” This scenario is?
a. Always true
b. Impossible
c. Can’t say
d. Sometimes true
Answer: b. Impossible
Q2. Which is/are the example/s of a double-spending attack?
a. Anwesha has a total of 60 unspent bitcoins from two different transactions with an equal amount of bitcoins each. She sends the entire amount each to Arpita and Ankur from one of the transactions
b. Bobby bought a bike using ‘t’ bitcoins. On delivery, the bitcoins are transferred from his wallet to the shopper’s wallet. Simultaneously, he uses that bitcoins for another purchase
c. Bibhu has 140 unspent bitcoins. He sends the entire amount each to Deepak and Tanmay
d. Deepak and Bibhu each have 70 unspent bitcoins. Both of them transfer 20 bitcoins to each other
Answer: a, b, c
These are Blockchain and its Applications Assignment 4 Answers
Q3. What is the correct order of adding a new block to blockchain
i. Block Mining
ii. Block propagation
iii. Block Flooding
iv. Transaction Flooding
a. iii, iv, ii, i
b. iv, iii, ii, i
c. ii, i, iii, iv
d. iv, i, iii, ii
Answer: d. iv, i, iii, ii
Q4. Double spending is reusing digital assets intentionally or inadvertently True or False?
a. True
b. False
Answer: a. True
These are Blockchain and its Applications Assignment 4 Answers
Q5. In the blockchain, cryptography ensures the authenticity of a transaction and also helps prevent double-spend. Is the above statement True or False?
a. True
b. False
Answer: b. False
Q6. What are Bitcoin exchanges available in India:
i. BuyUCoin
ii. ZebPay
iii. WazirX
a. i and ii
b. ii and ii
c. i and iii
d. i, ii and iii
Answer: a, b, c, d
These are Blockchain and its Applications Assignment 4 Answers
Q7. The primary difference between the permissionless and permissioned blockchain is __________?
a. Access control for the participants in the blockchain network
b. Hash Algorithms
c. Confidentiality
d. Availability
Answer: a. Access control for the participants in the blockchain network
Q8. What is an advantage of a permissionless blockchain?
a. It does not use disinterested third parties to secure blocks, as all participants have a vested interest.
b. It is more resilient against fraud because it uses federated nodes to combat fraud.
c. It is open to everyone in the world without permission and licensing requirements.
d. Its networks are built by for-profit companies and the working of the network is guaranteed.
Answer: c. It is open to everyone in the world without permission and licensing requirements.
These are Blockchain and its Applications Assignment 4 Answers
Q9. After a hard fork, the emerging two chains are incompatible. True or False?
a. True
b. False
Answer: a. True
Q10. Bitcoin protocol runs over
i. TCP
ii. UDP
iii. HTTP
iv. HTTPS
a. i, ii, iii
b. i, iv
c. Only i
d. Only ii
Answer: c. Only i
These are Blockchain and its Applications Assignment 4 Answers
More Solutions of Blockchain and its Applications: Click Here
More NPTEL Solutions: https://progiez.com/nptel/

This content is uploaded for study, general information, and reference purpose only.