Blockchain and its Applications | Week 4

Session: JAN-APR 2024

Course Name: Blockchain and its Applications

Course Link: Click Here

For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 4 Answers


Q1. After a hard fork, the emerging two chains are incompatible. True or False?
a. True
b. False

Answer: a. True


Q2. Which is/are the possible example/s of a double-spending attack?
a. Sammy has a total of 90 unspent bitcoins from two different transactions with an equal amount of bitcoins each. He tries to send the entire amount at a time each to Nikita and Ayush as transactions
b. Brady bought a car using ‘m’ bitcoins. On delivery, the bitcoins are transferred from his wallet to the dealer’s wallet.
c. Karan has 180 unspent bitcoins. He sends the equal amount each to Dev and Tarun one by one
d. Deepak has 20 unspent bitcoins. He tries to transfer those 20 bitcoins to his two each of his friends simultaneously.

Answer: a, d


These are Blockchain and its Applications Assignment 4 Answers


Q3. Blocks of a blockchain?
a. Transaction data
b. Hash
c. Time stamp
d. None of the above

Answer: a, b, c


Q4. What are some Bitcoin exchanges available in India:
a. BuyUCoin
b. ZebPay
c. WazirX
i. a and b
ii. b and c
iii. a and c
iv. a, b and c

Answer: iv. a, b and c


These are Blockchain and its Applications Assignment 4 Answers


Q5. “We can achieve consensus with a single crash failure in a perfect asynchronous network.” This scenario is ________?
a. Always true
b. Sometimes true
c. Can’t say
d. Impossible

Answer: d. Impossible


Q6. What is the correct order of adding a new block to blockchain
i. Block Mining
ii. Block propagation
Block Flooding
IV. Transaction Flooding

a. iii, iv, ii, i
b. iv, i, iii, ii
c. iv, iii, ii, i
d. II, I, III, IV

Answer: b. iv, i, iii, ii


These are Blockchain and its Applications Assignment 4 Answers


Q7. Double spending is reusing digital assets intentionally or inadvertently. True or False?
a. True
b. False

Answer: a. True


Q8. The primary difference between the permissionless and permissioned blockchain is _______?
a. Hash Algorithms
b. Confidentiality
c. Availability
d. Access control for the participants in the blockchain network

Answer: d. Access control for the participants in the blockchain network


These are Blockchain and its Applications Assignment 4 Answers


Q9. What is an advantage of a permissionless blockchain?
a. It does not use disinterested third parties to secure blocks, as all participants have a vested interest.
b. It is open to everyone in the world without permission and approval requirements.
c. It is more resilient against fraud because it uses federated nodes to combat fraud.
d. Its networks are built by for-profit companies and the working of the network is guaranteed.

Answer: b. It is open to everyone in the world without permission and approval requirements.


Q10. What is an advantage of a permissionless blockchain?
a. It does not use disinterested third parties to secure blocks, as all participants have a vested interest.
b. It is open to everyone in the world without permission and approval requirements.
c. It is more resilient against fraud because it uses federated nodes to combat fraud.
d. Its networks are built by for-profit companies and the working of the network is guaranteed.

Answer: c. It is more resilient against fraud because it uses federated nodes to combat fraud.


For answers or latest updates join our telegram channel: Click here to join

These are Blockchain and its Applications Assignment 4 Answers

More Solutions of Blockchain and its Applications: Click Here

More Nptel Answers: Click here


Session: JAN-APR 2022

Course Name: Blockchain and its Applications

Course Link: Click Here

These are Blockchain and its Applications Assignment 4 Answers


Q1. “We can achieve consensus with a single crash failure in a perfect asynchronous network.” This scenario is?
a. Always true
b. Impossible
c. Can’t say
d. Sometimes true

Answer: b. Impossible


Q2. Which is/are the example/s of a double-spending attack?
a. Anwesha has a total of 60 unspent bitcoins from two different transactions with an equal amount of bitcoins each. She sends the entire amount each to Arpita and Ankur from one of the transactions
b. Bobby bought a bike using ‘t’ bitcoins. On delivery, the bitcoins are transferred from his wallet to the shopper’s wallet. Simultaneously, he uses that bitcoins for another purchase
c. Bibhu has 140 unspent bitcoins. He sends the entire amount each to Deepak and Tanmay
d. Deepak and Bibhu each have 70 unspent bitcoins. Both of them transfer 20 bitcoins to each other

Answer: a, b, c


These are Blockchain and its Applications Assignment 4 Answers


Q3. What is the correct order of adding a new block to blockchain
i. Block Mining
ii. Block propagation
iii. Block Flooding
iv. Transaction Flooding

a. iii, iv, ii, i
b. iv, iii, ii, i
c. ii, i, iii, iv
d. iv, i, iii, ii

Answer: d. iv, i, iii, ii


Q4. Double spending is reusing digital assets intentionally or inadvertently True or False?
a. True
b. False

Answer: a. True


These are Blockchain and its Applications Assignment 4 Answers


Q5. In the blockchain, cryptography ensures the authenticity of a transaction and also helps prevent double-spend. Is the above statement True or False?
a. True
b. False

Answer: b. False


Q6. What are Bitcoin exchanges available in India:
i. BuyUCoin
ii. ZebPay
iii. WazirX

a. i and ii
b. ii and ii
c. i and iii
d. i, ii and iii

Answer: a, b, c, d


These are Blockchain and its Applications Assignment 4 Answers


Q7. The primary difference between the permissionless and permissioned blockchain is __________?
a. Access control for the participants in the blockchain network
b. Hash Algorithms
c. Confidentiality
d. Availability

Answer: a. Access control for the participants in the blockchain network


Q8. What is an advantage of a permissionless blockchain?
a. It does not use disinterested third parties to secure blocks, as all participants have a vested interest.
b. It is more resilient against fraud because it uses federated nodes to combat fraud.
c. It is open to everyone in the world without permission and licensing requirements.
d. Its networks are built by for-profit companies and the working of the network is guaranteed.

Answer: c. It is open to everyone in the world without permission and licensing requirements.


These are Blockchain and its Applications Assignment 4 Answers


Q9. After a hard fork, the emerging two chains are incompatible. True or False?
a. True
b. False

Answer: a. True


Q10. Bitcoin protocol runs over
i. TCP
ii. UDP
iii. HTTP
iv. HTTPS

a. i, ii, iii
b. i, iv
c. Only i
d. Only ii

Answer: c. Only i


These are Blockchain and its Applications Assignment 4 Answers

More Solutions of Blockchain and its Applications: Click Here

More NPTEL Solutions: https://progiez.com/nptel-assignment-answers/


These are Blockchain and its Applications Assignment 4 Answers
The content uploaded on this website is for reference purposes only. Please do it yourself first.