Blockchain and its Applications | Week 9
Course Name: Blockchain and its Applications
Course Link: Click Here
These are Blockchain and its Applications Assignment 9 Answers
Q1. Which of the following statements is true for Byzantine Fault Tolerant (BFT) protocol.
a. The system should work correctly even in presence of malicious users within
the defined limit of faulty nodes.
b. BFT Protocol is used generally in a permissioned system in its basic form.
c. RAFT is a type of BFT protocol
d. None of the above
Answer: a, b
Q2. Algorand in general is safe under weak synchrony.
a. True
b. False
Answer: a. True
These are Blockchain and its Applications Assignment 9 Answers
Q3. Which of the following is/are applicable for standard Algorand
a. Forking issue not present
b. Highly scalable
c. Need large network to perform optimally
d. Uses random committee
Answer: a, b, c, d
Q4. Which of the following is/are true for Single Sign-On(SSO) based systems.
a. Single identity for various purposes
b. One password to access multiple services
c. Single identity provider can maintain the identity
d. None of the above
Answer: a, b,c
These are Blockchain and its Applications Assignment 9 Answers
Q5. Which of the following is/are true for Decentralized Identifier (DID)
a. Digital representation of physical identity
b. Individuals can control the usage of their own identity
c. Provides Verifiable presentation of the ID
d. DID helps in trusted data exchange
Answer: a, b, c
Q6. Which of the following is/are true for a DID document.
a. A set of data describing the DID subject
b. Includes cryptographic mechanism
c. Consists mapping of entries
d. None of the above
Answer: a, b, c, d
These are Blockchain and its Applications Assignment 9 Answers
Q7. DIDs only allow a DID controller to prove its control over its DID Document.
a. True
b. False
Answer: a. True
Q8. In Verifiable Credential (VC), a claim is a statement about a
a. Holder
b. Subject
c. Issuer
d. Verifier
Answer: b. Subject
These are Blockchain and its Applications Assignment 9 Answers
Q9. Censoring of data registry is a major problem mainly in centralized systems
a. False
b. True
Answer: b. True
Q10. Which of the following steps is/are valid for DID Registration?
a. Register DID
b. Create DID Document
c. Authenticate DID Controller
d. Update DID Document
Answer: a, b, c, d
These are Blockchain and its Applications Assignment 9 Answers
More Solutions of Blockchain and its Applications: Click Here
More NPTEL Solutions: http://13.235.254.184/nptel/
