NPTEL Blockchain and its Applications Week 4 Assignment Answers 2024

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Blockchain and its Applications Week 4 Assignment Answers 2024

1. After a hard fork, the emerging two chains are incompatible. True or False?

a. True
b. False

Answer :- For Answer Click Here 

2. Which is/are the possible example/s of a double-spending attack?

a. Sammy has a total of 90 unspent bitcoins from two different transactions with
an equal amount of bitcoins each. He tries to send the entire amount at a time each to Nikita and Ayush as transactions
b. Brady bought a car using ‘m’ bitcoins. On delivery, the bitcoins are transferred from his wallet to the dealer’s wallet.
c. Karan has 180 unspent bitcoins. He sends the equal amount each to Dev and Tarun one by one
d. Deepak has 20 unspent bitcoins. He tries to transfer those 20 bitcoins to his two each of his friends simultaneously.

Answer :- For Answer Click Here 

3. Blocks of a blockchain?

a. Transaction data
b. Hash
C. Time stamp
d. None of the above

Answer :- For Answer Click Here 

4. What are some Bitcoin exchanges available in India:

a. BuyUCoin
b. ZebPay
c. WazirX

  • i. a and b
  • i. b and c
  • Ili. a and c
  • iv. a, b and c
Answer :- 

5. “We can achieve consensus with a single crash failure in a perfect asynchronous
network.” This scenario is_______________?

a. Always true
b. Sometimes true
c. Can’t say
d. Impossible

Answer :- 

6. What is the correct order of adding a new block to blockchain

i. Block Mining
ii. Block propagation
iii. Block Flooding
iv. Transaction Flooding

a. iii, iv, ii, i
b. iv, i, III, “I
C. iv, iii, i, 1
d. ii, i, ill, iv

Answer :- For Answer Click Here 

7. Double spending is reusing digital assets intentionally or inadvertently. True or
False?

a. True
b. False

Answer :- 

8. The primary difference between the permissionless and permissioned blockchain is___________?

a. Hash Algorithms
b. Confidentiality
C. Availability
d. Access control for the participants in the blockchain network

Answer :- 

9. What is an advantage of a permissionless blockchain?

a. It does not use disinterested third parties to secure blocks, as all participants have a vested interest.
b. It is open to everyone in the world without permission and approval requirements.
c. It is more resilient against fraud because it uses federated nodes to combat fraud.
d. Its networks are built by for-profit companies and the working of the network is guaranteed.

Answer :- 

10. Bitcoin protocol directly runs over

i. TCP
ii. HTTP
iii. HTTPS

a. i, ii, ill
b. Only ii
C. Only i
d. All of the above

Answer :- For Answer Click Here