NPTEL Blockchain and its Applications Week 5 Assignment Answers 2024

Join Our WhatsApp Group Join Now
Join Us On Telegram Join Now

NPTEL Blockchain and its Applications Week 5 Assignment Answers 2024

1. The height of the block is the___________in the chain between it and the genesis block.

a. Metafiles
b. Hash
c. Log size
d. Number of blocks

Answer :- For  Answer Click Here 

2. What is the CLI command used to send ethers after the nodes have been initialized?

a. eth.submitTransaction)
b. eth. sendTransaction)
c. eth. sendIBANTransaction)
d. eth.sendRawTransaction)

Answer :- For  Answer Click Here

3. Which of the following syntax is correct to write data in a smart contract using solidity

a. myContract.methods.store(“55”).set()
b. myContract. methods.write(“55”).send()
c. myContract.methods.store(“55”).send()
d. myContract.methods.write(“55”).set()

Answer :- For  Answer Click Here

4. What is the limitation of using the consensus algorithm Proof of Work (PoW)?

a. A lot of mining power is wasted as only one gets success in mining at a time
b. PoW is used for permissioned blockchain
c. It is used for blockchain mining
d. High transaction throughput

Answer :- 

5. Which statement(s) is/are true for PoS(Proof of Stake) consensus?

a. Depends on the work done by the miner
b. Depends on the amount of crypto currency the miner holds
c. Provides less protection in general
d. None of the above

Answer :- 

6. Which of the following is/are applicable for PoET(Proof of Elapsed Time) consensus

a. Each participant in the blockchain network waits a random amount of time
b. The first participant to finish becomes the follower for the new block
c. Trusted execution platform and attestation are used to verify that the proposer
has really waited
d. The first participant to finish becomes the leader for the new block.

Answer :- For  Answer Click Here

7. Proof of Burn consensus algorithms also consider virtual resources or digital coins for participating in the mining activity?

a. True
b. False

Answer :- 

8. 15 ether equals

a. 15X(10 ^ 16) wei
b. 15X(10 ^ 18) wei
c. 15X(10 ^ 6) wei
d. 15X(10 ^ 8) wei

Answer :- 

9. How an attacker could manipulate the transaction history of an existing blockchain

a. The attacker hard-forked the network and created a new blockchain network.
b. The attacker modified the smart contract and recovered the investor’s
c. The attacker gained control of more than 51% of the network’s computing
power.
d. The attacker gained control of less than 49% of the network’s computing
power.

Answer :- 

10. What library/API is used for smart contract deployment and invocation from Dapp?

a. Contract
b. web3
c. admin
d. eth

Answer :- For  Answer Click Here