Blockchain Word Notes
Blockchain Word Notes
SECTION A
A blockchain explorer is a piece of software that draws data from a blockchain using an API
and a blockchain node, then uses a database to organize the data and present it to the user in a
searchable format.
The process of making an input item of any length represents an output item of a fixed length
is referred to as hashing in the blockchain. Take, for example, the use of blockchain in
cryptocurrencies, where transactions of varying lengths are run through a given hashing
algorithm and all produce a fixed-length performance.
Public Blockchains
Private Blockchains
Consortium Blockchains
Hybrid Blockchains.
Bitcoin(BTC)
Ethereum(ETH)
Ripple(XRP)
Litecoin(LTC)
Bitcoin Cash(BCH)
A miner or a group of miners attempting to control more than 50% of a network’s hashing
capacity, processing power, or hash rate is known as a 51 percent attack on a blockchain
network. The attacker may prevent new transactions from taking place or being verified in
this attack. They can also reverse transactions that have already been verified while in charge
of the network, resulting in a double-spending problem.
In the Blockchain, a block is simply a set of records. The term “blockchain” refers to the
process of joining these lists together. For example, if a company has 100 ledger books, the
total is known as Blockchain, and each ledger is referred to as a block.
Any block in this online ledger consists primarily of a hash pointer that serves as a
connection to the previous block, transaction data, and a time stamp.
11. Are there any network-specific conditions for using Blockchain technology in an
organization?
No, there isn’t any such restriction on using it. However, under the worried protocols, the
network must be a peer-to-peer network. It effectively validates the new block and assists
businesses in keeping up with the pace in this area without relying on third-party
applications.
No, it is not possible to do that. If any customization is needed, the company simply needs to
delete the details from all other blocks as well. Data must be treated with extreme caution
when using this system for no other reason than this.
When the block size is reached, the blockchain creates blocks automatically. Since the block
is a file, the transactions are saved until the file is complete. They are linked in such a way
that the most recent block is connected to the previous one. A hash value is created using a
mathematical function to identify a block. It also shows any modifications made to a block.
They can be removed after they’ve been checked to reduce the blockchain’s size since they
don’t need someone to perform regular operations. It can be re-downloaded if necessary. This
process is called pruning.
Encryption is a technique that is used to keep the data secure. The data is encoded to some
level before being sent out of a network by the sender in this process. Only the receiver will
be able to decode it. This approach is useful in Blockchain because it simply adds to the
overall protection and validity of blocks, making them more stable.
Any users on a network cannot customize a block. As a result, it offers a high degree of
security. Furthermore, every block is protected by cryptography, which is yet another vote in
this case. As a result, there is no need to be concerned about the protection of data in a block.
For a variety of purposes, blockchain can be trusted. Because of its open-source existence,
the first thing that comes to mind is its compatibility with other business applications. The
second factor is its safety. Since it was designed to be used for online transactions, the
developers paid particular attention to keeping up with the times in terms of protection.
Blockchain will help despite the type of company one owns.
A transaction is a value transfer that is recorded in the blockchain between Bitcoin wallets.
Bitcoin wallets store a private key, also known as a seed, which is used to sign transactions
and provide mathematical proof that they came from the wallet’s owner.
19. Is Blockchain an incorruptible ledger?
Blockchain is a truly disruptive technology that has the potential to change business
networks. So, the requirements for a blockchain is as follows:
Smart contracts
Ledgers
Cryptography
Consensus Protocol
Each block in the blockchain is always linked in reverse order. To put it another way,
blockchain connects each block to the one before it. Hence, blocks are linked in the backward
direction.
That’s it for the list of top Blockchain questions for beginners. Let’s move to the next section
of intermediate Blockchain Technology interview questions.
A blockchain has a unique identifier for each block. The hash value is used to create a unique
identifier. As a result, no two block identifiers would be the same. In Blockchain, blocks can
be identified by the block header hash and the block height.
23. Name the common type of ledgers that can be considered by users in Blockchain?
There are three common types of a ledger that can be considered by users in the blockchain:
1. Centralized Network
2. Decentralized Network
3. Distributed Network
The key distinction between blockchain ledger and ordinary ledger is that Blockchain is a
distributed database that can be conveniently decentralized. This method has a much lower
risk of error than a traditional ledger. An ordinary ledger is one that is created by hand or by
human effort, while the Blockchain automates all of its processes. All you have to do now is
set it up properly and according to the instructions.
A transaction that takes place outside of the blockchain is known as an off-chain transaction.
An on-chain transaction – often referred to as simply “a transaction” – modifies the
blockchain and relies on the blockchain to establish its legitimacy, while off-chain transaction
records and validates the transaction using other methods.
Section B
A blockchain wallet is a piece of digital software that stores private and public keys, as well
as tracks and records all transactions involving those keys on the blockchain. A blockchain
wallet, in theory, does not store cryptocurrency; instead, all records belonging to these keys
are stored on the blockchain on which the wallet is hosted.
Blockchain wallets have public and private keys. A public key and a private key are used in a
similar way in blockchain wallets. A public key is similar to an email address in that it can be
shared with others. When your wallet is created, a public key is created as well, which you
can share with others to obtain funds. The private key is a closely guarded secret. It’s similar
to your password in that it shouldn’t be compromised, and you shouldn’t share it.
A smart contract is a computer code-based agreement between two individuals. They are
stored on a public ledger and cannot be modified because they run on the blockchain. A smart
contract’s transactions are handled by the blockchain, which means they can be submitted
automatically without the involvement of a third party.
The Smart contracts are secure, transparent, third-party-free, autonomous, and accurate.
Let me use an example to demonstrate how smart contracts work. If Alex decides to sell his
home to Bob. Then they would pay a slew of fees to third parties such as real estate agents,
banks, and attorneys, and others. However, with a smart contract, they can simply write a
statement stating that if Bob pays this amount of money, he will be given ownership of the
property. Hence, smart contracts can cut down the actual process and give us trustable
options for transactions.
The word “crypto mining” refers to the process of obtaining cryptocurrencies by the use of
computers to solve cryptographic equations. Validating data blocks and applying transaction
records to a public record (ledger) is also a part of this method.
Bitcoin mining is not just the process of putting new bitcoins into circulation, but it is also an
important part of the blockchain ledger’s upkeep and growth. It is carried out with the
assistance of highly advanced computers that solve extremely difficult computational math
problems.
The following are the list of widely-used platforms for blockchain-based applications
IBM Blockchain
EOS
OpenLedger
Corda
Ripple
Ethereum
IOTA
Quorum
OpenChain
Hyperledger Sawtooth
Mostly, blockchain is classified into public and private types. And Hyperledger is an example
of private blockchain.
traditional ledger?
Distributed ledgers, unlike traditional ledgers (think banks, governments, and accountants),
provide a system of synchronized databases that have an auditable background of information
that is accessible to everyone inside the network.
10. What type of records can be kept in Blockchain? Is there any restriction on the
same?
In the Blockchain method, there are no limitations on the number of records that can be held.
It is important to remember that record keeping is not limited to these applications.
The following are examples of the types of information that can be held on them:
1. Bitcoin was founded in the year 2008. Since then, there has been no major damage to
the Bitcoin network. For nearly 30 years, the internet has proved to be a reliable
resource. It’s a track record that bodes well for the future development of blockchain
technology.
2. In the same way, as the internet has built-in robustness, blockchain technology does
as well. The blockchain can’t be managed by any single individual since it stores
blocks of information that are similar across its network. There should be no single
failure point in the blockchain.
The key distinction between blockchain ledger and ordinary ledger is that Blockchain is a
distributed database that can be conveniently decentralized. This method has a much lower
risk of error than a traditional ledger. An ordinary ledger is one that is created by hand or by
human effort, while the Blockchain automates all of its processes. All you have to do now is
set it up properly and according to the instructions.
It occurs when a single digital token is used several times since the token is typically made up
of a digital file that can be easily cloned. It simply causes inflation, and businesses are forced
to take a significant loss. One of the main goals of Blockchain technology is to eradicate this
method as much as possible.
A blind signature is a form of digital signature in which the contents of a message are hidden
(blinded) before they’re signed. As with a standard digital signature, the resulting blind
signature can be publicly validated against the original, unblinded message.
Blind signatures are often used in privacy-related protocols where the signer and message
author are not the same individual. Cryptographic voting systems and digital cash schemes
are two examples.
A transaction that takes place outside of the blockchain is known as an off-chain transaction.
An on-chain transaction – often referred to as simply “a transaction” – modifies the
blockchain and relies on the blockchain to establish its legitimacy, while off-chain transaction
records and validates the transaction using other methods.
16. What are the key principles in Blockchain that are helpful in eliminating the
To eliminate the security threats, The key Principles that are needed to follow are as follows.
All these principles are fundamental and simple to apply. They are helpful in making
transaction documents more valuable.
1. Auditing
2. Securing applications
3. Securing testing and similar approaches
4. Database security
5. Continuity planning
6. Digital workforce training
17. Name the steps that are involved in the Blockchain project implementation?
There is a total of six steps involved in the blockchain project implementation process and
they are:
The cryptographic algorithm that enables peers in a blockchain to obtain funds in their wallet
uses a public key. A pair of keys is created when a public key is connected to a private key.
The private-public key pair is used to ensure that the blockchain’s security is maintained. A
public key is a string of alphanumeric characters that is unique to a specific node or address.
A private key is an alphanumeric term that is used to encrypt and decrypt data associated with
a public key. In blockchain security, It is also a component of the cryptographic algorithms.
The key has been allocated to the key generator and can only be used by him. If he fails to do
so, someone can gain access to the wallet’s information or data, as well as the address for
which the private key is stored.
Every ten minutes, the blockchain network checks in with itself to ensure that it is in a state
of consensus. The network, which functions as a self-auditing ecosystem of digital value,
reconciles any transaction that occurs in ten-minute intervals. A “block” refers to a collection
of these transactions. As a result, two critical properties emerge from this they are:
Identity management
Transaction processing
Documentation
Medical records
Management activities
Business transactions
SECTION C
Using Blockchain you can build public and private Blockchain whereas with Hyperledger
you can only build private Blockchains.
Blockchain is divided into public, private, and consortium Blockchains and Hyperledger is a
private Blockchain technology with access to Blockchain data and is limited to predefined
users, configurations, and programming.
Blockchain can be used in multiple fields such as business, government, healthcare, etc.
while Hyperledger is primarily used for enterprise-based solutions. Wherever we talk about
public Blockchain, it refers to the usage of Blockchain on the internet, and Hyperledger-
based Blockchain solutions are solutions meant for usage on the intranet, within an
organization.
2. How do you explain Blockchain technology to someone who doesn't know it?
Blockchain technology is a distributed ledger, which stores transaction details in the form of
immutable records or non-modifiable records (called blocks) which are secured using
cryptography.
Let’s consider the example of a school where Blockchain is similar to a digital report card of
a student. Say, each block contains a student record that has a label (stating the date and time)
of when the record was entered. Neither the teacher nor the student will be able to modify the
details of that block or the record of report cards. Also, the teacher owns a private key that
allows him/her to make new records and the student owns a public key that allows him to
view and access the report card at any time. So basically, the teacher owns the right to update
the record while the student only has the right to view the record. This method makes the data
secure.
Merkel Tree is a data structure that is used for verifying a block. It is in the form of a binary
tree containing cryptographic hashes of each block. A Merkle tree is structured similarly to a
binary tree where each leaf node is a hash of a block of transactional data and each non-leaf
node is a hash of its leaf node. The Merkel root or hash root is the final hash root of all the
transaction hashes. It encompasses all the transactions that are underlying all the non-leaf
nodes.
Blockchain is a distributed database of immutable records called blocks, which are secured
using cryptography. Refer to the video to see the various attributes of a block.
There are a previous hash, transaction details, nonce, and target hash value. A block is like a
record of the transaction. Each time a block is verified, it gets recorded in chronological order
in the main Blockchain. Once the data is recorded, it cannot be modified.
In a distributed ledger, identities are unknown and hidden whereas in traditional ledger
identities of all participants have to be known before the transactions happen.
In a distributed ledger, there is no single point of failure as the data is distributed and
information is shared across multiple nodes. If one node fails, the other nodes carry the
same copy of the information. In comparison, traditional ledgers have a single point of
failure. If a single system crashes, the entire network comes to a standstill.
In a distributed ledger, data modification or change cannot be done but for a traditional
ledger, it is possible.
The copy of the ledger is shared amongst participants in a distributed ledger while in a
traditional ledger, a single copy is maintained in a centralized location. It is not shared
amongst the participants.
It has a value called the nonce. The nonce is a random value which is used to vary the
value of the hash in order to generate hash value less than the target
Hash of the block itself. It is the digital signature of the block and an alphanumeric value
used to identify a block
The hash address is the unique identification of the block. It is a hex value of 64 characters
that have both letters and digits. It is obtained by using the SHA - 256 algorithms.
Refer to the video to see how a block is structured. The hash of the previous block,
transaction data, and the nonce consolidate the header of the block. They are together passed
through a hashing function and then the hash value is generated.
Cryptography uses public and private keys in order to encrypt and decrypt data. In the
Blockchain network, a public key can be shared with all the Bitcoin users but a private key
(just like a password) is kept secret with the users.
Blockchain uses SHA - 256 which is secure and provides a unique hash output for every
input. The basic feature of this algorithm is whatever input you pass, it will give you a
standard alphanumeric output of 64 characters. It is a one-way function from which you can
derive an encrypted value from the input, but not vice-versa.
There are three different types of Blockchain - Public, Private, and Consortium Blockchain.
Public Blockchain ledgers are visible to all the users on the internet and any user can verify
and add a block of transactions to the Blockchain. Examples, Bitcoin, and Ethereum.
Private Blockchain ledgers are visible to users on the internet but only specific users in the
organization can verify and add transactions. It’s a permissioned blockchain, although the
information is available publicly, the controllers of the information are within the
organization and are predetermined. Example, Blockstack.
The genesis block is the first block in the Blockchain which is also known as block 0
In Blockchain, it is the only block that doesn’t refer to its previous block.
level of difficulty,
Following these steps, the encrypted hash, along with other information (such as the
hashing algorithm), is called the digital signature.
SHA - 256
RSA (Rivest-Shamir-Adleman)
Triple DES
Ethash
Blowfish
Smart contracts are self-executing contracts which contain the terms and conditions of an
agreement between the peers
Protecting copyrighted content: Smart contracts can protect ownership rights such as music or
books
13. What is the Ethereum network and how many Ethereum networks are you familiar with?
Live network (main network) - Smart contracts are deployed on the main network
Test network (like Ropsten, Kovan, Rinkeby) - Allow users to run their smart contracts
with no fees before deploying it on the main network
Private network - Are those which are not connected to the main network. They run within
the premises of the organization but carry the features of an Ethereum network.
Nodes run smart contracts code on Ethereum Virtual Machine (EVM). It is a virtual machine
designed to operate as a runtime environment for Ethereum-based smart contracts.
EVM is operated in a sandboxed environment (isolated from the main network). This is a
perfect testing environment.
You can download the EVM, run your smart contract locally in an isolated manner and once
you have tested and verified it, you can deploy it on the main network.
Dapp:
A Dapp has its back-end code (smart contract) which runs on a decentralized peer-to-peer
network
Process:
Front-end
Normal application:
Process:
Front-end
API
17. Name the steps that are involved in the Blockchain project implementation.
Requirement identification:
Planning stage
In this stage and individual evaluates all requirements and decides a suitable blockchain
platform to be implemented.
Storage:
It is extremely expensive
Memory:
It can be accessed only during contract execution. Once the execution is finished, its data
is lost
Stack:
19. What is the fork? What are some of the types of forking?
In simple terms, updating a cryptocurrency protocol or code is called forking. Fork implies
that a Blockchain splits into two branches. It can happen when the participants of the network
cannot come to an agreement with regards to the consensus algorithm and new rules to
validate transactions.
Hard forks
Soft forks
Accidental forks
In Blockchain, PoW is the process of solving a complex mathematical puzzle called mining.
Here, the probability of mining a block is based upon the amount of computational work done
by a miner. Miners spend a lot of computing power (with hardware) for solving the
cryptographic puzzle.
PoS is an alternative to PoW in which the Blockchain aims to achieve distributed consensus.
The probability of validating a block relies upon the number of tokens you own. The more
tokens you have, the more chances you get to validate a block. It was created as a solution to
minimize the use of expensive resources spent in mining.
21. What are function modifiers in Solidity? Mention the most widely used modifiers.
In Solidity, function modifiers are used to easily modify the behavior of your smart contract
functions. In simple terms, it can build additional features or apply restrictions on the
function of smart contracts. The most extensively used function modifiers in solidity are:
View, which are functions that cannot modify the state of a smart contract. They are read-
only functions. Refer to our video to see an example of a View function
Pure, which are functions that neither read nor write the state of a smart contract. They return
the same result determined by its input values. Refer to our video to see an example of a Pure
function.