block_assignments
block_assignments
Comprehensive Notes
1. Blockchain Fundamentals:
2. Cryptographic Concepts:
3. Bitcoin Overview:
4. Consensus Mechanisms:
5. Smart Contracts:
7. Hyperledger Fabric:
Practice MCQs
1. What is the primary purpose of a Merkle Tree in blockchain?
Answer: C
Answer: C
B) Proof of Work
Answer: B
B) Public accessibility
Answer: C
A) Peer
B) Client
C) Ordering Service
Answer: C
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Which of the following statements is true regarding the foundational concepts of blockchain and
cryptography?
a) Decentralization in blockchain ensures that a single authority controls the network for higher
efficiency.
b) SHA-256 is a cryptographic hash function widely used in blockchain due to its fixed output
size and collision resistance.
c) A hash chain is a sequence of cryptographic keys used to decode blockchain data.
d) Cryptographic hash ensures that the blockchain data cannot be read by anyone outside the
network.
Answer: (b)
Detailed solution:
Option (b) is correct because SHA-256 is a cryptographic hash function with features like fixed
output, pre-image resistance, and collision resistance, making it ideal for blockchain.
QUESTION 2
An attacker wants to find a collision in a cryptographic hash function with a 256-bit output. What is
the approximate number of hash operations required to succeed?
a) 1 × 2128
b) 0.75 × 2128
c) 1 × 2256
d) 0.5 × 2256
Answer: (a)
Detailed solution:
Option (a) is correct because If a hash function produces 𝑁 bits of output, an attacker needs to
compute only 2𝑁/2 hash operations on a random input to find two matching outputs.2256/2 = 2128 =1 ×
2128
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
A blockchain network uses SHA-256 for its hashing process. If it takes 10-6 seconds to compute a
single SHA-256 hash, how long would it take (approximately) to compute 2128 hashes for a collision
attack?
a) 1010 years
b) 1015 years
c) 1020 years
d) 1025 years
Answer: (d)
Detailed solution:
Total time to compute 2128 hashes: 2128 ×10-6 ≈ 3.4 × 1032 seconds.
Convert seconds to years: 1 year = 3.15×107 seconds ⇒ (3.4× 1032) / (3.15× 107) ≈ 1025 years.
QUESTION 4
In a decentralized distributed system with 100 participants, which of the following statements is true
regarding trust and communication?
a) At least 50 participants must trust each other for the system to function.
b) A central body governing communication among all 100 participants is mandatory.
c) Participants may or may not trust each other, as the system ensures integrity using
cryptographic protocols and agreement through consensus protocols.
d) All the 100 participants must trust each other.
Answer: (c)
Detailed solution:
Option (c) is correct because decentralized systems rely on cryptographic mechanisms and consensus
protocols, making trust among participants unnecessary. Option (a) is incorrect, as trust among the
participants is not a requirement for decentralized systems. Option (b) is incorrect, as decentralized
systems operate without a central governing body.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
A blockchain network achieves an average block generation time of 5 minutes under normal
conditions. However, due to scheduled maintenance, the network's hash rate is reduced by 50% for 4
hours daily. If the network operates for 12 hours in total (including the maintenance period), how
many blocks will be added to the blockchain?
a) 120
b) 200
c) 216
d) 240
Answer: (a)
Detailed solution:
For 8 hours at full efficiency: (60 min / 5 min) = 12 blocks/hour, so 12 × 8 = 96 blocks.
For 4 hours at 50% efficiency: (12 blocks / 2 ) 6 blocks/hours, so 6 × 4 = 24 blocks.
Total blocks = 96 + 24 = 120 blocks.
QUESTION 6
Answer: (d)
Detailed solution:
Blockchain transaction logs are stored in a distributed ledger across all peers (nodes) in the network,
ensuring decentralization and immutability.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
Which of the following describes the avalanche effect in a cryptographic hash function?
a) Given the same input, the hash function returns a different hash 99.99% of the time.
b) It takes 105 attempts to reverse-engineer the original message from the hash.
c) A small change in the input causes a drastic change in the hash, flipping nearly all the bits.
d) The hash function always returns the same hash for the same input.
Answer: (c)
Detailed solution:
The avalanche effect ensures that even a tiny change in the input (like flipping a single bit) results
in a significantly different hash, with most of the output bits changing.
QUESTION 8
Answer: (b)
Detailed solution:
A blockchain is a decentralized and distributed ledger system where data is stored across multiple
nodes (computers), ensuring that no single entity has control. It is also immutable, meaning once data
is recorded in a block, it cannot be altered without the consensus of the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
a) Cross-border payments
b) Supply chain management
c) Centralized Anti-money laundering tracking system
d) Maintaining data over a single database server
Detailed solution:
Blockchain technology is used in cross-border payments, supply chain management, and
decentralized anti-money laundering tracking systems for decentralization, transparency, and
security.
QUESTION 10
In a blockchain using SHA-256, if the hashes of strings A and B are concatenated and then hashed
again, what is the length of the final hash?
a) 256 bits
b) 512 bits
c) 128 bits
d) 1024 bits
Answer: (a)
Detailed solution:
SHA-256 always produces a fixed 256-bit hash, regardless of input size. Even after concatenating
two hashes and rehashing, the output will still be a 256-bit hash.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Alice employs the RSA cryptosystem with the prime numbers p=11 and q=19 to derive her public
and private keys. Given that her public key is e=11, what is her corresponding private key d?
a) 35
b) 131
c) 101
d) 149
Answer: (b)
Detailed solution:
Compute ϕ(n)=(p−1)(q−1)=180.
Find d as the modular inverse of e=11 modulo ϕ(n)=180 using d = e-1 (mod 180)), giving d=131
QUESTION 2
Alice wants to send a message to Bob with confidentiality and integrity. The steps are as follows:
Answer: (c)
Detailed solution:
Alice first encrypts the message using Bob’s public key for confidentiality and signs the hash of the
message with her private key to ensure integrity and authenticity. Bob then decrypts the message with
his private key and verifies Alice’s signature using her public key to confirm the message’s
authenticity and integrity.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Answer: (b)
Detailed solution:
Digital signatures in blockchain ensure that the sender cannot deny sending the transaction (non-
repudiation) and that the recipient can verify the authenticity and integrity of the transaction
(verifiability).
QUESTION 4
What is the primary purpose of Alice signing a message with her private key in a blockchain
transaction?
Answer: (c)
Detailed solution:
When Alice signs a message with her private key, it serves as proof that the message came from her
(authentication) and ensures the integrity of the message (it hasn't been tampered with).
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Consider 6 data points labeled 1 to 6. The post-order traversal of the Merkle Tree is provided as
follows (where 1 represents the hash of data point 1, 43 denotes the combined hash of 4 and 3, and
so on):
Answer: (c)
Detailed solution:
Post-order traversal : {1, 2, 12, 3, 4, 34, 1234, 5, 6, 56, 56, 5656, 12345656}
QUESTION 6
a) Future nonce
b) Block size
c) Previous Block Hash
d) Transaction Timestamp
Answer: (c)
Detailed solution:
In a blockchain, each block contains a previous block hash. This hash pointer links the current block
to the previous one, ensuring the integrity and immutability of the blockchain.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
Which of the following does not align with the primary design goals of cryptocurrency development?
Answer: (c)
Detailed solution:
Centralized control over transactions: This contradicts the essence of cryptocurrencies, which are
designed to operate without central authority or intermediaries.
QUESTION 8
Which of the following statements is/are true regarding Bitcoin and its consensus algorithm?
1. Bitcoin uses Proof of Work (PoW) for transaction validation and block addition.
2. Bitcoin operates on a peer-to-peer (P2P) network.
3. Bitcoin uses Proof of Stake (PoS) for centralization.
4. Miners are rewarded with transaction fees and block rewards in Bitcoin.
a) 1, 2, 3
b) 2, 3, 4
c) 1, 2, 4
d) 1, 3, 4
Answer: (c)
Detailed solution:
Bitcoin uses Proof of Work (PoW) for consensus, where miners solve cryptographic puzzles to
validate transactions and add blocks to the blockchain. The network operates on a decentralized peer-
to-peer (P2P) model, with no central server, allowing nodes to communicate directly. Miners are
incentivized with transaction fees and block rewards for securing the network by validating and
adding blocks.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
Answer: (a)
Detailed solution:
In Bitcoin, safety ensures the integrity of the blockchain by preventing invalid transactions, such as
double-spending.
QUESTION 10
Which of the following is the primary goal of a consensus algorithm in a distributed system?
Answer: (b)
Detailed solution:
The primary goal of a consensus algorithm is to ensure that all nodes in a distributed system agree
on a single value or state, even if some nodes may fail or act maliciously. This is crucial for
maintaining consistency and reliability across the system.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
If the current block reward for Bitcoin is 6.25 BTC, and the difficulty adjustment mechanism is such that,
on average, a new block is found every 10 minutes, how much Bitcoin will be mined per day (24 hours)?
a) 75 BTC
b) 144 BTC
c) 900 BTC
d) 1,080 BTC
Answer: (c)
Detailed solution:
The block reward is 6.25 BTC.
There are 144 blocks mined in a 24-hour period (24 hours × 60 minutes / 10 minutes per block).
In one day, the total Bitcoin mined would be 144 × 6.25=900 BTC.
QUESTION 2
Answer: (b)
Detailed solution:
A permissioned blockchain restricts the ability to write or validate transactions to authorized
participants. This controlled access enhances security and privacy within the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following combinations is correctly used to compute Bitcoin's current block hash?
a) Previous block’s hash, Merkle root, block reward, nonce, timestamp, and block size
b) Previous block’s hash, timestamp, nonce, Merkle root, difficulty bits, and block version
c) Block creator’s public key, Merkle root, timestamp, block reward, nonce, and difficulty level
d) Previous block’s hash, nonce, Merkle root, height, timestamp, and difficulty bits
Answer: (b)
Detailed solution:
Please refer to the Week 3 Lecture 13.
QUESTION 4
Which of the following difficulty targets would make it most difficult for miners to find a valid block?
a) 0000000000000000000000000000000000000000000000000000000000056789abcdef123
b) 000000000000000000000000000000000000000000000000000000002dfe34a1b2c3d555
c) 00000000000000000000000000000000000000000000000000000000000afc123987abc
d) 00000000000000000000000000000000000000000000000000000000000000000af46789
Answer: (d)
Detailed solution:
The difficulty target with 52 leading zeros (option d) is the most difficult for miners to find a valid
block.
Therefore,00000000000000000000000000000000000000000000000000000000000000000af467
89 is the correct choice.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Answer: (b)
Detailed solution:
The Bitcoin block identifier (block hash) contains Double SHA256 on the current block header. This
means performing SHA256 twice. Please refer to the Week 3 Lecture 13.
QUESTION 6
In a Merkle tree with n transactions (n is a power of 2), if one transaction is invalid, how many
recalculations are needed to detect and correct the invalid transaction?
a) n/2
b) log2 (n) + 1
c) n−1
d) 3log2 (n)
Answer: (b)
Detailed solution:
The Merkle tree recalculates the hashes at each level up to the root for verification. This requires
recalculating one hash at each of the log2 (n) levels, plus one final hash for the root.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
Which of the following Bitcoin script opcode is needed to remove the second-to-top stack item?
a) OP_DELETE
b) OP_2POP
c) OP_DEQUE
d) OP_NIP
Answer: (d)
Detailed solution:
Bitcoin Script uses specific opcodes like OP_DROP, OP_NIP, etc., to manipulate the stack. OP_NIP
is explicitly designed to remove the second-to-top stack item.
QUESTION 8
If a Merkle tree has 8 transactions, how many hashes are required to compute the Merkle root?
a) 8
b) 15
c) 16
d) 7
Answer: (b)
Detailed solution:
In a Merkle tree with 8 transactions, 7 additional hashes are needed to compute the Merkle root as
pairs of transaction hashes are combined recursively at each level. The total hashes, including the
leaves, are 15: 8 leaf hashes and 7 parent hashes.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
Answer: (d)
Detailed solution:
In Bitcoin mining, the nonce is a random or arbitrary number that miners adjust in the block header
during mining. This value is modified to change the resulting hash of the block header to meet the
required difficulty target.
QUESTION 10
Answer: (b)
Detailed solution:
If the number of transactions is odd, pairs cannot be formed for the suitable structure of the Merkle
tree. To fix this, dummy (duplicate) hashes are added to make the number of transactions even,
allowing the tree to be constructed properly. Please refer to the Week 3 Lecture 14.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
a) A change in the Bitcoin protocol that leads to the creation of a new version of the blockchain
b) A new type of cryptocurrency that does not rely on blockchain technology
c) A collaborative process for miners to resolve conflicts in the blockchain
d) None of the above
Answer: (a)
Detailed solution:
In the context of Bitcoin, a "fork" refers to a change in the protocol or rules of the network, which
can result in the creation of a new version of the blockchain.
Please refer to the Week 4 Lecture 16.
QUESTION 2
Suppose a miner initially receives 100 bitcoins as a reward for successfully mining a block at time Jan, 2009.
The reward for mining a block is halved approximately every four years (or after every 210,000 blocks).
Based on this halving process, which of the following statements are correct? (Please note that once the
reward is halved, it will remain the same until four years have been completed or after every 210,000 blocks.)
a) In Jan 2013, the miner will receive 50 bitcoins for adding a new block.
b) In Jan 2018, the miner will receive 25 bitcoins for adding a new block.
c) In Jan 2021, the miner will receive 12.5 bitcoins for adding a new block.
d) In Jan 2024, the miner will receive 6.25 bitcoins for adding a new block.
Detailed solution:
The Bitcoin block reward halves approximately every 4 years (after 210,000 blocks). From Jan 2009
reward was 100 bitcoins(same for 2010, 2011, and 2012); By Jan 2013, the reward was 50
bitcoins(same for 2014, 2015, and 2016); by Jan 2018 it was 25 bitcoins(same for 2017, 2019, and
2020); and by Jan 2021 it was 12.5 bitcoins(same for 2022, 2023, and 2024). By Jan 2024, the halving
to 6.25 bitcoins will not yet have occurred, making the last statement incorrect.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
a) A centralized authority will be used to verify each transaction before it is added to the blockchain.
b) Relying on a proof-of-work consensus mechanism ensures that only one valid transaction is
accepted.
c) All transactions are stored in a centralized database that tracks each Bitcoin's status.
d) By limiting Bitcoin transactions to one per user per day.
Answer: (b)
Detailed solution:
The proof-of-work consensus mechanism in Bitcoin prevents double-spending by requiring miners to solve
cryptographic puzzles to add new blocks. This ensures transactions are verified by multiple miners and
nodes, making it nearly impossible for double spending to occur.
QUESTION 4
Answer: (b)
Detailed solution:
Please refer to the Week 4 Lecture 18.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Which of the following is not included in a block of a blockchain?
a) Transaction data
b) Hash
c) Timestamp
d) IP address of the miner
Answer: (d)
Detailed solution:
The miner's IP address is not included in a blockchain block. The other options—transaction data,
cryptographic hash, and timestamp—are standard components of a blockchain block.
QUESTION 6
Which of the following is not a failure that blockchain tries to handle , as rather an attack that a blockchain
can try to defend to ensure prevention?
a) Crash Fault
b) Double Spending
c) Byzantine Fault
d) Link Fault
Answer: (b)
Detailed solution:
QUESTION 7
a) Safety ensures transactions are irreversible, while Liveness ensures transactions are
eventually added.
b) Safety guarantees quick transaction confirmation, while Liveness prevents forks.
c) Safety prevents double-spending, while Liveness speeds up block creation.
d) Safety ensures blocks are always valid, while Liveness ensures no transaction delays.
Answer: (a)
Detailed solution:
Safety ensures that once a transaction is confirmed, it cannot be reversed, preventing issues like
double-spending. Liveness ensures that transactions will eventually be added to the blockchain, even
if there are delays or forks.
Please refer to the Week 4 Lecture 19.
QUESTION 8
What is the main purpose of the Proof of Work (PoW) mechanism in Bitcoin?
Answer: (d)
Detailed solution:
Please refer to the Week 4 Lecture 19.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
What is the correct order of events when adding a new block to the Bitcoin blockchain?
Answer: (b)
Detailed solution:
Please refer to the Week 4 Lecture 19.
QUESTION 10
Which of the following statements is incorrect regarding Proof of Work (PoW) in the context of
forks, attacks, and the monopoly problem?
a) PoW forks can occur when two miners independently solve the puzzle at the same time,
leading to a brief divergence in the blockchain.
b) While PoW encourages miners to follow the longest chain, it does not prevent attacks like
51% attacks, where malicious miners can control the blockchain.
c) The Monopoly Problem refers to a situation where a single miner or group controls a majority
of the network’s hashing power, undermining decentralization.
d) Proof of Work ensures complete decentralization by preventing any miner from controlling
the majority of the hashing power.
Answer: (d)
Detailed solution:
Please refer to the Week 4 Lecture 20.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
What is/are the limitations of using the consensus algorithm Proof of Work (PoW)?
a. A lot of mining power is wasted as only one gets success in mining at a time
b. PoW is typically used for permissioned blockchain
c. It is used for blockchain mining
d. High costs and difficulty in supporting large-scale adoption
Detailed solution:
Please refer to the slide Week 5 slide. The PoW has limitations of wastage of power, high costs, and
large-scale adoption.
QUESTION 2
Which of the following is/are not applicable for PoET(Proof of Elapsed Time) consensus
Answer: (b)
Detailed solution:
POET uses a trusted execution platform, say as Intel SGX and H/W attestation. Please refer to the slide for
details.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
How an attacker could manipulate the transaction history of an existing blockchain whose ledger cannot be
modified, only it is possible to append?
a. The attacker hard-forked the network and created a new blockchain network.
b. The attacker modified the smart contract and recovered the investor's cryptocurrency.
c. The attacker gained control of more than 51% of the network’s computing power.
d. The attacker gained control of less than 49% of the network’s computing power.
Answer: (c)
Detailed solution:
Refer to the Week 5 Lecture slide for 51% attack.
QUESTION 4
Answer: (b)
Detailed solution:
The EVM executes smart contracts and ensures decentralized agreement on computations.
QUESTION 5
Which of the following syntax is correct to write data in a smart contract using solidity
a. myContract.methods.store("10").set()
b. myContract.methods.write("10").send()
c. myContract.methods.store("10").send()
d. myContract.methods.write("10").set()
Answer: (c)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed solution:
Please refer to the Week 5 Lecture slides on how to execute a smart contract.
QUESTION 6
a. 25 × 108 Gwei
b. 25 × 1010 Gwei
c. 25 × 107 Gwei
d. 25 × 109 Gwei
Answer: (a)
Detailed solution:
Ether to Wei converter: https://eth-converter.com/.
QUESTION 7
a. eth_sendTransaction
b. eth_getBalance
c. eth_getBlockByNumber
d. eth_getTransactionByHash
Answer: (b)
Detailed solution:
The eth_getBalance method retrieves the current balance of a specified Ethereum account.
QUESTION 8
What parameter in an Ethereum transaction specifies the fee for computational resources required?
a. Gas
b. Nonce
c. Data
d. Value
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Answer: (a)
Detailed solution:
Gas defines the fee required for computational operations in a transaction
QUESTION 9
Which of the consensus algorithms requires miners to show a proof of sending coins to a verifiably un‐
spendable address?
Answer: (c)
Detailed solution:
Proof of Burn consensus algorithm requires miners to show a proof of burning coins i.e sending coins to a
verifiably un‐spendable address
QUESTION 10
What is the main difference between PoS (Proof of Stake) and PoW (Proof of Work)?
a. PoS requires computational work; PoW requires a stake.
b. PoS relies on the stake held by miners; PoW relies on computational power.
c. PoS consumes external resources; PoW consumes virtual resources.
d. PoS eliminates the need for block validation.
Answer: (b)
Detailed solution:
In PoS, block mining probability depends on the amount of stake held, unlike PoW, which depends
on computational effort.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
What is/are the primary distinction between crash faults and Byzantine faults?
Answer: (b)
Detailed solution:
Byzantine faults involve nodes behaving maliciously, whereas crash faults occur when nodes fail
passively.
QUESTION 2
Suppose you execute your tasks distributedly from four different systems at four different locations. To
maintain the consensus among the systems, you are using the BFT model. You found that one system is
permanently failed due to a hardware fault and another system is compromised by an attacker. Does your
system correctly work at all?
a. No
b. Yes, with the remaining nodes
c. Yes, with all the nodes
d. Yes, but with reduced efficiency
Answer: (a)
Detailed solution:
We need at least 3F+1=3(1)+1=3F + 1 = 3(1) + 1 = 4 systems to tolerate 1 Byzantine fault. Since one
system has permanently failed (crash fault), the remaining systems cannot maintain consensus.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
In Paxos, what will a proposer do if it receives a promise containing an already accepted value?
a. Use the previously accepted value with the highest ID
b. Propose a completely new value
c. Abort the consensus
d. Ignore the promise and continue
Answer: (a)
Detailed solution:
The proposer will use the value with the highest ID. Refer to week 6 lecture notes.
QUESTION 4
Which of the following is/are true regarding the permissioned blockchain model?
Detailed solution:
In the permissioned blockchain model, users are authenticated through MSP and users know each other.
But security and consensus are still required. The transactions are only visible to authorized participants.
QUESTION 5
Answer: (c)
Detailed solution:
A majority of promises in Paxos ensure safety by preventing conflicting proposals from proceeding
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 6
If there are 3 faulty nodes, at least how many nodes are needed to reach consensus in the Byzantine Fault
Tolerance (BFT) system?
a. 4
b. 8
c. 7
d. 10
Answer: (d)
Detailed solution:
f = 3 Total nodes required = 3f + 1 = 9 + 1 = 10
QUESTION 7
Which of the following is/are true regarding a consensus when there is one good commander, one good
lieutenant, and one faulty lieutenant in a Byzantine Generals Problem.
a. Consensus is always possible
b. Consensus is not possible because the faulty lieutenant can mislead
c. Consensus is not possible because the commander can mislead
d. Consensus will be possible if there are additional good lieutenants
Detailed solution:
One fault. Total nodes required = 3f + 1 = 3 + 1 = 4. But we have 3 nodes. In this case, the faulty
lieutenant can mislead. The consensus is possible if we have additional good lieutenants.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 8
Answer: (c)
Detailed solution:
Multi-Paxos extends Paxos to achieve consensus over a series of values. There is no termination guarantee.
QUESTION 9
Detailed solution:
Paxos is designed to handle only crash faults. Also, the consensus is reached on the value, not on
ID.
QUESTION 10
In Paxos, which of the following is/are true about the roles of nodes?
a. A node cannot play more than one role
b. A proposer node cannot become a learner
c. A node can play one or more than one role
d. An acceptor node cannot become a learner
Answer: (c)
Detailed solution:
In Paxos, a node can play more than one role at the same time.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Detailed solution:
Refer to Lecture 31: Byzantine Dissemination Quorum: Intersection: Any two quorums have at least one
correct replica in common. Availability: There is always a quorum available with no faulty replicas
QUESTION 2
If you have f number of total faulty nodes, then you need at least how many replicas to reach consensus
considering the possibility of both crash fault or byzantine fault.
a. 2f + 1
b. 3f + 1
c. f +1
d. 3f
Answer: (b)
Detailed solution:
Considering the byzantine fault, 3f + 1 replicas are required to reach a consensus. This is greater than 2f +
1 replicas, which is enough to handle crash faults, too.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
a. Hashing
b. Symmetric encryption
c. Digital signatures
d. Sharding
Answer: (c)
Detailed solution:
PBFT utilizes digital signatures to ensure the authenticity and integrity of messages
QUESTION 4
a. Cryptographic signatures
b. View change protocol
c. Pre-prepare and Prepare phases
d. Timeout mechanism
Answer: (b)
Detailed solution:
The view change protocol allows the system to elect a new primary when the current primary fails.
QUESTION 5
Which of the following statement(s) are not true regarding Hyperledger frameworks?
a. Hyperledger frameworks are primarily used for building permissioned blockchains for
organizations.
b. Hyperledger frameworks are developed for mainly building public blockchains.
c. Hyperledger frameworks can not use CouchDB.
d. Hyperledger frameworks are only used for building smart contracts for public blockchains
Detailed solution:
Fabric is primarily used for building permissioned blockchains for organizations. It is an open source
project so anyone can use it to build a permissioned blockchain and deploy smart contracts on it. The
states can be maintained using light weight databases such as Level DB, CouchDB etc.
QUESTION 6
a. Reduced transaction time in general, from days to near instantaneous for legacy based cross-border
interactions
b. The sole centralized authority has been able to remove overheads and cost
c. Supports transparency and traceability in transactions
d. Always increases transaction costs due to complexity
Detailed solution:
Refer to Lecture 33. The benefits of Blockchain for business include reduced transaction time by
enabling near-instantaneous cross-border transactions and supporting transparency and traceability
through immutable ledger. Blockchain does not involve a centralized authority to remove overheads, and
while complexity may increase costs, the goal is to ultimately reduce transaction costs.
QUESTION 7
Which of the following are characteristics of permissioned blockchains (in comparison with permissionless
blockchains)?
Answer: (a)
Detailed solution:
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Permissioned blockchains use closed membership consensus algorithms and have a high transaction
throughput. However, they are less scalable in accommodating a large number of nodes compared to
permissionless blockchains. Refer to Lecture 33.
QUESTION 8
Which of the following abstractions in Hyperledger Fabric primarily provides confidentiality to individual
ledgers ?
a. Ordering Services
b. Peers
c. Channels
d. Consensus
Answer: (c)
Detailed solution:
Refer to Lecture 35: Fabric channels refer to different separate ledgers such that only organizations
belonging to a particular channel can read/write to that ledger.
QUESTION 9
Answer: (b)
Detailed solution:
MSP handles the identity management for network participants. It ensures that only authorized participants
are allowed to interact with the network.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
Detailed solution:
Hyperledger Fabric is a permissioned blockchain framework with a modular design and support for
smart contracts (chain codes) written in languages like Go, Java, and Node.js. It does not have native
cryptocurrencies.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Detailed solution:
PBFT protocol ensures total ordering of transactions, thus ensuring consensus finality. Whereas
PoW does not ensure consensus finality.
QUESTION 2
Detailed solution:
Refer to Week 8 Lecture Notes
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Detailed solution:
Bitcoin-NG has a higher transaction throughput than Bitcoin. It decouples the leader election from
transaction serialization using key blocks and microblocks.
QUESTION 4
a. Microblock generation rate is lower than the key block generation rate
b. Microblock generation rate is higher than the key block generation rate
c. The interval between the generation of two key blocks is exponentially distributed
d. The key block contains the ledger entries
Detailed solution:
Microblocks contain the ledger entries and microblocks have a higher generation rate as compared to key
blocks. Refer to Week 8 Lecture Notes
QUESTION 5
Detailed solution:
BFT is faster for small networks. Bitcoin NG decouples transaction serialization from leader election.
Refer to ‘Performance vs Scalability’ in Week 8 Lecture Notes.
QUESTION 6
Answer: (b)
Detailed solution:
Fabric smart contracts define common data, rules and processes for businesses to transact through the
ledger.
QUESTION 7
a. hyperledger-client-api
b. smart-contract-builder
c. fabric-contract-api
d. fabric-identity-manager
Answer: (c)
Detailed solution:
fabric-contract-api is used for implementing chaincode in Hyperledger Fabric.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 8
Detailed solution:
In Hyperledger Fabric, transactions are endorsed by peers and are committed only after validation. Also, a
transaction can update the world state.
QUESTION 9
Detailed solution:
Bitcoin’s scalability is limited due to its fixed block size and block frequency. Refer to Week 8 lecture
notes.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
Which of the following is/are correct regarding Schnorr Multisignature in CoSi protocol?
a. It is difficult to verify the signature
b. Signature can be verified using a single collective public key
c. It is easy to verify the signature
d. It relies on group G of any composite order
Detailed solution:
In the Cosi protocol, Schnorr Multisignature is easy to verify by using a single collective public key. Also,
it relies on a group of prime order.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Answer: (a)
Detailed solution:
A single sign-on can be used to log in to multiple services.
QUESTION 2
Answer: (a)
Detailed solution:
Solidity program is compiled to bytecode, which is executed by Ethereum Virtual
Machine
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following statements related to Algorand is invalid?
a. A block is prepared
b. The block is propagated through gossiping, Algorand runs Byzantine agreement on the block
c. Prepare the digital signature and propagate
d. A committed block is purged
Answer: (d)
Detailed solution:
A random user prepares a block using sortition, and the protocol propagates the block through gossiping.
To validate the block created by the random user (can be a valid or adversarial user), a byzantine
agreement is required. Once it is found that the block is valid, then it is digitally signed and propagates the
digital signature in the network.
QUESTION 4
Which of the following is true about selecting the random committee in the Algorand network?
a. There is a dedicated node that chooses the nodes to form the committee
b. A distributed algorithm decides the list of nodes participating in the committee, and the committee
members are always pre-decided and fixed
c. A specific pool of nodes chosen are given the responsibility of forming the committee
d. The nodes can take part as committee members by winning a local computation
Answer: (d)
Detailed solution:
Algorand is an open model, which means anyone can join the network. Also, it is a permissionless model.
It can not have a single node who will select the committee. Cryptographic sortition is used to elect the
user to be part of the committee. Every user can elect to be part of the committee. The individual
committee members run certain local computations on their machines to determine whether they won the
lottery. If they win, they can participate.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Which of the following comes with Verifiable Credentials as a native inbuilt feature?
a. Ethereum
b. Litecoin
c. Hyperledger Aries
d. Solidity
Answer: (c)
Detailed solution:
Aries supports natively verifiable credentials and presentations.
QUESTION 6
Consider the following statement - “Say Alice has generated two Distributed Identifiers (DID), DID1 and
DID2, for her pairwise relationships maintained in Hyperledger Indy and used in Hyperledger Aries”.
Which part of the above statement is false with respect to the concepts of Hyperledger Indy and Aries?
a. Generation of DID by Alice
b. Assignment of SEED to Steward
c. Acceptance of incoming invitation by Alice
d. Saving DID metadata always in a centralized Identity ledger
Answer: (d)
Detailed solution:
a,b,c are valid for the situation. Please refer to Week 9 Lecture Notes
QUESTION 7
Answer: (d)
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Detailed solution:
VC is a claim about a subject that can be verified by the issuer, holder, and verifier
QUESTION 8
Answer: (c)
Detailed solution:
Hyperledger Fabric supports interoperability by extending to the Cacti framework.
QUESTION 9
Which of the following is/are true for Hyperledger Indy and related Decentralized Identifier (DID)
context. Please choose all possible correct answers.
a. Digital representation of physical identity and Individuals can control the usage of their own
identity
b. Facilitates Verifiable presentation (VP) of the ID
c. Indy credential schema defines the structure for Verifiable Credential templates
d. Self-Sovereign Identity (SSI) uses DID as the backbone of its identity handling.
Answer: a, b,c, d
Detailed Solution:
a,b,c, and d are correct. DID provides a decentralized identity that can be based on open standards and can
perform a verifiable presentation of the ID when required, maintains trust, and is used in SSI . For details
please refer to slides.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
Which of the following statements is false in context to Byzantine Fault Tolerant (BFT) protocol in
general?
a. The system can operate correctly as long as the number of faulty nodes does not exceed the
allowable threshold proportion of faulty nodes.
b. Classic BFT Protocol is used in a permissioned system.
c. RAFT is a type of BFT protocol
d. The system assumes all the nodes are honest
Answer: (d)
Detailed Solution: d is the correct option. BFT can perform in the system with malicious nodes within
specified limits, and RAFT is Crash Fault Tolerant. For details please refer to slides.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 1
Answer: (c)
Detailed solution:
Zero-knowledge proofs allow claims to be verified without disclosing unnecessary information.
QUESTION 2
Which of the following is/are true regarding timelocks and hashlocks in blockchain contracts?
a. Hashlocks allow spending only when a specific secret is revealed
b. Timelocks prevent spending until a predefined time or block height
c. Hashlocks rely on timestamps for cryptographic verification
d. Hashlocks allow spending even if the specific secret is not revealed
Detailed solution:
Refer to Week 10 Lecture Notes
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following is/are true regarding cross-chain Hashed Timelock Contracts?
Detailed solution:
HTLCs ensure trustless cross-chain atomic swaps using hashlock and timelock mechanisms.
QUESTION 4
Which of the following statements is/are correct regarding trusted third-party (TTP) based asset transfer?
Detailed solution:
TTP-based transfers rely on centralized control and intermediaries. It also has a possibility of security
bias on third party. There have been several cases of theft from centralized exchanges.
QUESTION 5
Which of the following statements is/are true about public blockchains operating as isolated silos?
a. They use the same protocols across networks.
b. They operate independently without interoperability.
c. They inherently allow seamless cross-chain communication.
d. They often have different standards and protocols.
Detailed solution:
Public blockchains operate with different protocols and standards and lack built-in interoperability.
QUESTION 6
a. Escrow is an agreement in which assets are held and distributed when conditions are met
b. Escrow is payment for smart contracts
c. Escrow is a permissioned blockchain
d. Escrow is the cost of execution of smart contracts
Answer: (a)
Detailed solution:
Without the presence of any Escrow, the funds are in control of the sender and
receiver parties.
QUESTION 7
Which of the following are guaranteed in the ideal atomic swap protocol ?
a. All swaps will take place only when all parties conform to the protocol
b. If some parties deviate from the protocol, then all conforming party ends up worse off
c. No coalition has an incentive to deviate from the protocol
d. Swaps can take place partially
Detailed solution:
Refer to Week 10 Lecture Notes
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 8
Which of the following steps are involved in the verifiable data transfer protocol in permissioned
blockchain?
Detailed solution:
Verifiable data transfer involves generating proof requests, validating attestations and checking access
control policies. Refer to Week 10 Lecture Notes.
QUESTION 9
What will happen if Alice refuses to reveal the key and a timeout occurs?
Answer: (a)
Detailed solution:
Refer to Week 10 Lecture Notes.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 10
Answer: (a)
Detailed solution:
Verifiable credentials are digital certificates stored on a blockchain that provide authenticity.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
Answer: (a)
Detailed solution:
Please refer to the Week 11 Lecture 51.
QUESTION 2
Which of the following is/are key jobs(s) that/those Hyperledger Aries mainly perform(s)?
a) Proof-of-Stake consensus
b) Aries can work as IIN (Interoperable Identity Network) agent
c) Verifiable credentials exchange
d) Cryptographic currency generation
Detailed solution:
Hyperledger Aries plays a key role as an Interoperable Identity Agent. It supports DID
communication and Verifiable Credential exchange.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Which of the following does NOT pose a direct risk to the security and reliability of blockchain
operations?
Answer: (d)
Detailed solution:
Blockchain inherently relies on distributed ledger technology, ensuring redundancy by design. The
other options—51% attacks, private key compromises, and double spending—are well-recognized
risks that can directly undermine blockchain security and integrity. High transaction fees do not pose
any direct risk.
QUESTION 4
Detailed solution:
a) Taking control of consensus to reverse transactions and enable double-spending:
With over 50% of the network’s hashing power, an attacker can reverse transactions, enabling double-
spending, and disrupt the blockchain's integrity.
QUESTION 5
Answer: (b)
Detailed solution:
The goal of a Selfish Mining Attack is for miners to withhold their mined blocks, thus secretly
building a longer chain. Once they have a longer chain, they release it, causing the network to adopt
it, and unfairly gaining more mining rewards.
QUESTION 6
A blockchain network has a 10-minute block interval. A miner, "Miner X," controls 40% of the
network's hashing power. Miner X mines a block and does not broadcast it immediately. Instead,
Miner X continues mining a second block in secret.
What is the most likely result of Miner X's actions in this scenario?
a) Miner X's second block will automatically become part of the blockchain, and the first block
will be always discarded.
b) Miner X's second block will possibly create a fork in the blockchain, which will later be
resolved through a chain reorganization
c) Miner X will always successfully steal the rewards of other miners on the network.
d) Miner X's actions must cause the network to collapse due to a 51% attack.
Answer: (b)
Detailed solution:
Miner X's secret mining creates a temporary fork in the blockchain, where two competing chains
exist. The network will eventually adopt the longer chain, causing the shorter chain to be abandoned
and reorganized.
Please also refer to the Week 11 Lecture 53.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
Which of the following plays the most crucial role in establishing trust in a blockchain network?
a) Encryption
b) Consensus Mechanism
c) Smart Contracts
d) Distributed Ledger
Answer: (b)
Detailed solution:
A consensus mechanism ensures that all network participants agree on the validity of transactions before
they are recorded on the blockchain. This decentralized verification process is fundamental to maintaining
trust. Encryption secures data but does not establish consensus. Smart Contracts execute automated
agreements but rely on consensus for validation. Distributed Ledger provides transparency but needs
consensus to maintain integrity and trust.
QUESTION 8
Which of the following is/are primarily responsible for validating transactions in the Ethereum 2.0
blockchain (Proof of Stake)?
a) Miner
b) Validator
c) Peer-to-peer network
d) Core consensus protocol
Answer: (b)
Detailed solution:
In Ethereum 2.0, which operates on a Proof of Stake (PoS) consensus mechanism, validators are
responsible for validating transactions and creating new blocks, replacing the role of miners from
Ethereum's original Proof of Work (PoW) mechanism in older versions.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
a) The targeted node may mine blocks more efficiently due to controlled connections.
b) The targeted node may accept fraudulent transactions or blocks, leading to potential double-
spending.
c) The targeted node will immediately disconnect from the blockchain network to prevent further
damage.
d) The targeted node will become immune to any form of attack after the Eclipse Attack
Answer: (b)
Detailed solution:
In an Eclipse Attack, the attacker isolates a node by controlling all its inbound and outbound
connections. This manipulation can cause the targeted node to accept fraudulent or incorrect
information, such as invalid transactions or blocks, leading to issues like double-spending. It does not
enhance mining efficiency or make the node immune to other attacks.
Please also refer to the Week 11 Lecture 54.
QUESTION 10
Which of the following is a common technique used by attackers in a front-running attack on decentralized
exchanges (DEXs)?
Answer: (a)
Detailed solution:
In a front-running attack on a decentralized exchange (DEX), attackers often manipulate the gas
price (transaction fees) to ensure that their transaction is processed first, ahead of other pending
transactions. By offering a higher gas price, the attacker increases the likelihood of their transaction
being included in the block before the targeted transaction. This allows the attacker to profit from any
price movement caused by the original transaction.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
How does the use of blockchain technology enhance the management of Land Registry records?
a) Blockchain eliminates the need for physical land titles by storing them in a centralized digital
ledger.
b) Blockchain ensures that land records can be accessed by any government entity at any time
without restrictions.
c) Blockchain prevents fraud in land transactions by providing a secure, transparent, and
immutable record of ownership.
d) Blockchain allows land records to be altered instantly without the need for a verification
process by authorities
Answer: (c)
Detailed solution:
Blockchain technology improves the security and transparency of land registries by creating a
decentralized ledger that is immutable, meaning once a record is entered, it cannot be altered. This
reduces the risk of fraud, ensures a clear ownership history, and makes the system more trustworthy
and efficient.
QUESTION 2
Detailed solution:
Please refer to the Week 12 Lecture 56.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 3
Answer: (c)
Detailed solution:
Please refer to the Week 12 Lecture 57.
QUESTION 4
Which of the following was/were NOT utilized in Singapore’s Project Ubin to enhance interbank
settlements?
Answer: (d)
Detailed solution:
Singapore's Project Ubin explored blockchain technology to enhance interbank settlements, focusing
on smart contracts for automating transactions and tokenization of the Singapore Dollar (SGD) for
digital representation. The project did not integrate public blockchains for cross-border payments
but rather used private, permissioned blockchains for enhanced security and control. Additionally,
Proof-of-Work (PoW) was not employed, as it is resource-intensive and was not suited for the
project's goals. Instead, the project tested more efficient consensus mechanisms, such as Practical
Byzantine Fault Tolerance (PBFT). The project aimed to improve financial systems' efficiency,
privacy, and scalability.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 5
Which type of attack allows an attacker to create multiple fake identities to gain unauthorized access
to consortium services?
a) Byzantine faults
b) Sybil attacks
c) DDoS attacks
d) Sensitive information leakage
Answer: (b)
Detailed solution:
A Sybil attack occurs when an attacker creates multiple fake identities to gain control or influence
over a system, often to disrupt consensus or access services. This is a specific threat in decentralized
networks, where trust and identity verification are essential.
QUESTION 6
To allocate consumer requests among Service Providers, which of the following scheduling algorithms is
implemented?
a) Fair Scheduling Algorithm
b) Capacity Scheduling Algorithm
c) Dynamic Round Robin
d) A* Algorithm
Answer: (a)
Detailed solution:
In Cloud Federation, to allocate consumer requests among Service Providers, Fair scheduling algorithm is
implemented. Each SP will be allocated the number of consumer requests proportional to its infrastructure
contribution to the federation.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 7
a) It is open-source
b) The identities of the participants can be accessed by any outsider
c) It supports private channels
d) It is exclusively designed for public blockchain
Detailed solution:
Hyperledger's key advantages include being open-source, allowing for widespread collaboration, and
supporting private channels that ensure confidentiality for participants in a network.
QUESTION 8
Answer: (c)
Detailed solution:
Quorum allows both private and public transactions, providing the flexibility to handle sensitive data
privately while also enabling transparent public interactions when required. Therefore, it can handle
either private or public state depending on the needs of the transaction.
NPTEL Online Certification Courses
Indian Institute of Technology Kharagpur
Jan 2025
QUESTION 9
a) Central authority
b) Smart contracts
c) Manual validation
d) Third-party monitoring
Answer: (b)
Detailed solution:
Smart contracts automatically execute predefined rules and agreements without intermediaries,
ensuring transactions are tamper-proof and fraud-resistant in decentralized marketplaces. This
eliminates the risk of manual errors or malicious interference.
QUESTION 10
Answer: (b)
Detailed solution:
A man-in-the-middle (MITM) attack in a decentralized marketplace primarily intercepts and alters messages
between users. In this type of attack, the attacker secretly intercepts and potentially manipulates the
communication between two parties (e.g., buyers and sellers) without either party being aware. This could
involve changing transaction details, redirecting payments, or modifying the data being exchanged. MITM
doesn't change the marketplace's prices.
NOC22-CS44: Blockchain and Its Applications
Assignment 1
Correct choices are highlighted in Yellow . Give partial marks for partially correct answers.
1. Which one is true for an ideal decentralized solution for business management?
a. A centralized authority should decide the overall trust
b. Everyone should trust and cooperate with each other
c. No one should trust and cooperate with each other
d. No one should trust each other, however they should
cooperate
Hint: In a real-time scenario a decentralized system has multiple stakeholders and the
information submitted by them is not guaranteed to be correct. A collective agreement has to be
established.
2. Which of the statements below is/are true for successful run of decentralized
distributed systems?
a. Network of different players
b. Players must trust each other
c. If they cooperate, the society gets benefitted
d. None of the above
Hint: In a decentralized distributed system, a group of parties who may or may not know or
trust each other. But they should cooperate to reach a collective decision to benefit the system
as whole. So in a decentralized system trusting everyone is not always necessary to reach a
decision..
5. For a 512 bit hash function, the attacker needs to compute how many hash
operations in order to find two matching outputs in the initial round?
a. 2512
b. 2128
c. 2256
d. 260
Hint: If a hash function produces N bits of output, an attacker needs to compute only 2N/2 hash
operations on a random input to find two matching outputs initially. The attacker can use the
output combination again to use in subsequent rounds.
6. Which of the following is a correct statement about a cryptographic hash function?
a. given the same message the hash function would not return the same hash
b. it is not very difficult to generate the original message from the hash
c. a small change in the message, impacts the hash value
d. one can easily find two different messages with same hash
Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.
Hint: Refer to the Week 1 slide for the properties of cryptographic hash functions.
8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block.
This above statement is True or False.
a. True
b. False
9. For hash computation in SHA-512, what is the size of the block that the
message is divided into?
a. 1024
b. 512
c. 256
d. 1248
Hint: The message is divided into blocks of size 1024 bits, and the output produced is a 512-bit
message digest.
Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.
Hint: DLT can even be used to store various types of information, codes, etc., apart
from financial data. Please refer to the slide.
Hint: All of the above are true for general PoW consensus. Please refer to the slide.
Hint: Bitcoin Scripts are simple, compact, stack-based, support cryptography, and not
Turing complete.
Hint: Please refer to the slide. Permissioned blockchain is closed network among
known pre authorized participants and more secure from unknown nodes.
6. What is nonce?
a. The transaction id number
b. A miners ASIC chip array
c. The generator point used in elliptic curve cryptography
Hint: Miners propose new blocks by solving the puzzle i.e., finding the nonce
corresponding to a target block hash, and add that solution as proof.
of solving the challenge to be the leader
7. Which one of the following opcodes is needed to remove the top stack item.
a. OP_POP
b. OP_DEQUE
c. OP_DROP
d. OP_DELETE
Hint: Refer https://en.bitcoin.it/wiki/Script to get to know more opcodes.
9. If the four-byte difficulty bits in hex form are 0x1b0404cb, and the target value is
calculated using X * 2^(Y), what is the values for X and Y respectively,
a. X = 0x0404cb, Y = 0x1b
b. X = 0x0404cb, Y = 0x18
c. X = 0x0404cb, Y = 0xc0
d. X = 0x1b0404, Y = 0xcb
Hint: In difficulty = 0x1b0404cb, the exponent is 1b and coefficient is 0404cb
Target = 0x0404cb * 2^(0x08 * (0x1b - 0x03))
On solving the above equation
⇒ target = 0x0404cb * 2^(0x08 * 0x18)
⇒ target = 0x0404cb * 2^(0xc0)
Hint: Block identifier is calculated by using Double SHA256 algorithm on the current
block header