This set of MCQ(multiple choice questions) focuses on the Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solutions.
Course layout
Answers COMING SOON! Kindly Wait!
Week 1: Introduction to Blockchain Technology and its Importance
Week 2: Basic Crypto Primitives I – Cryptographic Hash
Week 3: Basic Crypto Primitives II – Digital Signature
Week 4: Evolution of the Blockchain Technology
Week 5: Elements of a Blockchain
Week 6: Blockchain Consensus I – Permissionless Models
Week 7: Blockchain Consensus II – Permissioned Models
Week 8: Smart Contract Hands On I – Ethereum Smart Contracts (Permissionless Model)
Week 9: Smart Contract Hand On II – Hyperledger Fabric (Permissioned Model)
Week 10: Decentralized Identity Management
Week 11: Blockchain Interoperability
Week 12: Blockchain Applications
NOTE: You can check your answer immediately by clicking show answer button. This set of “Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solution” contains 10 questions.
Now, start attempting the quiz.
Blockchain and its Applications NPTEL 2023 Week 1 Assignment Solutions
Q1. Which one is true for an ideal decentralized solution for business management?
a) a centralized authority should decide the overall trust
b) Everyone should trust and cooperate with each other
c) No one should trust and cooperate with each other
d) no one should teach other, however they should cooperate
Answer: d)
Q2. Which of the statements below is/are true for successful run of decentralized distributed systems?
a) Network of different players
b) Players must trust each other
c) If they cooperate, the society gets benefitted
d) None of the above
Answer: a, c
Q3. Where are the transaction logs recorded in a blockchain?
a) Centralized editable database
b) Editable log file
c) On centralized immutable database
d) On append only distributed immutable ledger
Answer: d)
Q4. What are the properties of cryptographic hash function?
a) It should be deterministic
b) It should be collision free
c) Ability to hide the input message
d) Puzzle friendly
Answer: a), b), c), d)
Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?
a) 2512
b) 2128
c) 2256
d) 260
Answer: c)
Q6. Which of the following is a correct statement about a cryptographic hash function?
a) given the same message the hash function would not return the same hash
b) it is not very difficult to generate the original message from the hash
c) a small change in the message , impacts the hash value
d) one can easily find two different messages with same hash
Answer: c)
Q7. What are the security features of a hash function?
a) Non-deterministic
b) Puzzle-friendly
c) Collision-resistance
d) Preimage-resistance
Answer: b), c), d)
Q8. SHA-512 hashing algorithm used by bitcoin blockchain to determine the hash of a block. This above statement is true or false.
a) True
b) False
Answer: b)
Q9. For hash computation in SHA-512 what is the size of the block that the message is divided into?
a) 1024
b) 512
c) 256
d) 1248
Answer: a)
Q10.
a) a
b) b
c) c
d) d
Answer: a)
Previous Year – Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solutions
Q1. What is expected by a decentralized solution for a successful Supply Chain management?
a) No one should trust each other, however they should cooperate
b) Everyone should trust and cooperate with each other
c) No one should trust and cooperate with each other
d) Trust and cooperation does not matter here
Answer: a) No one should trust each other, however they should cooperate
Q2. What does trust mean, in a decentralized blockchain?
a) To secure the chain using specific protocols
b) To validate the transactions and blocks for tamper proofing
c) To execute and confirm the transactions
d) None of the above
Answer: a), b), c)
Q3. Where are the transactions recorded in a blockchain?
a) On a SQL Database
b) On a distributed immutable ledger
c) On a distributed opaque immutable ledger
d) On a centralized immutable ledger
Answer: b) On a distributed immutable ledger
Q4. What is one of the requirements of a secure hashing function?
a) It is an ECC function
b) It is a one way function
c) It is log function
d) It is a secret function
Answer: b) It is a one way function
Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs?
a) 1.158 x 1077
b) 1.340 x 10154
c) 3.403 x 1038
d) 2.895 x 1076
Answer: a) 1.158 x 1077
Q6. Which of the following is a correct statement about a cryptographic hash function?
a) given the same message the hash function would not return the same hash
b) it is not very difficult to generate the original message from the hash
c) a small change in the message, impacts the hash value
d) one can easily find two different messages with same hash
Answer: c) a small change in the message, impacts the hash value
Q7. What are the security features of a hash function?
a) Deterministic
b) Puzzle-friendly
c) Collision-resistance
d) Preimage resistance
Answer: a), b), c), d)
Q8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is Ture or False.
a) True
b) False
Answer: b) False
Q9. If a participant node tampers with a block, it results in which action(s).
a) Modification of hash
b) Mismatching of hash values
c) The local chain of node rendered in an invalid state
d) Only the previous block will be in an invalid state
Answer: a), b), c)
Q10. What is the hash value of “swayam” if SHA-256 is used? (case sensitive)
a) 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63
b) 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63
c) 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a56
d) 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a92
Answer: a)
>> Next- Blockchain and its Applications Week 2 Assignment Solutions
DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.
NPTEL answers: Problem solving through programming in C
Programming in Java NPTEL week 1 quiz answers
NPTEL – Python for Data Science assignment solutions
Nptel – Deep Learning assignment solutions
The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error in our site then kindly inform us. Don’t forget to provide the appropriate URL along with error description. So that we can easily correct it.
Thanks in advance.
For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.