Blockchain and its Applications | NPTEL 2022 | Week 1 Assignment Solutions

This set of MCQ(multiple choice questions) focuses on the Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solutions.

Course layout

Answers COMING SOON! Kindly Wait!

Week 1: Introduction to Blockchain Technology and its Importance
Week 2: Basic Crypto Primitives I – Cryptographic Hash
Week 3: Basic Crypto Primitives II – Digital Signature
Week 4: Evolution of the Blockchain Technology
Week 5: Elements of a Blockchain
Week 6: Blockchain Consensus I – Permissionless Models
Week 7: Blockchain Consensus II – Permissioned Models
Week 8: Smart Contract Hands On I – Ethereum Smart Contracts (Permissionless Model)
Week 9: Smart Contract Hand On II – Hyperledger Fabric (Permissioned Model)
Week 10: Decentralized Identity Management
Week 11: Blockchain Interoperability
Week 12: Blockchain Applications

NOTE: You can check your answer immediately by clicking show answer button. This set of “Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solution” contains 10 questions.

Now, start attempting the quiz.

Blockchain and its Applications NPTEL 2023 Week 1 Assignment Solutions

Q1. Which one is true for an ideal decentralized solution for business management?

a) a centralized authority should decide the overall trust
b) Everyone should trust and cooperate with each other
c) No one should trust and cooperate with each other
d) no one should teach other, however they should cooperate

Answer: d)

Q2. Which of the statements below is/are true for successful run of decentralized distributed systems?

a) Network of different players
b) Players must trust each other
c) If they cooperate, the society gets benefitted
d) None of the above

Answer: a, c

Q3. Where are the transaction logs recorded in a blockchain?

a) Centralized editable database
b) Editable log file
c) On centralized immutable database
d) On append only distributed immutable ledger

Answer: d)

Q4. What are the properties of cryptographic hash function?

a) It should be deterministic
b) It should be collision free
c) Ability to hide the input message
d) Puzzle friendly

Answer: a), b), c), d)

Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?

a) 2512
b) 2128
c) 2256
d) 260

Answer: c)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q6. Which of the following is a correct statement about a cryptographic hash function?

a) given the same message the hash function would not return the same hash
b) it is not very difficult to generate the original message from the hash
c) a small change in the message , impacts the hash value
d) one can easily find two different messages with same hash

Answer: c)

Q7. What are the security features of a hash function?

a) Non-deterministic
b) Puzzle-friendly
c) Collision-resistance
d) Preimage-resistance

Answer: b), c), d)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q8. SHA-512 hashing algorithm used by bitcoin blockchain to determine the hash of a block. This above statement is true or false.

a) True
b) False

Answer: b)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q9. For hash computation in SHA-512 what is the size of the block that the message is divided into?

a) 1024
b) 512
c) 256
d) 1248

Answer: a)

Q10.

Blockchain and its Applications NPTEL week 1 Assignment Solutions

a) a
b) b
c) c
d) d

Answer: a)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Previous Year – Blockchain and its Applications NPTEL 2022 Week 1 Assignment Solutions

Q1. What is expected by a decentralized solution for a successful Supply Chain management?

a) No one should trust each other, however they should cooperate
b) Everyone should trust and cooperate with each other
c) No one should trust and cooperate with each other
d) Trust and cooperation does not matter here

Answer: a) No one should trust each other, however they should cooperate

Q2. What does trust mean, in a decentralized blockchain?

a) To secure the chain using specific protocols
b) To validate the transactions and blocks for tamper proofing
c) To execute and confirm the transactions
d) None of the above

Answer: a), b), c)

Q3. Where are the transactions recorded in a blockchain?

a) On a SQL Database
b) On a distributed immutable ledger
c) On a distributed opaque immutable ledger
d) On a centralized immutable ledger

Answer: b) On a distributed immutable ledger

Q4. What is one of the requirements of a secure hashing function?

a) It is an ECC function
b) It is a one way function
c) It is log function
d) It is a secret function

Answer: b) It is a one way function

Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs?

a) 1.158 x 1077
b) 1.340 x 10154
c) 3.403 x 1038
d) 2.895 x 1076

Answer: a) 1.158 x 1077

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q6. Which of the following is a correct statement about a cryptographic hash function?

a) given the same message the hash function would not return the same hash
b) it is not very difficult to generate the original message from the hash
c) a small change in the message, impacts the hash value
d) one can easily find two different messages with same hash

Answer: c) a small change in the message, impacts the hash value

Q7. What are the security features of a hash function?

a) Deterministic
b) Puzzle-friendly
c) Collision-resistance
d) Preimage resistance

Answer: a), b), c), d)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is Ture or False.

a) True
b) False

Answer: b) False

Blockchain and its Applications NPTEL week 1 Assignment Solutions

Q9. If a participant node tampers with a block, it results in which action(s).

a) Modification of hash
b) Mismatching of hash values
c) The local chain of node rendered in an invalid state
d) Only the previous block will be in an invalid state

Answer: a), b), c)

Q10. What is the hash value of “swayam” if SHA-256 is used? (case sensitive)

a) 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63
b) 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63
c) 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a56
d) 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a92

Answer: a)

Blockchain and its Applications NPTEL week 1 Assignment Solutions

>> Next- Blockchain and its Applications Week 2 Assignment Solutions


DISCLAIMER: Use these answers only for the reference purpose. Quizermania doesn't claim these answers to be 100% correct. So, make sure you submit your assignments on the basis of your knowledge.

NPTEL answers: Problem solving through programming in C

Programming in Java NPTEL week 1 quiz answers

NPTEL – Python for Data Science assignment solutions

Nptel – Deep Learning assignment solutions

The above question set contains all the correct answers. But in any case, you find any typographical, grammatical or any other error in our site then kindly inform us. Don’t forget to provide the appropriate URL along with error description. So that we can easily correct it.

Thanks in advance.

For discussion about any question, join the below comment section. And get the solution of your query. Also, try to share your thoughts about the topics covered in this particular quiz.

Leave a Comment

Your email address will not be published. Required fields are marked *