Blockchain and its Applications Assignment 1 Answers 2023

Blockchain and its Applications Assignment 1 Answers 2023

Are you looking for the Answers to NPTEL Blockchain and its Applications Assignment 1? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ Blockchain and its Applications Assignment 1

ABOUT THE COURSE

In the last few years, Blockchain technology has generated massive interest among governments, enterprises, and academics, because of its capability of providing a transparent, secured, tamper-proof solution for interconnecting different stakeholders in a trustless setup. In January 2021, the Ministry of Electronics and Information Technology (MeiTY), Government of India, published the first draft of the “National Strategy on Blockchain” that highlights 17 potential applications that are of national interest.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for Blockchain and its Applications Assignment 1 2023

Blockchain and its Applications Assignment 1 Answers:-

Q1. Which one Is true for an ideal decentralized solution for business management?

Answer:- Answer will be uploaded soon and will be notified on our telegram channel so please join there click here

Q2. Which of the statements below is/are true for successful run of decentralized distributed systems?

Answer:-

Q3. Where are the transactions logs recorded in a blockchain?

Answer:-

Q4. What are the properties of cryptographic hash function?

Answer:-

Next Week Answers: Assignment 02

quizxp telegram

Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs in the initial round?

Answer:-

Q6. Which of the following is a correct statement about a cryptographic hash function?

Answer:-

If there are any changes in answers will notify you on telegram so you can get 100% score, So Join

Q7. What are the security features of a hash function?

Answer:-

Q8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block. This above statement is True or False.

Answer:-

Q9. For hash computation in SHA-512, what is the size of the block that the message is divided into?

Answer:-

Q10. What is the message for hash value of “8abe09bf65aefdb8e84bd8564efb765179cc01ee3f45809e47c8c9a02172f83” if SHA-256 is used? (case sensitive)

Answer:-

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at [email protected]

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.

Leave a Reply

Your email address will not be published. Required fields are marked *