NPTEL Blockchain and its Applications Assignment 1 Answers 2022

NPTEL Blockchain and its Applications Assignment 1

Are you looking for the Answers to NPTEL Blockchain and its Applications Assignment 1? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Blockchain and its Applications Assignment 1

What is Blockchain and its Applications?

In the last few years, Blockchain technology has generated massive interest among governments, enterprises, and academics, because of its capability of providing a transparent, secured, tamper-proof solution for interconnecting different stakeholders in a trustless setup. In January 2021, the Ministry of Electronics and Information Technology (MeiTY), Government of India, published the first draft of the “National Strategy on Blockchain” that highlights 17 potential applications that are of national interest.

Against this backdrop, this subject will cover the basic design principles of Blockchain technology and its applications over different sectors. Additionally, the course also provides tutorials on setting up blockchain applications using one of the well-adopted permissionless blockchain platforms – Ethereum, and one permission blockchain platform – Hyperledger.

CRITERIA TO GET A CERTIFICATE

Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for NPTEL NPTEL Blockchain and its Applications Assignment 1

NPTEL Blockchain and its Applications Assignment 1 Answers:-

Q1. What is expected by a decentralized solution for a successful Supply Chain management?

A. No one should trust each other, however they should cooperate

B. Everyone should trust and cooperate with each other

C. No one should trust and cooperate with each other.

D. Trust and cooperation does not matter here

Answer:- a

Q2. What does trust mean, in a decentralized blockchain?

A. To secure the chain using specific protocols.

B. To validate the transactions and blocks for tamper proofing

C. To execute and confirm the transactions.

D. None of the above

Answer:- b,c

Q3. Where are the transactions recorded in a blockchain?

A. On a SQL Database

B. On a distributed immutable ledger

C. On a distributed opaque immutable ledger

D. On a centralized immutable ledger

Answer:- b

Q4. What is one of the requirements of a secure hashing function?

A. It is an ECC function

B. It is a one way function

C. It is log function

D. It is a secret function

Answer:- b

???? Next Week Answers: Assignment 02 ????

quizxp telegram

Q5. For a 512 bit hash function, the attacker needs to compute how many hash operations in order to find two matching outputs?

A. 1.158 x10⁷⁸

B. 1.340 ×10¹⁵⁴

C. 3.403 ×10³⁸

D. 2.895 x10⁷⁶

Answer:- a

Q6. Which of the following is a correct statement about a cryptographic hash function?

A. given the same message the hash function would not return the same hash

B. it is not very difficult to generate the original message from the hash

C. a small change in the message, impacts the hash value

D. one can easily find two different messages with same hash

Answer:- c

Q7. What are the security features of a hash function?

A. Deterministic

B. Puzzle-friendly

C. Collision-resistance

D. Preimage resistance

Answer:- a,b

Q8. SHA-512 hashing algorithm used by Bitcoin blockchain to determine the hash of a block.
This above statement is True or False.

A. True

B. False

Answer:- b

Q9. If a participant node tompers with a block, it results in which action(s)

A. Modification of hash

B. Mismatching of hash values

C. The local chain of node rendered in an invalid state

D. Only the previous block will be in on invalid state

Answer:- a,b,c

Q10. What is the hash value of “swayam” if SHA-256 is used? (case sensitive)

A. 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63

B. 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a63

C. 4bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a56

D. 3bb8668bb7a3f9e127d4429d24ca0de0c3247843ccc528d9612d46d6ad699a92

Answer:- a

NPTEL Blockchain and its Applications Assignment 2

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at [email protected]

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.