NPTEL Blockchain and its Applications Assignment 2 Answers 2022

NPTEL Blockchain and its Applications Assignment 2

Are you looking for the Answers to NPTEL Blockchain and its Applications Assignment 2? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Blockchain and its Applications Assignment 2

What is Blockchain and its Applications?

In the last few years, Blockchain technology has generated massive interest among governments, enterprises, and academics, because of its capability of providing a transparent, secured, tamper-proof solution for interconnecting different stakeholders in a trustless setup. In January 2021, the Ministry of Electronics and Information Technology (MeiTY), Government of India, published the first draft of the “National Strategy on Blockchain” that highlights 17 potential applications that are of national interest.

Against this backdrop, this subject will cover the basic design principles of Blockchain technology and its applications over different sectors. Additionally, the course also provides tutorials on setting up blockchain applications using one of the well-adopted permissionless blockchain platforms – Ethereum, and one permission blockchain platform – Hyperledger.


Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100

Final score = Average assignment score + Exam score

YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.

Below you can find the answers for NPTEL Blockchain and its Applications Assignment 2

NPTEL Blockchain and its Applications Assignment 2 Answers:-

Q1. Suppose you have eight data points — 8 to 1. The post-order traversal of the Merkle Tree is given by (here 8 means hash of 8, 43 means the combined hash of 4 and 3, and so on):

a) {8, 7, 87, 6, 5, 65, 8764, 4, 3, 43, 2, 1, 21, 4321, 87654321}
b) {8, 87, 7, 8764, 6, 65, 5, 87654321, 4, 43, 3, 4321, 2, 21, 1}
c) {1, 2, 12, 3, 4, 34, 1234, 5, 6, 56, 7, 8, 78, 5678, 12345678}
d) {87654321, 8765, 87, 8, 7, 65, 6, 5, 4321, 43, 4, 3, 21, 2, 1}

Answer:- d

Q2. Which of the following is used to point a block in block chain:

a) Hash Pointer
b) User ID
c) Transaction ID
d) Timestamp

Answer:- a

Q3. Digital signing of a transaction or document involves hashing the content of the document and then _______.

a) encrypting it with private key
b) encrypting it with public key
c) encrypting it with nonce
d) rehashing it

Answer:- a

Q4. What is the objective of using a digital signature?

a) It supports the integrity of messages
b) None of the above
c) It supports both user authentication and integrity of messages
d) It supports user authentication

Answer:- c

???? Next Week Answers: Assignment 03 ????

quizxp telegram

Q5. Digitally signing transactions by sender in Blockchain does not ensure to solve repudiation/verifiability problems. Is the above statement True or False?

a) True
b) False

Answer:- b

Bosch Recruitment Drive 2022 | BE/B.Tech | Software Test Engineer | Bangalore

Q6. Which are the main Consensus Algorithms?

a) Proof of Work
b) Proof of Stake
c) Proof of Wager
d) Proof of Mining

Answer:- a,b

Q7. Which statement(s) is correct for Fischer-Lynch-Paterson impossibility result:
I. consensus is impossible with even a single faulty node?
II. Ensures safety and liveness together

a) Both are correct
b) Only I
c) Only II
d) Both are incorrect

Answer:- c

Q8. Why is consensus hard?
I. No notion of global time
II. faults in network
III. nodes may crash/ faulty nodes

a) I, II, II
b) I, II
c) I, III
d) II, III

Answer:- d

Q9. In a RSA cryptosystem Alice uses two prime numbers p = 7 and q = 17 to generate her public and private keys. If the public key of Alice is 11. Then the private key of Alice is __________.

Answer:- 35

Q10. A popular public-private key implementation known as Rivest-Shamir-Adelman (RSA) algorithm is used for the Bitcoin and Ethereum Blockchain. True or False?

a) True
b) False

Answer:- a

NPTEL Blockchain and its Applications Assignment 1

For other courses answers:- Visit

For Internship and job updates:- Visit

Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.

if you have any suggestions then comment below or contact us at [email protected]

If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.