Are you looking for the Answers to NPTEL Blockchain and its Applications Assignment 5? This article will help you with the answer to the National Programme on Technology Enhanced Learning (NPTEL) Course “ NPTEL Blockchain and its Applications Assignment 5 “
What is Blockchain and its Applications?
In the last few years, Blockchain technology has generated massive interest among governments, enterprises, and academics, because of its capability of providing a transparent, secured, tamper-proof solution for interconnecting different stakeholders in a trustless setup. In January 2021, the Ministry of Electronics and Information Technology (MeiTY), Government of India, published the first draft of the “National Strategy on Blockchain” that highlights 17 potential applications that are of national interest.
Against this backdrop, this subject will cover the basic design principles of Blockchain technology and its applications over different sectors. Additionally, the course also provides tutorials on setting up blockchain applications using one of the well-adopted permissionless blockchain platforms – Ethereum, and one permission blockchain platform – Hyperledger.
CRITERIA TO GET A CERTIFICATE
Average assignment score = 25% of the average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF THE AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
Below you can find the answers for NPTEL Blockchain and its Applications Assignment 5
|Blockchain and its Applications Assignment 1||Click Here|
|Blockchain and its Applications Assignment 2||Click Here|
|Blockchain and its Applications Assignment 3||Click Here|
|Blockchain and its Applications Assignment 4||Click Here|
|Blockchain and its Applications Assignment 5||Click Here|
|Blockchain and its Applications Assignment 6||Click Here|
|Blockchain and its Applications Assignment 7||Click Here|
|Blockchain and its Applications Assignment 8||Click Here|
NPTEL Blockchain and its Applications Assignment 5 Answers:-
Q1. What is the limitation of using the consensus algorithm Proof of Work (PoW) with respect to Proof of Elapsed Time (PoET)?
a) PoET can often be used in a permissionless blockchain more easily than PoW, because PoET’s lottery system for node selection is secure
b) PoET has generally lower transaction costs than PoW
c) PoET is much more secure than PoW, because PoET supports the trusted execution environment (TEE) by time-stamping the transactions
d) PoET is usually faster than PoW, because fewer nodes complete for validation than in PoW, since PoET randomly selects the nodes
Q2. “A low-cost and fast consensus algorithm, where a node needs to deposit cryptocurrency to guarantee the transaction.” The above description defines which consensus algorithm?
a) Proof of Work (PoW)
b) Proof of Burn (PoB)
c) Proof of State (PoS)
d) Proof of Elapsed Time (PoET)
Q3. What is the correct sequence involved in a block creation:
1. Transactions validated
2. Transactions Bundled & broadcasted
3. Transaction initiated
4. Block added to the local chain and propagated to the network
5. Proof of work consensus problem solved
a) 5, 3, 1, 2, 4
b) 1, 2, 3, 4, 5
c) 3, 1, 2, 5, 4
d) 3, 2, 1, 4, 5
???? Next Week Assignment Answers????
Q4. Proof of Burn consensus algorithms consider virtual resources or digital coins for participating in the mining activity? True of False?
Q5. 1 ether equals
a) 10 ^ 16 wei
b) 10 ^ 18 wei
c) 10 ^ 6 wei
d) 10 ^ 8 wei
Q6. How an attacker could manipulate the transaction history of a blockchain to be able to spend a token or a cryptocurrency twice.
a) The attacker modified the transaction on his node and propagated it in the network
b) The attacker modified the smart contract and recovered the investor’s cryptocurrency
c) The attacker gained control of more than 51% of the network’s computing power
d) The attacker hard-forked the network and created a new blockchain network
????If there are any changes in answers will notify you on telegram so you can get a 100% score, So Join???? ????
Q7. What is the CLI command used to send ethers after the noes have been initialized?
Q8. What library/API is used for smart contract deployment and invocation from Dapp?
Q9. In which scenario is a smart contract the best solution to the problem?
a) A restaurant manager wants to force customers to pay for their food by transferring cryptocurrency to his wallet
b) A chief engineer wants her smart watch to notify her when her partner enters their front door
c) A grid company wants to automatically buy power when the price reaches a predetermined rate
d) An insurance company wants to pay out a small vendor whenever the case manager feels it is best to do so
Q10. Which of the following syntax is correct to write data in a smart contract using solidity
For other courses answers:- Visit
For Internship and job updates:- Visit
Disclaimer: We do not claim 100% surety of answers, these answers are based on our sole knowledge, and by posting these answers we are just trying to help students, so we urge do your assignment on your own.
if you have any suggestions then comment below or contact us at [email protected]
If you found this article Interesting and helpful, don’t forget to share it with your friends to get this information.