NPTEL Assignment Answers 2024 Blockchain and its Applications | Week 11

These are NPTEL Programming In Java Week 11 Assignment 11 Answers Q1. If an attacker initially populates the victim node’s peer tables with ...

NPTEL Assignment Answers 2024 Blockchain and its Applications | Week 11



These are NPTEL Programming In Java Week 11 Assignment 11 Answers


Q1. If an attacker initially populates the victim node’s peer tables with attacker’s IP addresses in blockchain network, this attack is known as:

a. Sybil Attack

b. Eclipse Attack

с. Selfish Mining Attack

d. 51% Attack

Answer:


Q2. Which of the following can be used to identify a good blockchain use-case? (Mark multiple options if applied)

a. Participants

b. Assets

с. Transactions

d. Independent of everything


Answer:


These are Blockchain and its Applications Assignment 11 Answers


Q3. Alice is performing an Eclipse Attack, and If her IP replaces another attacker IP, the evicted IP is resent and eventually replaced by honest IP. Is this a valid statement?

a. Yes

b. No


Answer:


Q4. In a decentralized blockchain network, which scenario poses a significant risk known as the “51% Vulnerability”?

a. When a majority of users hold more than 51% of the cryptocurrency tokens.

b. When a single entity or a group controls more than 51% of the network’s computing power.

с. When more than 51% of the nodes in the network experience a temporary outage.

d. When more than 51% of the transactions in a block are invalid due to cryptographic errors.


Answer:


These are Blockchain and its Applications Assignment 11 Answers


Q5. Alice possesses 5 Bitcoins and initiates two separate transactions with the same Bitcoin. In which case does the double spending vulnerability occur?

a. Alice pays for a coffee and a book with the same 5 Bitcoins.

b. Alice accidentally sends 6 Bitcoins to a friend.

c. Alice sends 2 Bitcoins to one friend and 3 Bitcoins to another.

d. Alice checks her wallet balance but forgets to confirm the transaction.


Answer:


Q6. In a selfish mining attack, discovering more blocks by pool develops a longer lead on the public chain, and continues to keep these new blocks _________________.

a. Private

b. Public


Answer:


These are Blockchain and its Applications Assignment 11 Answers


Q7. Which of the following scenarios is NOT a good use case for blockchain technology?

a. A supply chain network where participants require real-time visibility into the movement and origin of goods.

b. An online voting system aiming to enhance transparency, reduce fraud, and ensure the integrity of election results.

c. A centralized banking system seeking to improve transaction speed and reduce costs.

d. A healthcare system aiming to securely share patient records among different healthcare providers for better coordinated care.


Answer:


Q8. What is a major problem with Proof Of Work?

a. It is difficult to implement

b. It is unreliable

c. Multiple miners have to be rewarded

d. It is CPU-intensive and consumes enormous amount of power.


Answer:


These are Blockchain and its Applications Assignment 11 Answers


Q9. In Practical Byzantine Fault Tolerance, __________.

a. A master node selects the next node that adds the next block

b. The node with most coins is chosen for adding the next block

c. The nodes elect a leader and that leader adds the next block

d. None of the above


Answer:


Q10. Alice places a bulk order for a cryptocurrency, and before it is processed, Bob, who is a miner, inserts his own buy order with a slightly higher price. In which case does the front-running attack occur?

a. Alice’s order is confirmed first due to network congestion.

b. Bob’s order is prioritized and confirmed ahead of Alice’s order.

c. Both Alice and Bob’s orders are cancelled due to conflicting transactions.

d. The network rejects both Alice and Bob’s orders, causing delays in confirmation.


Answer:


Q1. b. Eclipse Attack


Q2. a. Participants, b. Assets, c. Transactions


Q3. b. No


Q4. b. When a single entity or a group controls more than 51% of the network’s computing power.


Q5. a. Alice pays for a coffee and a book with the same 5 Bitcoins.


Q6. a. Private


Q7. c. A centralized banking system seeking to improve transaction speed and reduce costs.


Q8. d. It is CPU-intensive and consumes an enormous amount of power.


Q9. c. The nodes elect a leader and that leader adds the next block.


Q10. b. Bob’s order is prioritized and confirmed ahead of Alice’s order.

COMMENTS

Name

1sem,1,1st Sem,33,1st year,2,2 sem,1,2nd Sem,29,2sem,1,3rd Sem,40,4th sem,9,5th sem,28,6th sem,19,7th sem,8,8th sem,6,About BEU,1,ABOUT MAKAUT,1,aku civil Notes,15,Aku EE/EC Notes,14,aku ME Notes,14,aku notes,45,aku papers,11,aku syllabus,6,All Branch,2,all semester,19,B pharm,1,BAU Question Papers,1,BCA Notes,1,BEU Collage,12,BEU Model Paper Question,3,BEU Notes,10,BEU Organizer,31,BEU Previous Year Questions,2,Beu pyq,4,BEU PYQ Ans,5,BEU syllabus,8,Blogs,1,Btech results,1,Civil Branch,2,Civil Engineering,8,CS Engineering,8,CSE Branch,1,CSE Notes,19,Developing Soft Skills And Personality,13,EC Engineering,10,EE Branch,2,EE Engineering,9,engineering chemistry,5,Gate,1,internship,3,Introduction To Internet Of Things,21,Introduction To Machine Learning,2,iot,1,MAKAUT CE Organizer,6,MAKAUT CSE Organizer,5,MAKAUT ECE Organizer,3,MAKAUT EE Organizer,2,MAKAUT ME Organizer,4,MAKAUT Notes,5,MAKAUT Organizer,8,MAKAUT Question Paper,1,MAKAUT Syllabus,1,make money,6,ME Engineering,19,NPTEL,92,NPTEL COURSE,91,Programming Tutorial,12,Public Speaking,22,PYQ Solution,4,Question Bank,19,Soft Skills,33,Traffic & SEO,9,week 1,7,week 10,3,week 11,3,week 12,3,week 2,10,week 3,6,week 4,7,week 5,5,week 6,4,week 7,4,week 8,4,week 9,3,WEEK1,4,WEEK10,3,WEEK11,3,WEEK12,3,WEEK2,5,WEEK3,6,WEEK4,6,WEEK5,5,WEEK6,3,WEEK7,4,WEEK9,1,ztest,6,
ltr
item
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions: NPTEL Assignment Answers 2024 Blockchain and its Applications | Week 11
NPTEL Assignment Answers 2024 Blockchain and its Applications | Week 11
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOwHNO87MiOgy-NkCLRdvtj-RpUW1SvlV9lS4CAPXCAwj07ekvOLIKZWRbUfi3_MLVmRENK769jL13H0dG3IN84Nknm4ZRSgtBLJRneBwbQg1vm3Sxsbp7rZlTk5i88R98V9aSqYaAHiOUh33GzZwSYRdpSzI3ECZvgJkDqnCuVYhd06poIflGUiHaAII/w640-h426/Default_Blockchain_and_its_Applications_2.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOwHNO87MiOgy-NkCLRdvtj-RpUW1SvlV9lS4CAPXCAwj07ekvOLIKZWRbUfi3_MLVmRENK769jL13H0dG3IN84Nknm4ZRSgtBLJRneBwbQg1vm3Sxsbp7rZlTk5i88R98V9aSqYaAHiOUh33GzZwSYRdpSzI3ECZvgJkDqnCuVYhd06poIflGUiHaAII/s72-w640-c-h426/Default_Blockchain_and_its_Applications_2.jpg
BEU BIHAR : BEU PYQ , Beu previous year question All Courses All Semester Solutions
https://www.beubihar.org.in/2024/04/nptel-assignment-answers-2024_44.html
https://www.beubihar.org.in/
https://www.beubihar.org.in/
https://www.beubihar.org.in/2024/04/nptel-assignment-answers-2024_44.html
true
8161375692651428750
UTF-8
Loaded All Posts Not found any posts VIEW ALL Read More Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content
×