Assignment 4 Solution
Assignment 4 Solution
Assignment 4
Correct choices are highlighted in Yellow. Give partial marks for partially correct
answers.
1. After a hard fork, the emerging two chains are incompatible. True or False?
a. True
b. False
Hint: After adding a new rule to the code, it creates a fork in the blockchain: one
path follows the updated blockchain, and the other path continues along the old path,
hence incompatible with each other. After a short duration, those on the old chain will
realize that their version of the blockchain is outdated and quickly upgraded to the
latest version.
b. Brady bought a car using ‘m’ bitcoins. On delivery, the bitcoins are transferred
from his wallet to the dealer’s wallet.
c. Karan has 180 unspent bitcoins. He sends the equal amount each to Dev and
Tarun one by one
Hint: Double spending is when a person tries to use the same bitcoin for more
than one Transaction knowingly or accidentally.
3. Blocks of a blockchain?
a. Transaction data
b. Hash
c. Time stamp
d. None of the above
Hint: All of a,b,c
4. What are some Bitcoin exchanges available in India: Please select the most
appropriate choice among the options.
a. BuyUCoin
b. ZebPay
c. WazirX
i. a and b
ii. b and c
iii. a and c
iv. a, b and c
Hint: Refer to this post.All of a,b.c are correct.
5. “We can achieve consensus with a single crash failure in a perfect asynchronous
network.” This scenario is ___________?
a. Always true
b. Sometimes true
c. Can’t say
d. Impossible
Hint: As The Impossibility Theorem states Consensus is not possible in a perfect
asynchronous network even with a single crash failure
a. Hash Algorithms
b. Confidentiality
c. Availability
d. Access control for the participants in the blockchain network
Hint: Permissionless blockchain is an open network, e.g. bitcoin, anyone can join,
transact, leave, and rejoin the network whereas permissioned blockchain is a
closed network e.g. Hyperledger. Both networks use the same hash algorithms and
Offer confidentiality and availability.
9. What is an advantage of a permissionless blockchain?
a. It does not use disinterested third parties to secure blocks, as all participants
have a vested interest.
b. It is open to everyone in the world without permission and approval
requirements.
c. It is more resilient against fraud because it uses federated nodes to combat
fraud.
d. Its networks are built by for-profit companies and the working of the network
is guaranteed.
Hint: Refer to the Week 4 Slide
i. TCP
ii. HTTP
iii. HTTPS
a. i, ii, iii
b. Only ii
c. Only i
d. All of the above
Hint: Bitcoin protocol runs over TCP as reliability is required for transactions.