Hello NPTEL Learners, In this article, you will find NPTEL Blockchain and its Applications Assignment 5 Week 5 Answers 2023. All the Answers are provided below to help the students as a reference don’t straight away look for the solutions, first try to solve the questions by yourself. If you find any difficulty, then look for the solutions.
NPTEL Blockchain and its Applications Assignment 5 Answers 2023 Join Group👇
Note: We are trying to give our best so please share with your friends also.

NPTEL Blockchain and its Applications Assignment 5 Answers 2023:
We are updating answers soon Join Group for update: CLICK HERE
Q.1. What is the limitation of using the consensus algorithm Proof of Work (POW)?
- a. A lot of mining power is wasted as only one gets success in mining at a time
- b. PoW is used for permissioned blockchain
- c. Low transaction throughput
- d. It is used for blockchain mining
Q.2. Which statement(s) is/are true for PoS(Proof of Stake) consensus?
- a. Depends on the work done by the miner
- b. Depends on the amount of crypto currency the miner holds
- c. Provides less protection in general
- d. None of the above
Q.3. Which of the following is/are applicable for POET(Proof of Elapsed Time) consensus
- a. Each participant in the blockchain network waits a random amount of time
- b. The first participant to finish becomes the leader for the new block
- c. Trusted execution platform and attestation are used to verify that the proposer has really waited
- d. None of the above.
NPTEL Blockchain and its Applications Assignment 5 Answers Join Group👇
Q.4. Proof of Burn consensus algorithms do not consider virtual resources or digital coins for participating in the mining activity?
- a. True
- b. False
Q.5. 5 ether equals
- a. 5X(1016) wei
- b. 5X(10^8) wei
- c. 5X(106) wei
- d. 5X(1018) wei
Q.6. Which of the following syntax is correct to write data in a smart contract using solidity
- a. myContract.methods.store(“99”).set()
- b. myContract.methods.store(“99”).send()
- c. myContract.methods.write(“99”).send()
- d. myContract.methods.write(“99”).set()
Q.7. How an attacker could manipulate the transaction history of a blockchain to be able to spend a token or a cryptocurrency twice.
- a. The attacker hard-forked the network and created a new blockchain network.
- b. The attacker modified the transaction on his node and propagated it in the network.
- c. The attacker modified the smart contract and recovered the investor’s cryptocurrency.
- d. The attacker gained control of more than 51% of the network’s computing power.
NPTEL Blockchain and its Applications Week 5 Assignment 5 Answers Join Group👇
CLICK HERE
Q.8. What library/API is used for smart contract deployment and invocation from Dapp?
- a. Contract
- b. web3
- c. admin
- d. eth
Q.9. What is the CLI command used to send ethers after the nodes have been initialized?
- a. eth.submitTransaction()
- b. eth.sendIBANTransaction()
- c. eth.sendRawTransaction()
- d. eth.sendTransaction()
Q.10. In which scenario is a smart contract the best solution to the problem?
- a. A restaurant manager wants to force customers to pay for their food by transferring cryptocurrency to his wallet.
- b. A chief engineer wants her smart watch to notify her when her partner enters their front door.
- c. A grid company wants to automatically buy power when the price reaches a predetermined rate.
- d. An insurance company wants to pay out a small vendor whenever the case manager feels it is best to do so.
NPTEL Blockchain and its Applications Assignment 5 Answers Join Group👇
Disclaimer: This answer is provided by us only for discussion purpose if any answer will be getting wrong don’t blame us. If any doubt or suggestions regarding any question kindly comment. The solution is provided by Chase2learn. This tutorial is only for Discussion and Learning purpose.
About NPTEL Blockchain and its Applications Course:
In the last few years, Blockchain technology has generated massive interest among governments, enterprises, and academics, because of its capability of providing a transparent, secured, tamper-proof solution for interconnecting different stakeholders in a trustless setup. In January 2021, the Ministry of Electronics and Information Technology (MeiTY), Government of India, published the first draft of the “National Strategy on Blockchain” that highlights 17 potential applications that are of national interest.
Course Layout:
- Week 1: Introduction to Blockchain Technology and its Importance
- Week 2: Basic Crypto Primitives I – Cryptographic Hash
- Week 3: Basic Crypto Primitives II – Digital Signature
- Week 4: Evolution of the Blockchain Technology
- Week 5: Elements of a Blockchain
- Week 6: Blockchain Consensus I – Permissionless Models
- Week 7: Blockchain Consensus II – Permissioned Models
- Week 8: Smart Contract Hands On I – Ethereum Smart Contracts (Permissionless Model)
- Week 9: Smart Contract Hand On II – Hyperledger Fabric (Permissioned Model)
- Week 10: Decentralized Identity Management
- Week 11: Blockchain Interoperability
- Week 12: Blockchain Applications
CRITERIA TO GET A CERTIFICATE:
Average assignment score = 25% of average of best 8 assignments out of the total 12 assignments given in the course.
Exam score = 75% of the proctored certification exam score out of 100
Final score = Average assignment score + Exam score
YOU WILL BE ELIGIBLE FOR A CERTIFICATE ONLY IF AVERAGE ASSIGNMENT SCORE >=10/25 AND EXAM SCORE >= 30/75. If one of the 2 criteria is not met, you will not get the certificate even if the Final score >= 40/100.
If you have not registered for exam kindly register Through https://examform.nptel.ac.in/
Join Our Telegram Group:- CLICK HERE