Model Paper
Model Paper
What is the
difference between Bitcoin blockchain and Ethereum
blockchain?
It enables the information to be distributed among the users without being copied.
These records are block records and transactional records. Both these records can easily be
accessed, and the best thing is, it is possible to integrate them with each other without following
the complex algorithms.
Decentralized Systems
Distributed ledger
Safer & Secure Ecosystem
Minting
Data security always matters. Encryption is basically an approach that helps organizations to
keep their data secure.
The encrypted data is encoded or changed up to some extent before it is sent out of a network by
the sender and only authorized parties can access that information.In Blockchain, this approach
is useful because it simply adds more to the overall security and authenticity of blocks and helps
to keep them secure.
Every block in this online ledger basically consists of a hash pointer which acts as a link to the
block which is prior to it, transaction data and in fact a stamp of time.
No, it’s not possible to do so. In case any modification is required, the organization simply has to
erase the information from all other blocks too. It is because of no other reason than this, data
must be given the extreme care of while using this approach.
In Blockchain, blocks can be identified by the block header hash and the block height.
Yes, it can be done. There are times when only a specific portion of this online ledger is to be
considered. With the help of default options and filters, this can easily be done without making a
lot of efforts.
Merkle Tree also known as ‘hash tree’ is a data structure in cryptography in which each leaf
node is a hash of a block of data, and each non-leaf node is a hash of its child nodes.
Instructor-led Sessions
Real-life Case Studies
Assignments
Lifetime Access
Explore Curriculum
The benefit of using the Merkle Tree in blockchain is that instead of downloading every
transaction and every block, a “light client” can only download the chain of block headers.
Also, if someone needs to verify the existence of a specific transaction in a block, then he
doesn’t have to download the entire block. Downloading a set of a branch of this tree which
contains this transaction is enough. We check the hashes which are just going up the branch
(relevant to my transaction). If these hashes check out good, then we know that this particular
transaction exist in this block.
These are:
The first and in fact the prime difference is Blockchain is a digital ledger that can be
decentralized very easily. The chances of error in this approach are far less than that in an
ordinary ledger. An ordinary ledger is what that is prepared by hands or by human efforts while
the Blockchain performs all its tasks automatically. You just need to configure it in a proper
manner and by following all the guidelines.
There is no restriction on keeping records of any type in the Blockchain approach. Industries are
using Blockchain for securing all types of records.
The common types of records (to name a few) that can be kept on the Blockchains are:
The system relies on the network servicing protocol and the nodes of the network.
After the development of bitcoin, various blockchain platforms started coming up. Ethereum
came right after the evolution of Bitcoins, and is one of the popular public platforms for building
Blockchain based applications.
Then there is a Hyperledger community for building enterprise-based solutions. Also, Qtum,
IOTA, EOS are some of the widely used platforms for building Blockchain.
It’s a condition when one digital token is spent multiple times because the token generally
consists of a digital file that can easily be cloned. It simply leads to inflation and organizations
must bear a huge loss. One of the primary aims of Blockchain technology is to eliminate this
approach up to the possible extent.
Blockchain prevents double spending by confirming a transaction by multiple parties before the
actual transaction is written to the ledger. It’s no exaggeration to say that the entirety of bitcoin’s
system of Blockchain, mining, proof of work, difficulty etc, exist to produce this history of
transactions that is computationally impractical to modify.
Bitcoin [Ans]
Ethereum
Q 3. Bitcoin is based on ________ blockchain?
Private
Public [Ans]
Public Permissioned
Permissioned
Q 4. Blockchain can be stored as which of the following?
A flat file
A Database
Both of the above [Ans]
None of the above
Scalability
Improved Security
Tamper Proof
Increased Efficiency [Ans]
Q 7. Hash identifying each block in the Blockchain is
generated using which of the following cryptographic
algorithm?
SHA128
SHA256 [Ans]
True [Ans]
False
Q 9. Blockchain forks can result in which of the following?
Multiple parent blocks
Multiple children blocks [Ans]
Blowfish
Twofish
RSA [Ans]
Tripple DEA
Advanced Blockchain Interview Questions
Q 1. Can you tell me some of the widely used cryptographic
algorithms?
Blind signatures are typically employed in privacy-related protocols where the signer and
message author are different parties. Examples include cryptographic election systems
and digital cash schemes.
It is a well-known fact that security matters a lot in digital transactions. Secret sharing is an
approach meant for same. In Blockchain technology it is an approach that divides secret or
personal information into different units and sent them to the users on the network.
The original information can only be combined when a participant to whom a share of the secret
is allocated agree to combine them together with others. There are several security-related
benefits it can offer in Blockchain technology.
An off-chain transaction is the movement of value outside of the blockchain. While an on-chain
transaction – usually referred to as simply ‘a transaction’ – modifies the blockchain and depends
on the blockchain to determine its validity an off-chain transaction relies on other methods to
record and validate the transaction.
Executive accounting is nothing but a special type of accounting which is designed exclusively
for a business that offers services to the people. There is no strict upper limit on services and a
business can manage any through the executive accounting. Blockchain has algorithms that are
specially meant to handle executive accounting. In fact, it cut down many problems that are
associated with the same.
There are lots of threats to information in the present scenario. Due to increase in online
transactions over the internet, many hackers have become active and are adopting new
approaches to hack information and servers that contain financial information.
The major threat is software attack, identity theft, information extortion, as well as sabotage. In
addition to this, Trojan horses, worms, and viruses are other trouble creators.
Q 8. How will you handle the risk management when it
comes to securing the transactions records?
It is basically a process of finding the threats and all the vulnerabilities to the financial records of
an organization. The best thing that can be done with this approach is to take the right
countermeasures against them immediately.
Another approach is to pay attention to a backup plan. Based on the value of information, more
approaches such as buying new risk management software can simply be considered. The prime
risk to information is from black-hat hackers.
51% Attack refers to a situation where a group of miners who hold more than 50% of the
Network Hash Rate could manipulate with the New transactions (Stopping the transactions to
proceed or gaining conformations) or able to reverse the transactions that were recently
confirmed and kind of doing Double spend. It is Highly unlikely to be able to do that today but it
is possible.
An information leak can cut down the reputation of an organization up to an excellent extent. In
addition to this, it can be the reason for organization bearing huge losses. Many organizations
who fail to implement security protocols to keep their data secure have already lost the trust of
their customers and are struggling very hard to get the same reputation again. The overall profits
of any organization can reduce up to 80% if no attention is paid to the online transaction security.
The information is often shared on a network. Before actually transmitting it over a network, it
needs to be changed into formats that can fit the standards of the channels (the channel is a link
between the sender and a receiver).
The work done to convert the information at both sender and receiver end is generally regarded
as information processing. The biggest challenge to information processing is securing it during
that time. Another challenge is processing bulk information can impose a limit on performance.
There is no strict upper limit on the category of business who can consider this approach. The
fact is almost all the businesses are engaged in online or financial transactions that they need to
make to run the processes smoothly. Large-scale corporations, financial institutions, private
businesses, government departments and even defense organizations can trust this technology
very easily.
A business blockchain requires a shared ledger, smart contract functionality, privacy and trust.
Q 14. What are the key principles in Blockchain that are helpful in eliminating the security
threats that needs to be followed?
Yes, there are a few principles that need to be followed with respect to time. They are:
1.Auditing
2.Securing applications
3. Securing testing and similar approaches
4. Database security
5. Continuity planning
6. Digital workforce training
All these principles are basic and are easy to implement. They are helpful in making the
transactions records useful.
A security policy defines what exactly needs to be secured on a system. It bounds a network user
under some core protocols that they all must agree and follow to enhance the overall security.
When it comes to information or financial records of an organization, multiple security policies
are implemented than just one.
Banks and accounting systems use ledgers to track and timestamp transactions. The difference is
that the blockchain is completely decentralized and an open source. This means that people do
not have to rely on or trust the central bank to keep track of the transactions. The peer-to-peer
blockchain technology can keep track of all the transactions without the fear of having them
erased or lost.
Furthermore, the blockchain, because of its open-source nature, is more versatile and
programmable than central banking ledgers. If programmers need new functionality on the
blockchain, they can simply innovate on top of already existing software through consensus.
This is difficult for central banks because of all of their regulations and central points of failure.
Q 17. Can you list some of the popular consensus algorithms? Why we need different
consensus mechanisms?
Now, the possible reasons why we need consensus mechanism more than “proof-of-work” are”
There is no specific condition of using it. However, the network must be a peer-to-peer network
under the concerned protocols. It validates the new block simply and helps organizations to keep
up the pace in this matter without investing in third-party applications.
Q 19. Name the steps that are involved in the Blockchain project
implementation?
Well, there are total six steps involved in this process and they are:
1. Requirement identification
2. Screen ideas consideration
3. Project development for Blockchain
4. Feasible study on the security
5. Implementation
6. Controlling and monitoring the project
Limited Transparency
A ledger updated in minutes could save millions in collateral and settlement costs, while
also automating banks’ creaky and expensive back office systems.
Using Blockchain you can build public and private Blockchain whereas with Hyperledger
you can only build private Blockchains.
Blockchain is divided into public, private, and consortium Blockchains and Hyperledger
is a private Blockchain technology with access to Blockchain data and is limited to
predefined users, configurations, and programming.
Let’s consider the example of a school where Blockchain is similar to a digital report
card of a student. Say, each block contains a student record that has a label (stating the
date and time) of when the record was entered. Neither the teacher nor the student will
be able to modify the details of that block or the record of report cards. Also, the teacher
owns a private key that allows him/her to make new records and the student owns a
public key that allows him to view and access the report card at any time. So basically,
the teacher owns the right to update the record while the student only has the right to
view the record. This method makes the data secure.
Offer Expires In
00 : HRS
51 : MIN
16SEC
Merkel Tree is a data structure that is used for verifying a block. It is in the form of a
binary tree containing cryptographic hashes of each block. A Merkle tree is structured
similarly to a binary tree where each leaf node is a hash of a block of transactional data
and each non-leaf node is a hash of its leaf node. The Merkel root or hash root is the
final hash root of all the transaction hashes. It encompasses all the transactions that are
underlying all the non-leaf nodes.
There are a previous hash, transaction details, nonce, and target hash value. A block is
like a record of the transaction. Each time a block is verified, it gets recorded in
chronological order in the main Blockchain. Once the data is recorded, it cannot be
modified.
In a distributed ledger, there is no single point of failure as the data is distributed and
information is shared across multiple nodes. If one node fails, the other nodes carry
the same copy of the information. In comparison, traditional ledgers have a single
point of failure. If a single system crashes, the entire network comes to a standstill.
The hash value of the previous block (thereby getting linked in a blockchain)
It has a value called the nonce. The nonce is a random value which is used to vary
the value of the hash in order to generate hash value less than the target
Hash of the block itself. It is the digital signature of the block and an alphanumeric
value used to identify a block
The hash address is the unique identification of the block. It is a hex value of 64
characters that have both letters and digits. It is obtained by using the SHA - 256
algorithms.
Refer to the video to see how a block is structured. The hash of the previous block,
transaction data, and the nonce consolidate the header of the block. They are together
passed through a hashing function and then the hash value is generated.
Blockchain uses cryptography to secure users’ identities and ensure transactions are
done safely with a hash function.
Cryptography uses public and private keys in order to encrypt and decrypt data. In the
Blockchain network, a public key can be shared with all the Bitcoin users but a private
key (just like a password) is kept secret with the users.
Blockchain uses SHA - 256 which is secure and provides a unique hash output for
every input. The basic feature of this algorithm is whatever input you pass, it will give
you a standard alphanumeric output of 64 characters. It is a one-way function from
which you can derive an encrypted value from the input, but not vice-versa.
Public Blockchain ledgers are visible to all the users on the internet and any user can
verify and add a block of transactions to the Blockchain. Examples, Bitcoin,
and Ethereum.
Private Blockchain ledgers are visible to users on the internet but only specific users in
the organization can verify and add transactions. It’s a permissioned blockchain,
although the information is available publicly, the controllers of the information are within
the organization and are predetermined. Example, Blockstack.
9. What happens when you try to deploy a file with multiple contracts?
In Blockchain, deploying a file with multiple contracts is not possible. The compiler only
deploys the last contract from the uploaded file and the remaining contracts are
neglected.
The genesis block is the first block in the Blockchain which is also known as block 0
In Blockchain, it is the only block that doesn’t refer to its previous block.
level of difficulty,
Running the output value through a signature algorithm (like ECDSA) with the user’s
private key.
Following these steps, the encrypted hash, along with other information (such as the
hashing algorithm), is called the digital signature.
SHA - 256
RSA (Rivest-Shamir-Adleman)
Triple DES
Ethash
Blowfish
Smart contracts are self-executing contracts which contain the terms and conditions of
an agreement between the peers
Protecting copyrighted content: Smart contracts can protect ownership rights such as
music or books
Insurance: Smart contracts can identify false claims and prevent forgeries
14. What is the Ethereum network and how many Ethereum networks are you
familiar with?
Ethereum is a blockchain-based distributed computing platform featuring smart contract
functionality that enables users to create and deploy their decentralized applications
Live network (main network) - Smart contracts are deployed on the main network
Test network (like Ropsten, Kovan, Rinkeby) - Allow users to run their smart
contracts with no fees before deploying it on the main network
Private network - Are those which are not connected to the main network. They run
within the premises of the organization but carry the features of an Ethereum
network.
Nodes run smart contracts code on Ethereum Virtual Machine (EVM). It is a virtual
machine designed to operate as a runtime environment for Ethereum-based smart
contracts.
EVM is operated in a sandboxed environment (isolated from the main network). This is
a perfect testing environment.
You can download the EVM, run your smart contract locally in an isolated manner and
once you have tested and verified it, you can deploy it on the main network.
Dapp:
A Dapp is a decentralized application which is deployed using smart contract
A Dapp has its back-end code (smart contract) which runs on a decentralized peer-
to-peer network
Process:
Front-end
Normal application:
Process:
Front-end
API
17. Name some leading open source platforms for developing Blockchain
applications.
Some of the other widely used platforms for building Blockchain include Hyperledger,
Multichain, Open chain.
18. What is the very first thing you must specify in a Solidity file?
Consensus
Proof of work Proof of work/ Proof of
mechanism
stake
1 BTC = 6934.34
Value (8/21/18) 1 ETH = 278.98 USD
USD
21. Name the steps that are involved in the Blockchain project
implementation.
Requirement identification:
Planning stage
In this stage and individual evaluates all requirements and decides a suitable
blockchain platform to be implemented.
Development and implementation of a project
Storage:
It is extremely expensive
Memory:
It can be accessed only during contract execution. Once the execution is finished, its
data is lost
Stack:
Initially, your transaction will be executed, but if the execution of a smart contract costs
more than the specified gas, then the miners will stop validating your contract. The
Blockchain will record the transaction as failed, also the user doesn’t get a refund.
25. What does the gas usage in a transaction depend on and how is the
transaction fee calculated?
Gas usage depends upon the amount of storage and set of instructions (codes) used in
a smart contract. The transaction fee is calculated in Ether, which is given as:
Offer Expires In
00 : HRS
51 : MIN
16SEC
26. What is the fork? What are some of the types of forking?
Soft forks
Accidental forks
29. What are function modifiers in Solidity? Mention the most widely used
modifiers.
In Solidity, function modifiers are used to easily modify the behavior of your smart
contract functions. In simple terms, it can build additional features or apply restrictions
on the function of smart contracts. The most extensively used function modifiers in
solidity are:
View, which are functions that cannot modify the state of a smart contract. They are
read-only functions. Refer to our video to see an example of a View function
Pure, which are functions that neither read nor write the state of a smart contract.
They return the same result determined by its input values. Refer to our video to see
an example of a Pure function
Enroll in our Blockchain Developer Certification course and learn to work with Ethereum
deployment tools and bitcoin transaction process.
These are just some of the questions on the lips of the public as the word—
and cryptocurrency in general—are becoming more widely used.
But if you're new to the idea of blockchain, it can seem a tricky concept to
get your head around. With this in mind, we recently sat down with Dr.
Ying-Ying Hsieh, Assistant Professor of Innovation and Entrepreneurship at
Imperial College Business School, to talk about blockchain and its
applications in cryptocurrency and beyond.
1. What is blockchain?
Bitcoin is a cryptocurrency that one can think of as digital cash. Bitcoin only
exists online and therefore, its exchange needs to be recorded digitally.
Blockchain essentially acts as a digital ledger to record all transactions
happening between the peers online and provides a secure and
decentralised record for all of the exchanges.
Yes, here is an example: if you have a pot of gold you can store it in the
vault and trust the people who own the vault, i.e. banks and their
personnel, to keep it safe for you. But if your gold is analogous to bitcoin,
then, rather than putting your pot of gold into a bank vault, you actually put
it in someone's house in some imaginary village and it gets moved to a new
house every 10 minutes or so. No one knows where your gold will be
moved, which makes it very difficult for any burglar to know where it will be
at any given time. Moreover, to enter the houses in which your gold is
stored, the burglar would need to solve complicated equations, which are
both time consuming and extremely energy expensive.
Yes, in principle anyone with some computing knowledge can do it, but the
start is the easy part. The success and value of the blockchain comes from
its size and to make it attractive to the users the creator of the new
blockchain needs to be able to grow it fast by adding as many blocks as
possible to the chain. The scaling of the blockchain is referred to as
bootstrapping and it is often done through the so-called initial coin offerings
at the early stages of a cryptocurrency creation.
There are many potential avenues for the use of blockchain, though, so far,
it has been used more as a proof-of-concept and not yet fully implemented.
Essentially, any situation where trust is of key importance could make use
of blockchain, whether that is the financial industry or electronic voting
systems. In the shipping industry the blockchain could be used to track
where the goods versus the money is, and in the healthcare system it could
be used for the secure storage of patient data.