UNIT-I Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

1. Define decentralization and discuss its significance in the context of blockchain


technology.

Decentralization is the distribution of power or authority away from a central location or


group. In the context of blockchain technology, decentralization refers to the distribution of
control and decision-making over the blockchain network to a large number of nodes
(computers) that are spread across the globe.

There are several benefits to decentralization in blockchain technology.

 It makes the network more secure and resistant to attack. Since there is no central point
of failure, it is very difficult to hack or corrupt the entire network.
 Decentralization makes the network more transparent and accountable. All transactions
are recorded on the blockchain and are visible to everyone on the network. This makes
it difficult to commit fraud or other malicious activities.
 Decentralization makes the network more accessible and affordable. Anyone with a
computer and an internet connection can participate in the network. This makes it a
more level playing field for everyone.

Here are some specific examples of how decentralization is used in blockchain


technology:

 In Bitcoin, the blockchain is used to record all cryptocurrency transactions. This makes
it a secure and transparent way to transfer value.
 In Ethereum, the blockchain is used to run smart contracts. These are self-executing
contracts that can be used to automate a variety of tasks.
 In supply chain management, blockchain can be used to track the movement of goods
and materials. This can help to improve transparency and efficiency.
 In healthcare, blockchain can be used to store patient records. This can help to improve
security and privacy.
 Reduced Intermediaries: In financial services, decentralization eliminates the need for
intermediaries such as banks or payment processors, which can lead to reduced
transaction costs and increased efficiency.
 Data Privacy and Ownership: Users have more control over their data in decentralized
systems, reducing the risk of unauthorized data sharing or exploitation.

1|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

2. Discuss the shortcomings of current transaction systems?


 Centralization: Current transaction systems are centralized, meaning that they are
controlled by a single entity or organization. This can lead to a number of problems, such
as:
o Single point of failure: If the central entity is compromised, the entire system can
be brought down.
o Lack of transparency: The central entity has complete control over the data,
which can make it difficult to track and audit transactions.
o Security risks: The central entity is a target for hackers and other malicious
actors.
 Cost: Current transaction systems can be expensive to operate and maintain. This is
because they require a lot of hardware and software infrastructure.
 Slow transaction speeds: Current transaction systems can be slow, especially for high-
volume transactions. This is because they have to go through a number of steps before a
transaction is processed.
 Limited scalability: Current transaction systems are not scalable, meaning that they
cannot handle a large number of transactions without slowing down.

Blockchain technology can address some of these shortcomings. For example, blockchain is
decentralized, meaning that it is not controlled by a single entity. This makes it more secure
and transparent than traditional systems. Blockchain is also more scalable than traditional
systems, meaning that it can handle a large number of transactions without slowing down.

3. Describe the key Features of Blockchain.


Or
Illustrate the Architecture of Blockchain technology with its features.

Blockchain technology has several key features that set it apart from traditional centralized
systems. These features work together to provide security, transparency, and decentralization.
Here are the key features of blockchain:
 Distributed Ledger
 Peer- to – Peer
 Transparency
 Consensus
 Security
 Immutability
 Programmable
Distributed Ledger: - A ledger is a collection of transactions. With a digitally distributed
ledger or a blockchain, no one owns the ledger. The ledger is distributed among participants in
the network, all running the same blockchain protocols. It is decentralized in that an identical
copy of the ledger exists on every node/computer on the network.

2|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

“A distributed ledger is a database that is shared across multiple nodes in a network. Each node
maintains a copy of the ledger, and all transactions are recorded on each node. This ensures that
the ledger is always up-to-date and that no single node can control or manipulate the data.”
Peer- to – Peer: - The ledger is stored, updated, and maintained by a peer network. Nodes form
the infrastructure of a blockchain network. They store, spread and preserve the blockchain data,
so a blockchain exists on nodes.
Nodes in a blockchain network follow the same rules, but they have different roles. Full nodes
maintain the blockchain by storing a copy of the ledger and verifying transactions. User nodes
interact with the ledger by sending and receiving transactions. Blockchain technology replaces
a centralized authority with a peer-to-peer network.
Transparency: - All transactions on a distributed ledger are transparent, as they are recorded
on every node in the network. This makes it easy to track the history of any asset or transaction.
In a blockchain, we can see all the transactions that have occurred on the shared or distributed
ledger. A blockchain stores details of every transaction that occurred since the first transfer.
Since every node shares a copy of the agreed-upon ledger, there is no friction about the
transactions, everyone has the same agreed-upon copy.
Consensus: - Consensus in blockchain refers to the mechanism by which participants in a
decentralized network agree on the validity and order of transactions and reach a common
understanding of the state of the blockchain ledger. It ensures that all nodes in the network have
a consistent view of the blockchain and prevents malicious actors from tampering with the data.
Various consensus mechanisms exist, such as proof-of-work, proof-of-stake, and practical
Byzantine fault tolerance (PBFT).

Security: - Blockchain employs cryptographic techniques to secure transactions and data.


Cryptographic hash functions, digital signatures, and encryption are used to ensure data
integrity, verify the authenticity of transactions, and protect sensitive information. The
distributed nature of the blockchain network adds an additional layer of security by reducing
the risk of attacks and data breaches.

Immutability: - Once a transaction is added to a block and the block is added to the chain, it
becomes extremely difficult to alter the data. Each block contains a reference to the previous
block through cryptographic hashes, creating a chronological chain. This immutability ensures
that past transactions remain secure and tamper-proof.

Programmable: - Programmable blockchains are blockchains that allow developers to write


code that is executed on the blockchain. This code is known as "smart contracts." Smart
contracts can be used to automate a wide variety of tasks, such as:

• Transferring ownership of assets: Smart contracts can be used to transfer ownership of


assets, such as cryptocurrencies or tokens. This can be done without the need for a third
party, such as a bank or a lawyer.

3|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

• Executing business logic: Smart contracts can be used to execute business logic, such as
checking if a user has enough funds to make a purchase. This can help to automate
business processes and reduce the risk of fraud.
• Recording events: Smart contracts can be used to record events, such as the arrival of a
shipment or the completion of a task. This can help to improve traceability and
transparency.

4. Explain about the core components of Blockchain.


Or
Describe how to achieve distributed trust in transactions using blockchain.

The basic idea behind blockchain is to create a decentralized and transparent digital ledger
that records and verifies transactions or data in a secure and immutable manner. It aims to
enable trust, accountability, and efficiency in various processes without the need for a central
authority.

The core components of the blockchain concept include:

1. Distributed Ledger: Instead of a single central authority maintaining the ledger,


blockchain employs a distributed ledger. This ledger is replicated across multiple nodes
or computers participating in the network. Each node has a copy of the entire ledger,
and they work together to validate and agree upon the state of the ledger.
2. Blocks and Chain: Transactions or data are grouped into blocks, which contain a set of
records. Each block is linked to the previous block through a cryptographic hash
function, forming a chain of blocks, hence the name "blockchain." This chaining ensures
the integrity and immutability of the data. Once a block is added to the chain, it becomes
nearly impossible to alter or remove.

4|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

3. Consensus Mechanism: To reach an agreement on the validity of transactions and the


order in which they are added to the blockchain, consensus mechanisms are used. These
mechanisms involve a set of rules and protocols that govern how participants in the
network agree on the state of the ledger. Consensus mechanisms ensure that most of the
network participants validate and agree upon the transactions, preventing fraudulent or
conflicting data from being added to the blockchain.
4. Cryptography: Blockchain employs cryptographic techniques to secure the data and
transactions. It uses cryptographic hash functions to generate unique digital fingerprints
(hashes) of the data, ensuring its integrity. Public-key cryptography is used to create
digital signatures that verify the authenticity and integrity of transactions. Encryption
techniques can also be employed to protect sensitive data within the blockchain.
5. Immutable Ledger: Once a block is added to the blockchain, it becomes virtually
impossible to alter the data contained within it. This is due to the cryptographic links
between blocks and the consensus mechanism that enforces agreement on the chain's
history. Any attempt to change a past transaction would require altering all subsequent
blocks, which would require an unrealistic amount of computational power.
6. Trust through Verification: The distributed and transparent nature of the blockchain
allows participants to independently verify the validity of transactions. Anyone can
access the entire transaction history and validate that the ledger's state is consistent
across all nodes. This verification process builds trust without relying on a central
authority.

By combining these elements, blockchain technology achieves distributed trust in


transactions. Participants in the network trust the system because the data is secured through
cryptography, transactions are validated through consensus, and the ledger's immutability
ensures that past records remain unchanged. This innovative approach has the potential to
reshape various industries by providing secure, transparent, and tamper-resistant systems for
conducting digital transactions.

Blockchain technology has the potential to transform industries, including finance, supply
chain management, healthcare, voting systems, and more, by improving transparency,
security, and efficiency.

5. How blokchain changes the landscape of Digitization? Explain.


Blockchain technology has the potential to significantly change the landscape of digitization
across various industries. Here are some key ways in which blockchain can have a
transformative impact:
 Trust and Transparency: Blockchain introduces a decentralized and transparent system
where all participants have access to the same information. This transparency enhances
trust among participants by providing an immutable and auditable record of transactions.
It reduces the need for intermediaries and third-party verification, enabling direct peer-
to-peer interactions.

5|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

 Security and Data Integrity: Blockchain uses cryptography to secure data and make it
tamper-proof. Data is replicated across multiple nodes, making it more resilient to
hacking. This is relevant in sectors where data accuracy and privacy are critical.
 Efficient and Streamlined Processes: Blockchain can streamline and automate
processes with multiple parties and complex workflows. Smart contracts automate
agreements, eliminating intermediaries and speeding up settlement. This is relevant in
areas like supply chain management, international payments, and identity verification.
 Improved Traceability and Accountability: Blockchain can track the movement of
goods in supply chains and verify the origin and quality of products. It provides a
transparent and tamper-proof record of transactions, making it ideal for traceability
purposes.
 Financial Inclusion and Cross-Border Transactions: Blockchain has the potential to
foster financial inclusion by providing access to financial services for the unbanked or
underbanked. It enables secure and low-cost access to financial services, such as
payments, lending, and remittances. Blockchain also enables faster and more cost-
effective cross-border transactions.
 Data Privacy and Ownership: Blockchain can give individuals greater control over their
personal data. It allows individuals to manage and share their personal information
securely and selectively, reducing reliance on centralized databases vulnerable to data
breaches. Users can grant access to specific data elements without exposing their entire
profile, enhancing privacy and data ownership.

6. Describe the fundamental role of cryptography in ensuring the security and integrity of
data within a blockchain network.

Cryptography is the practice of securing information and communications through the use of
codes. Cryptography, the practice of secure communication, ensures that the data stored in a
blockchain remains tamper-proof, confidential, and authentic.

There are two main types of cryptography used in blockchain:

 Symmetric cryptography: This type of cryptography uses the same key to encrypt
and decrypt data. This key is shared between the sender and receiver of the data.
 Asymmetric cryptography: This type of cryptography uses two different keys: a
public key and a private key. The public key is used to encrypt data, and the private
key is used to decrypt it.

 Hash Functions: Hash functions are mathematical algorithms that take an input (data) and
produce a fixed-size string of characters, known as a hash. Hash functions are designed
to be fast to compute and irreversible. In blockchain, hash functions are used to create a
unique digital fingerprint for each block, ensuring its integrity. Even a small change in the
input data results in a completely different hash output.

6|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

 Digital Signatures: Digital signatures are used to verify the authenticity and integrity of
data. A digital signature is created using a private key, and it can be verified using a
corresponding public key. In blockchain, digital signatures are used to ensure that
transactions are authorized by the rightful owner and that they haven't been tampered with.
 Public-Key Cryptography: Public-key cryptography, also known as asymmetric
cryptography, uses a pair of keys: a public key and a private key. The public key is widely
distributed, while the private key is kept secret. Messages encrypted with the public key
can only be decrypted with the corresponding private key, providing confidentiality.
Public-key cryptography is widely used in blockchain for secure key exchange, digital
signatures, and encryption.
 Merkle Trees: A Merkle tree, or hash tree, is a tree structure where each leaf node
represents a data block, and each non-leaf node represents the hash of its child nodes. It
allows efficient verification of data integrity by recursively hashing and comparing nodes
from the bottom (leaves) to the top (root). Merkle trees are used in blockchain to summarize
the transactions within a block and provide a compact proof of the block's integrity.
 Elliptic Curve Cryptography (ECC): Elliptic Curve Cryptography is a public-key
cryptography scheme that leverages the mathematics of elliptic curves over finite fields.
ECC offers the same level of security as other asymmetric algorithms (like RSA) but with
much shorter key lengths, making it more efficient for resource-constrained environments
such as blockchain. ECC is widely used in blockchain for digital signatures, key exchange,
and other cryptographic operations
Without cryptography, blockchain would not be secure or reliable. It is the fundamental
technology that makes blockchain possible.
7. Explain about CAP theorem and illustrate the methods of decentralization in detail.

The CAP theorem, also known as Brewer's theorem, is a fundamental theorem in distributed
computing that states that it is impossible for a distributed system to simultaneously provide
more than two out of the following three guarantees:

Consistency (C): In a distributed system, consistency implies that all nodes or participants in
the system see the same data at the same time. In other words, every read operation on the
system returns the most recent write. Achieving strong consistency ensures that there are no
conflicting or outdated versions of data across the distributed nodes.

Availability (A): Availability means that every request (read or write) to the system receives
a response, without guaranteeing that it's the most up-to-date data. Highly available systems
can provide responses even when some nodes or components are down. In an available
system, there might be variations in the data returned because of asynchrony and replication
delays.

Partition Tolerance (P): Partition tolerance addresses the system's ability to continue
functioning even when network partitions (communication failures) occur between nodes in
the distributed system. Network partitions are situations where some nodes can't

7|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

communicate with others due to network issues, but the system should still function without
failures.

The CAP theorem is important because it helps us to understand the trade-offs that we need to
make when designing distributed systems. If we want our system to be consistent and available,
then we need to make sure that there are no partitions in the network. However, this can make
the system more vulnerable to outages. If we want our system to be partition tolerant and
available, then we need to relax the consistency requirement. This means that some nodes in the
system may have different views of the data.

There are a number of methods of decentralization. Some of the most common methods include:

 Distributed ledgers: A distributed ledger is a database that is shared across a network of


nodes. This means that there is no single point of control for the database.
 Peer-to-peer networks: A peer-to-peer network is a network of computers that are
connected directly to each other. This means that there is no central server in the network.
 Consensus mechanisms: A consensus mechanism is a way of ensuring that all nodes in a
network agree on the state of the system.

The choice of decentralization method depends on the specific application. For example, a
distributed ledger may be a good choice for a financial application, while a peer-to-peer network
may be a good choice for a file sharing application.

8. Compare fiat currency and cryptocurrency, highlighting their key differences in terms
of origin, regulation, and underlying technology.

 Origin: Fiat currency is issued by a central bank, while cryptocurrency is created by a


decentralized network of computers.
 Regulation: Fiat currency is regulated by governments, while cryptocurrency is not (or
less so).
 Underlying technology: Fiat currency is based on the traditional banking system, while
cryptocurrency is based on blockchain technology.

Here is a more detailed explanation of each of these differences:

Origin:

 Fiat Currency: Fiat currency is government-issued currency that is not backed by a


physical commodity like gold or silver. It has value because the government declares
it as legal tender, and people trust in its acceptance for transactions.
 Cryptocurrency: Cryptocurrency is a digital or virtual form of currency that operates
on decentralized technology called blockchain. It is created through a process known
as mining (Proof of Work) or staking (Proof of Stake) and is not issued by any central
authority.

8|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

Regulation:

 Fiat Currency: Fiat currencies are regulated by government central banks and
financial institutions. Governments have control over the issuance, circulation, and
monetary policy of fiat currency. Regulations vary by country and can include factors
such as interest rates, inflation targets, and capital controls.
 Cryptocurrency: Cryptocurrencies are relatively new and have faced varied
regulatory responses worldwide. Some countries have embraced cryptocurrencies,
considering them legal forms of payment or commodities, while others have imposed
strict regulations or outright bans due to concerns about money laundering, tax evasion,
and consumer protection.

Underlying Technology:

 Fiat Currency: Fiat currency relies on centralized systems, including traditional


banking and financial infrastructure, for transactions and record-keeping. Transactions
are processed through financial institutions and intermediaries.
 Cryptocurrency: Cryptocurrencies operate on decentralized blockchain technology.
Blockchain is a distributed and immutable digital ledger that records all transactions
across a network of computers (nodes). This technology eliminates the need for
intermediaries, enhances security, and allows for peer-to-peer transactions.

9. Discuss the types of crypto currency and write the advantages and disadvantages of
crypto currency over traditional currency.

Here are some of the most common types of cryptocurrencies:

Bitcoin: Bitcoin is the first and most well-known cryptocurrency. It was created in 2009
by an anonymous person or group of people under the pseudonym Satoshi Nakamoto.
Bitcoin is based on a peer-to-peer network and uses cryptography to secure its transactions.
Ethereum: Ethereum is a blockchain platform that allows developers to create
decentralized applications. It was created in 2015 by Vitalik Buterin. Ethereum uses a
different consensus mechanism than Bitcoin, called proof-of-stake.
Tether: Tether is a stablecoin, which means that it is pegged to a fiat currency, such as the
US dollar. This means that the value of Tether is always supposed to be equal to the value
of the fiat currency that it is pegged to.
Binance Coin: Binance Coin is the native cryptocurrency of the Binance exchange. It can
be used to pay for fees on the exchange and to participate in certain liquidity pools.

Here are some of the advantages of cryptocurrencies over traditional currency:

 Decentralization: Cryptocurrencies are decentralized, meaning that they are not


controlled by any central authority. This makes them more secure and resistant to
censorship.

9|Page
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

 Transparency: All transactions on the blockchain are public, which makes it


difficult to fraud or corruption.
 Immutability: Once a transaction is recorded on the blockchain, it cannot be
changed. This makes cryptocurrencies ideal for storing value.
 Global reach: Cryptocurrencies can be used to make payments anywhere in the
world, without the need for a third party.
 Low fees: Cryptocurrencies typically have lower fees than traditional payment
methods, such as credit cards and wire transfers.

Here are some of the disadvantages of cryptocurrencies over traditional currency:

 Price volatility: The price of cryptocurrencies is volatile, meaning that it can


fluctuate wildly. This makes them a risky investment.
 Security: Cryptocurrencies are still a relatively new technology, and there are still
some security risks associated with them.
 Regulation: Cryptocurrencies are not regulated in most jurisdictions, which can
make them a risky investment.
 Energy consumption: The mining process used to secure some cryptocurrencies,
such as Bitcoin, consumes a lot of energy.
 Acceptance: Cryptocurrencies are not yet widely accepted as a form of payment.
This limits their usefulness.

10. Explain how blockchain can be used to improve the efficiency of financial
transactions.

Blockchain technology has the potential to revolutionize various aspects of financial


services by enhancing security, efficiency, transparency, and reducing costs. Here are some
key financial services areas where blockchain is making an impact:

• Payments and Remittances: Blockchain-based cryptocurrencies, such as Bitcoin,


have introduced an alternative form of digital payment. They enable peer-to-peer
transactions without the need for intermediaries like banks. Blockchain's decentralized
nature and cryptographic security provide secure and efficient cross-border remittance
solutions, potentially reducing costs and transaction times.
• Smart Contracts: Smart contracts are self-executing contracts with predefined
conditions written into code on a blockchain. They automatically enforce and facilitate
the negotiation or performance of an agreement. Smart contracts eliminate the need for
intermediaries, reduce costs, and increase efficiency in areas such as insurance claims,
supply chain management, and financial derivatives.
• Identity and KYC: Blockchain can improve identity management by providing a
secure and tamper-proof system for verifying and managing identities. It can enable
individuals to have control over their personal data and selectively share it with
authorized entities. Know Your Customer (KYC) processes can also be streamlined
through blockchain, reducing redundant paperwork and enhancing data privacy.

10 | P a g e
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

• Trade Finance: Blockchain technology can streamline trade finance processes by


providing a secure and transparent platform for recording and verifying trade
transactions, invoices, and shipping documents. This can help reduce fraud, simplify
processes, and enhance trust among participants in international trade.
• Asset Tokenization: Blockchain allows the representation of real-world assets, such
as real estate, artwork, or commodities, as digital tokens on a blockchain. This process,
known as asset tokenization, enables fractional ownership, increased liquidity, and
easier transfer of ownership in traditionally illiquid assets.
• Supply Chain Finance: Blockchain can enhance supply chain finance by providing
end-to-end transparency and traceability of goods. It enables secure and efficient
tracking of products from their origin to the end consumer, reducing fraud, improving
inventory management, and enabling more accurate financing based on real-time data.
• Cross-Border Transactions and Settlements: Blockchain technology has the
potential to simplify and accelerate cross-border transactions and settlements by
providing a shared, transparent, and secure infrastructure for financial institutions. It
can reduce the need for intermediaries, streamline processes, and reduce settlement
times, resulting in cost savings and improved liquidity.
11. Explain how a Bitcoin prediction market works.

Bitcoin prediction markets are platforms or exchanges where individuals can place bets or
make predictions on the future price or performance of Bitcoin. These markets allow
participants to speculate on the future value of Bitcoin and potentially profit from correct
predictions.

In a Bitcoin prediction market, participants can take two main roles:

• Speculators: Speculators place bets on the future price or performance of Bitcoin.


They predict whether the price will go up or down within a specific time frame or make
more detailed predictions about its value at a particular date. Speculators aim to make
profits by correctly predicting and trading based on their predictions.
• Traders: Traders facilitate the prediction market by offering contracts or options that
represent different outcomes. They create markets and provide liquidity by offering
options with various strike prices, expiration dates, and other parameters. Traders earn
profits by correctly pricing the contracts and managing the risk associated with their
positions.

Bitcoin prediction markets operate similarly to traditional financial markets, but with a
focus on Bitcoin-specific predictions. Participants can place bets or trade contracts based
on their expectations of Bitcoin's future performance. The prices of these contracts
fluctuate based on supply and demand, reflecting the collective sentiment and predictions
of the participants.

11 | P a g e
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

12. Explain how a peer-to-peer network works.

In a P2P network, each computer is called a "peer." Peers are connected to each other through the
Internet. A peer-to-peer (P2P) network is a decentralized network of computers that are connected
to each other and share resources. In a P2P network, there is no central server or authority. Instead,
all of the computers on the network are equal and can communicate directly with each other.

P2P networks are used for a variety of purposes, including file sharing, streaming media, and
gaming. They are also used for more specialized applications, such as distributed computing and
disaster recovery.

How P2P network works:

1. When a computer joins a P2P network, it is assigned a unique identifier.


2. The computer then broadcasts a message to the rest of the network, announcing its
presence.
3. Other computers on the network respond to the message, and the computer is added to the
network's routing table.
4. Once the computer is added to the routing table, it can start communicating with other
computers on the network.

When a computer wants to share a resource, it broadcasts a message to the network. Other
computers on the network that are interested in the resource respond to the message, and the
resource is shared between the computers.

P2P networks are a powerful way to share resources and collaborate. They are also a more secure
and reliable way to communicate than traditional client-server networks. Benefits of using a peer-
to-peer network:

 Scalability: P2P networks can easily scale to accommodate a large number of users and
devices.
 Reliability: P2P networks are more reliable than traditional client-server networks because
there is no single point of failure.
 Security: P2P networks can be more secure than traditional client-server networks because
there is no central authority that can be hacked or compromised.
 Cost-effectiveness: P2P networks can be more cost-effective than traditional client-server
networks because there is no need for a central server.

12 | P a g e
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

13. Explain why the immutability of blockchain records is crucial for maintaining trust in
the integrity of data.

Immutability is the property of data that cannot be changed or deleted. In blockchain


technology, immutability is achieved through the use of cryptography. Each block in a
blockchain is cryptographically linked to the previous block, making it very difficult to
tamper with any individual block without affecting all of the subsequent blocks.

The immutability of blockchain records is crucial for maintaining trust in the integrity of
data for the following reasons:

 It ensures that data cannot be tampered with or deleted. This is important for
applications where data integrity is critical, such as financial transactions, supply
chain management, and medical records.
 It provides a transparent and auditable record of data. This allows anyone to verify
the authenticity of data and track its changes over time.
 It makes it difficult to commit fraud or other malicious activities. This is because
once data is recorded on the blockchain, it cannot be changed or deleted.

Without immutability, blockchain would not be a secure or reliable way to store data. It is
one of the key features that makes blockchain technology so valuable.

Here are some specific examples of how the immutability of blockchain records is used to
maintain trust in the integrity of data:

 In financial transactions, immutability ensures that transactions cannot be reversed


or tampered with. This is important to protect the integrity of the financial system
and prevent fraud.
 In supply chain management, immutability can be used to track the movement of
goods and materials. This can help to ensure the authenticity of products and prevent
counterfeiting.
 In medical records, immutability can be used to store patient records. This can help
to protect the privacy of patients and ensure the accuracy of their records.

14. Describe how cryptocurrencies utilize decentralized networks to facilitate transactions


without the need for a central authority.

Cryptocurrencies utilize decentralized networks to facilitate transactions without the need


for a central authority:

 Blockchain: A blockchain is a distributed ledger that records transactions in a


secure and transparent way. Each block in the blockchain contains a number of
transactions, and each block is linked to the previous block using cryptography.
This makes it very difficult to tamper with the blockchain or to change any
individual transaction.

13 | P a g e
20CS29- BLOCK CHAIN TECHNOLOGIES UNIT-I

 Mining: Miners are computers that verify transactions on the blockchain and add
new blocks to the chain. Miners are rewarded with cryptocurrency for their work.
This process helps to secure the blockchain and to prevent fraud.
 Wallets: Wallets are software programs that store cryptocurrency. Wallets can be
either hot wallets or cold wallets. Hot wallets are connected to the internet, while
cold wallets are not. Hot wallets are more convenient to use, but they are also more
vulnerable to attacks. Cold wallets are less convenient to use, but they are more
secure.
 Nodes: Nodes are computers that run the blockchain software and participate in the
network. Nodes help to verify transactions and to maintain the blockchain.

By using a decentralized network, cryptocurrencies are able to facilitate transactions


without the need for a central authority. This makes them more secure and transparent than
traditional fiat currencies.

Examples of popular cryptocurrencies include Bitcoin (BTC), Ethereum (ETH), Ripple


(XRP), Litecoin (LTC), and many others.

14 | P a g e

You might also like