BCT1
BCT1
Blockchain is a decentralized and distributed ledger technology that securely records transactions
across multiple computers in a way that prevents tampering and ensures transparency. It is the
foundation of cryptocurrencies like Bitcoin and has applications in various industries such as
finance, healthcare, supply chain management, and more.
What is a Block?
A block is a unit of data in a blockchain that contains a set of transactions. Each block consists
of the following key components:
1. Block Header – Contains metadata such as the previous block’s hash, a unique block
identifier (hash), and a timestamp.
2. Transaction Data – Stores a list of verified transactions.
3. Nonce – A randomly generated number used in the mining process.
4. Hash – A cryptographic identifier that links each block to the previous one, ensuring the
integrity of the blockchain.
Blocks are linked together in chronological order, forming a chain of blocks (blockchain),
making it highly secure and immutable.
Registry of Transactions
Blockchain Structure
A blockchain consists of a sequence of blocks linked together, forming a continuous chain. Each
block contains:
Distributed Ledger Technology (DLT) is a decentralized system that enables multiple parties
(nodes) to maintain and update a shared digital ledger. Unlike traditional centralized databases,
DLT ensures that no single entity has complete control, improving security, transparency, and
trust.
✅
Key features of DLT:
✅
Decentralization – No central authority controls the data.
✅
Immutability – Once recorded, data cannot be altered.
✅
Consensus Mechanism – Transactions are verified by multiple nodes.
Cryptographic Security – Ensures authenticity and privacy.
What is Blockchain?
Blockchain is a type of DLT where transactions are recorded in a series of blocks that are linked
together in a chain. Each block contains a list of verified transactions, and the blockchain grows
as new blocks are added.
Blockchain operates on DLT principles but adds features like block structures, cryptographic
hashing, and consensus algorithms to enhance security and trust.
Distributed computing involves multiple computers (nodes) working together to solve a problem
or execute tasks efficiently. It forms the foundation for Distributed Ledger Technology (DLT)
and blockchain.
● Data is stored across multiple nodes to ensure redundancy and fault tolerance.
● Replication ensures a copy of data is available even if some nodes fail.
● In blockchain, each node holds a full or partial copy of the ledger.
8️⃣ Scalability
9️⃣ Middleware
Cryptography is the practice of securing communication and data from unauthorized access
using mathematical techniques. It plays a vital role in blockchain, distributed computing, and
cybersecurity by ensuring confidentiality, integrity, authentication, and non-repudiation.
Key Elements of Cryptography
4️⃣ Hashing
Game theory is widely used in economics, AI, cybersecurity, and blockchain (e.g., Bitcoin
mining, consensus mechanisms, auctions, and decentralized finance).
2️⃣ Strategies
● The outcome a player receives based on their choices and the choices of others.
● Represented in a payoff matrix or mathematical model.
● Example: In Bitcoin mining, the payoff is the block reward plus transaction fees.
● Define how players interact, what actions are allowed, and how payoffs are determined.
● Examples:
○ In a blockchain network, the consensus mechanism (e.g., Proof of Work, Proof
of Stake) is a rule that determines how new blocks are added.
● A state where no player can improve their outcome by unilaterally changing their
strategy.
● Example: In the Prisoner's Dilemma, both players choosing to defect is a Nash
Equilibrium, even though cooperation would give them a better total payoff.
● A strategy that provides the best outcome for a player, regardless of what others do.
● Example: In Bitcoin mining, using high computational power is a dominant strategy to
increase chances of winning block rewards.
Cryptocurrencies, tokens, and Initial Coin Offerings (ICOs) are key components of blockchain
technology and the digital economy. Each plays a unique role in decentralized finance (DeFi),
smart contracts, and blockchain-based applications.
1️⃣ Cryptocurrencies
🔹 Definition: Digital currencies that use cryptography for secure transactions and operate on
decentralized networks (blockchains).
🔹 Characteristics:
✅ Decentralized – No central authority controls them.
✅ Immutable & Secure – Transactions are recorded on a blockchain.
✅ Global & Borderless – Can be sent and received anywhere.
✅ Limited Supply – Many cryptocurrencies (e.g., Bitcoin) have a fixed supply.
🔹 Types of Cryptocurrencies:
● Bitcoin (BTC) – The first and most widely used cryptocurrency.
● Altcoins – Any cryptocurrency other than Bitcoin (e.g., Ethereum, Litecoin).
● Stablecoins – Pegged to assets like USD (e.g., USDT, USDC).
● Privacy Coins – Focus on anonymous transactions (e.g., Monero, Zcash).
🔹 Use Cases:
● Payments – Buy goods and services (e.g., Bitcoin, Litecoin).
● Smart Contracts & dApps – Ethereum enables decentralized applications.
● Store of Value – Bitcoin is seen as "digital gold."
2️⃣ Tokens
🔹 Definition: Digital assets built on an existing blockchain (e.g., Ethereum ERC-20 tokens).
🔹 Difference from Cryptocurrencies:
● Cryptocurrencies operate on their own blockchain (e.g., Bitcoin, Ethereum).
● Tokens are created on top of existing blockchains (e.g., USDT, Chainlink on Ethereum).
🔹 Types of Tokens:
● Utility Tokens – Used within a platform (e.g., BNB for Binance transactions).
● Security Tokens – Represent real-world assets (e.g., tokenized stocks, real estate).
● Governance Tokens – Allow holders to vote on project decisions (e.g., Uniswap’s UNI).
● Non-Fungible Tokens (NFTs) – Unique digital assets representing art, gaming, etc. (e.g.,
Bored Ape NFTs).
🔹 Use Cases:
● Access to services – Basic Attention Token (BAT) for digital advertising.
● Governance – MakerDAO (MKR) token holders vote on DeFi decisions.
● Loyalty & Rewards – Tokens for incentives (e.g., gaming rewards).
🔹 Definition: A fundraising method where blockchain projects sell tokens to raise capital,
similar to an Initial Public Offering (IPO) in traditional finance.
Blockchain is the foundational technology behind Bitcoin and many other decentralized systems.
It provides a secure, transparent, and immutable way to record transactions without a central
authority.
🔹 What is Blockchain?
Blockchain is a distributed ledger technology (DLT) that records transactions in a
decentralized and tamper-proof manner. It consists of a chain of blocks, where each block
contains transaction data and is secured using cryptography.
Consensus Proof of Work (PoW) PoW, Proof of Stake (PoS), PBFT, etc.
Mechanism
Use Cases Payments, store of value Smart contracts, DeFi, supply chain,
voting, etc.
👉
2️⃣ Can a blockchain network function without miners or validators? Why or why not?
No, a blockchain needs miners (PoW) or validators (PoS) to confirm and validate
transactions, ensuring security and consensus. Without them, the network would lack a
mechanism to agree on valid transactions, making it vulnerable to double-spending and fraud.
However, alternative consensus mechanisms like Delegated Proof of Stake (DPoS) or Byzantine
Fault Tolerance (BFT) can replace traditional mining.
3️⃣ What happens if two miners solve a block at the same time? How does the network decide
👉
which block to accept?
When two miners solve a block at the same time, the network temporarily forks, creating
two competing chains. The tie is resolved in the next round of mining:
● The chain that gets the next block added to it first becomes the valid chain.
● The other block (and transactions in it) is discarded, and those transactions return to the
mempool for re-inclusion in the next block.
This mechanism is called "longest chain rule" or "heaviest chain rule" (used in Bitcoin).
4️⃣ How can blockchain be immutable if transactions can be reversed in some networks (e.g.,
👉
Ethereum DAO hack)?
Blockchain is theoretically immutable, but transactions can be reversed under extreme
circumstances, usually through a hard fork:
● In the Ethereum DAO hack (2016), a hacker exploited a vulnerability and stole millions
of ETH. The Ethereum community decided to fork the chain, creating two separate
blockchains: Ethereum (ETH) (which reversed the hack) and Ethereum Classic (ETC)
(which kept the original, immutable ledger).
● While immutability is a core principle, blockchains can be altered if the majority of the
community agrees and implements a hard fork.
👉
5️⃣ Is it possible to hack a blockchain? If yes, how? If no, why not?
While blockchain is highly secure, it is not 100% hack-proof. Some ways it can be
✅
attacked:
51% Attack – If a single entity controls more than 50% of the network’s mining power, it
✅
can rewrite the blockchain and double-spend coins.
✅
Sybil Attack – Creating multiple fake identities to manipulate the network.
Smart Contract Exploits – Bugs in smart contracts (e.g., Ethereum DAO hack) can be
✅
exploited.
Private Key Theft – If someone steals your private key, they can control your assets.
However, major blockchains like Bitcoin are extremely secure due to their high
decentralization and mining power.
👉
are mined?
Bitcoin’s supply is capped at 21 million due to its deflationary economic model, designed
🔹
by Satoshi Nakamoto. The limit prevents inflation and mimics scarce resources like gold.
What happens when all 21 million BTC are mined?
👉
8️⃣ If a miner solves a block but doesn’t broadcast it, what happens?
If a miner solves a block but keeps it private, the network does not recognize it, and it does
not get added to the blockchain. This situation is called "selfish mining", where a miner may
attempt to withhold blocks to gain an advantage. However, if another miner broadcasts a valid
block first, the withheld block becomes invalid and is discarded by the network.
👉
9️⃣ Can Bitcoin exist without blockchain? Justify your answer.
✅
No, Bitcoin depends entirely on blockchain for its operation. Blockchain provides:
✅
Decentralization – No single point of failure.
✅
Security – Cryptographic hashing ensures transaction integrity.
Consensus Mechanism – Ensures all participants agree on valid transactions.
Without blockchain, Bitcoin would need a centralized database, which goes against its
fundamental principles of decentralization and censorship resistance.
🔟 Why is Bitcoin’s Proof of Work (PoW) considered inefficient, and what alternatives
👉 Bitcoin’s PoW is inefficient due to:
exist?
❌ High Energy Consumption – Bitcoin mining consumes more energy than some countries.
❌ Slow Transactions – Bitcoin processes ~7 transactions per second (TPS), compared to
❌ Centralization Risk – Mining power is concentrated in large mining pools.
Visa’s 65,000 TPS.
🔹 Alternatives to PoW:
✅ Proof of Stake (PoS) – Validators stake coins instead of solving complex puzzles (e.g.,
✅ Delegated Proof of Stake (DPoS) – A smaller number of elected nodes validate transactions
Ethereum 2.0).
✅ Proof of Burn (PoB) – Participants destroy coins to gain mining rights (e.g., Slimcoin).
1️⃣1️⃣ What is the key difference between a security token and a utility token? Can a token be
👉
both?
Security Token: Represents an investment in an asset (e.g., stocks, bonds) and is subject to
👉
securities regulations. It derives value from external, tradable assets.
Utility Token: Provides access to a service or product within a blockchain ecosystem (e.g.,
paying for transactions on a platform). It is not considered an investment.
👉
1️⃣2️⃣ Can an ICO raise funds without issuing tokens? How would that work?
✅
Technically, yes. An ICO can raise funds through alternative mechanisms like:
✅
Equity-Based Crowdfunding: Instead of tokens, investors get company shares.
Simple Agreement for Future Tokens (SAFT): Investors receive tokens later when the
✅
project is developed.
Debt-Based Crowdfunding: Investors lend money and receive repayments with interest.
However, ICOs traditionally issue tokens, as they act as a medium of exchange within the
project ecosystem.
👉
1️⃣3️⃣ Why do some ICOs fail even if they raise millions of dollars?
❌
ICOs fail due to multiple reasons:
❌
Lack of Product Development: Many ICOs raise funds without a working product.
❌
Regulatory Issues: Governments may ban or restrict ICOs, freezing funds.
❌
Poor Team & Execution: Weak technical teams and bad management lead to failure.
❌
Market Volatility: Crypto prices can crash, making funds worthless.
Scams & Fraud: Some ICOs are outright scams, where founders vanish with investors'
money.
👉
1️⃣4️⃣ How do investors in ICOs determine if a project is legitimate or a scam?
✅
Key factors investors check:
✅
Whitepaper & Technical Roadmap: A well-defined and realistic plan.
Team Credentials: Verified background of developers and founders.
✅ Smart Contract Audit: Independent reviews to ensure security.
✅ Regulatory Compliance: Proper registration with financial authorities.
✅ Community Transparency: Active engagement on GitHub, Telegram, or Discord.
Red flags 🚩:
❌ Anonymous team, vague whitepaper, unrealistic promises (e.g., "guaranteed 1000x returns").
👉
1️⃣5️⃣ Can an ERC-20 token exist without Ethereum? Explain.
🔹
No, an ERC-20 token depends on Ethereum.
ERC-20 is a standard for fungible tokens on Ethereum, meaning:
1️⃣6️⃣ In a Proof of Stake (PoS) system, what prevents wealthy participants from taking over
👉
the network?
✅
PoS discourages centralization through:
Slashing Mechanisms: If a validator misbehaves (e.g., validates fraudulent transactions),
✅
they lose their staked coins.
Randomized Selection: Validators are chosen proportionally but also randomly, reducing
✅
the advantage of wealth.
Decentralized Governance: Some PoS systems (like Cardano) allow smaller stakeholders to
participate via staking pools.
However, "Nothing at Stake" problem exists – rich validators might bet on multiple chains,
which some PoS designs try to counter.
👉
1️⃣7️⃣ How does game theory help prevent Sybil attacks in blockchain networks?
Game theory ensures rational participants follow network rules by making attacks
🔹
costly.
🔹
Sybil Attack: A single entity creates many fake identities (nodes) to manipulate a network.
✅
Prevention Using Game Theory:
PoW (Proof of Work): Creating multiple fake nodes requires high computational power,
making it unfeasible.
✅ PoS (Proof of Stake): Attackers need to own and stake a large amount of coins, making
✅ Reputation Systems: In some DLTs, nodes build a reputation, making fake nodes
Sybil attacks expensive.
ineffective.
Game theory ensures that honest participation is the most profitable strategy for
miners/validators.
👉
1️⃣8️⃣ If all Bitcoin miners decided to stop mining, what would happen to the network?
❌
If all miners stopped:
❌
No new transactions would be confirmed.
✅
The network would become inactive but not "dead"—existing BTC would still exist.
Bitcoin has an automatic difficulty adjustment: If mining power drops, the difficulty
✅
decreases, making mining easier.
If mining incentives return (higher BTC price or fees), miners will resume mining, reviving
the network.
👉
1️⃣9️⃣ What would be the game-theoretic impact of increasing Bitcoin’s block size limit?
✅
Increasing Bitcoin’s block size (e.g., from 1MB to 10MB) has trade-offs:
❌
Pros: More transactions per block, lower fees, faster processing.
Cons:
● Centralization risk: Larger blocks require more storage, favoring large miners.
● Weaker network security: Smaller miners may drop out, making 51% attacks easier.
● Hard Forks & Community Split: This happened with Bitcoin Cash (BCH) in 2017.
2️⃣0️⃣ If a miner controls more than 50% of the network, why doesn’t it always make sense for
👉
them to attack the blockchain?
✅
A miner with 51% control can:
Double-spend coins.
✅ Censor transactions.
✅ Reorganize the blockchain.
❌ But attacking is irrational due to:
● Self-Harm: A 51% attack damages trust in Bitcoin, crashing its value. If the miner holds
BTC, they lose money.
● Mining Revenue Loss: Instead of attacking, the miner can profit more by mining
honestly.
● Network Defense: Developers and exchanges may react by changing the mining
algorithm (hard fork).
Thus, rational miners prefer profit over destruction—this is the core game-theoretic
protection of Bitcoin!