Blockchain Technology MCQ
-MENAKA DEVI.M
1) Which problem primarily motivated the shift from digital money to distributed ledgers?
Options:
A. Double-spending without a trusted authority
B. High transaction fees
C. Slow internet speeds
D. Poor user interfaces
Correct Answer: A
Explanation: Digital money could be copied and reused without a shared verification system.
2) Early digital money systems failed mainly because they were:
Options:
A. Permissionless
B. Transparent
C. Decentralized
D. Centrally controlled
Correct Answer: D
Explanation: Central control created trust and failure issues.
3) A distributed ledger differs from a traditional database because it is:
Options:
A. Faster
B. Replicated across multiple nodes
C. Stored locally
D. Password protected
Correct Answer: B
Explanation: The ledger is shared and synchronized across many nodes.
4) Which design primitive defines the communication rules in blockchain?
Options:
A. Consensus
B. Mining
C. Protocols
D. Hashing
Correct Answer: C
Explanation: Protocols specify how nodes interact and exchange data.
5) Blockchain security mainly depends on:
Options:
A. Firewalls
B. Cryptographic primitives
C. User passwords
D. Physical security
Correct Answer: B
Explanation: Hash functions and digital signatures secure the system.
6) Consensus in blockchain determines:
Options:
A. Network speed
B. Transaction fees
C. Block size
D. The valid next block
Correct Answer: D
Explanation: Consensus ensures agreement on which block to add next.
7) Permissions in a blockchain system decide:
Options:
A. Who can read or write data
B. Hash algorithm type
C. Block creation time
D. Network topology
Correct Answer: A
Explanation: Permissions control access rights in the network.
8) Which blockchain allows anyone to participate without approval?
Options:
A. Private
B. Consortium
C. Permissioned
D. Permissionless
Correct Answer: D
Explanation: Permissionless blockchains are open to all users.
9) Privacy is difficult in blockchain mainly because:
Options:
A. Blocks are encrypted
B. Nodes are centralized
C. Data is transparent and distributed
D. Consensus is slow
Correct Answer: C
Explanation: All nodes can view the shared ledger.
10) What cryptographically links one block to the previous block?
Options: A. Timestamp
B. Merkle root
C. Hash pointer
D. Digital signature
Correct Answer: C
Explanation: Each block stores the hash of the previous block.
11) Blockchain networks primarily follow which architecture?
Options:
A. Client-server
B. Peer-to-peer
C. Hierarchical
D. Centralized
Correct Answer: B
Explanation: Nodes communicate directly without a central authority.
12) What is the effect of modifying a block’s data?
Options:
A. Only the block changes
B. The chain auto-corrects
C. Hash remains same
D. The entire chain becomes invalid
Correct Answer: D
Explanation: Changed data breaks hash links across the chain.
13)what is the primary purpose of storing the <Previous Hash= in each block?
Options:
A. To reduce the size of the blockchain
B. To enable faster mining of blocks
C. To maintain immutability and detect tampering
D. To encrypt transaction data
Correct Answer:C
Explanation:Because each block stores the hash of the previous block, any change in a block alters its
hash and breaks the chain, making tampering immediately detectable.
14) Which hashing property prevents two inputs from producing the same hash?
Options:
A. Compression
B. Speed
C. Determinism
D. Collision resistance
Correct Answer: D
Explanation: Collision resistance ensures unique hash outputs.
15) Digital signatures mainly provide:
Options:
A. Authentication and non-repudiation
B. Encryption
C. Data compression
D. Faster transactions
Correct Answer: A
Explanation: They verify identity and prevent denial.
16) Which key is used to create a digital signature?
Options:
A. Public key
B. Network key
C. Private key
D. Shared key
Correct Answer: C
Explanation: Only the private key holder can sign data.
17) A hash chain is formed by:
Options:
A. Encrypting blocks
B. Linking hashes sequentially
C. Broadcasting hashes
D. Signing blocks
Correct Answer: B
Explanation: Each hash depends on the previous hash.
18) Why are hash chains important in blockchain?
Options:
A. Increase speed
B. Reduce storage
C. Enable encryption
D. Ensure tamper resistance
Correct Answer: D
Explanation: Any data change breaks the chain.
19) Blockchain improves basic hash chains by adding:
Options:
A. Timestamping and consensus
B. Password protection
C. Central authority
D. Firewalls
Correct Answer: A
Explanation: These ensure ordering and agreement
20) Which feature prevents a single node from rewriting history?
Options:
A. Wallet software
B. Consensus mechanism
C. Network layer
D. User interface
Correct Answer: B
Explanation: Ledger changes require majority approval.
21) Why is consensus essential in a distributed ledger?
Options:
A. To increase block size
B. To reduce encryption cost
C. To synchronize user wallets
D. To ensure agreement among untrusted nodes
Correct Answer: D
Explanation: Nodes do not trust each other, so consensus ensures agreement.
22)Proof of Work secures blockchain mainly by using:
Options:
A. Identity verification
B. Economic penalties
C. Computational difficulty
D. Voting power
Correct Answer: C
Explanation: Miners must solve complex puzzles to add blocks.
23)Which factor makes Proof of Work resistant to attacks?
Options:
A. High energy and computation cost
B. Centralized control
C. Permissioned access
D. Fast block generation
Correct Answer: A
Explanation: Attacks require enormous computational power.
24)Proof of Stake selects validators based on:
Options:
A. Network speed
B. Amount of cryptocurrency locked
C. Hashing power
D. Time spent online
Correct Answer: B
Explanation: Validators are chosen according to their stake.
25)Which consensus mechanism reduces energy consumption the most?
Options:
A. Proof of Work
B. Proof of Authority
C. Proof of Stake
D. Proof of Delay
Correct Answer: C
Explanation: It avoids heavy computational mining.
26)Byzantine Fault Tolerance focuses on handling:
Options:
A. Network congestion
B. Malicious or faulty nodes
C. Hash collisions
D. Key loss
Correct Answer: B
Explanation: It works even if some nodes behave incorrectly.
27)A permissioned blockchain mainly differs from a public
blockchain in:
Options:
A. Use of cryptography
B. Block structure
C. Transaction format
D. Access control
Correct Answer: D
Explanation: Participation is restricted to authorized entities
28)Which layer of blockchain handles peer discovery and
message propagation?
Options:
A. Application layer
B. Consensus layer
C. Network layer
D. Data layer
Correct Answer: C
Explanation: The network layer connects and communicates between nodes.
29)Merkle trees are used in blockchain to:
Options:
A. Encrypt transactions
B. Reduce transaction verification time
C. Generate private keys
D. Select validators
Correct Answer: B
Explanation: They allow efficient and fast verification of transactions.
30)Which technique allows proving transaction validity without
revealing data?
Options:
A. Digital signatures
B. Hashing
C. Symmetric encryption
D. Zero-knowledge proofs
Correct Answer: D
Explanation: Validity is proven without exposing information.
31)Decentralization in blockchain primarily ensures:
Options:
A. Faster transactions
B. Lower storage
C. No single point of control
D. Hidden identities
Correct Answer: C
Explanation: Control is distributed among many nodes.
32)Bitcoin’s major contribution was combining cryptography
with:
Options:
A. Central banking
B. Distributed consensus
C. Cloud storage
D. Artificial intelligence
Correct Answer: B
Explanation: It enabled trustless peer-to-peer transactions.
33)Blockchain immutability means:
Options:
A. Data cannot be deleted easily
B. Data is encrypted
C. Data is centrally stored
D. Data can never be viewed
Correct Answer: A
Explanation: Once recorded, data cannot be altered easily.
34)Which cryptographic primitive verifies the sender of a transaction?
Options:
A. Hash function
B. Timestamp
C. Digital signature
D. Merkle root
Correct Answer: C
Explanation: Digital signatures authenticate the sender.
35)Which cryptographic primitive verifies the sender of a transaction?
Options:
A. Hash function
B. Timestamp
C. Digital signature
D. Merkle root
Correct Answer: C
Explanation: Digital signatures authenticate the sender.
36)Blockchain protocols mainly define:
Options:
A. Token prices
B. Network rules and behavior
C. Wallet addresses
D. Hash output size
Correct Answer: B
Explanation: Protocols govern how the system operates.
37)When two blocks are mined at the same time, the result is:
Options:
A. Network failure
B. Permanent split
C. Data loss
D. Temporary fork
Correct Answer: D
Explanation: The network briefly diverges until consensus resolves it.
38)The longest chain rule helps the blockchain to:
Options:
A. Increase speed
B. Reduce storage
C. Resolve forks
D. Encrypt data
Correct Answer: C
Explanation: The longest valid chain is accepted as correct.
39)Which property ensures that a small input change drastically changes the hash?
Options:
A. Determinism
B. Collision resistance
C. Avalanche effect
D. Compression
Correct Answer: C
Explanation: Minor changes produce completely different hashes.
40)Public blockchains prioritize which design principle the most?
Options:
A. Confidentiality
B. Transparency
C. Central authority
D. Restricted access
Correct Answer: B
Explanation: All transactions are openly visible.
41)The blockchain ledger primarily stores
Options:
A. User passwords
B. Private keys
C. Transaction history
D. Consensus algorithms
Correct Answer: C
Explanation: All confirmed transactions are recorded in the ledger.
42)Why is consensus harder in distributed systems?
Options:
A. Nodes are identical
B. Networks are fast
C. Data is encrypted
D. Nodes may behave maliciously
Correct Answer: D
Explanation: Some nodes may act dishonestly or fail.
43)Nodes validate transactions by:
Options:
A. Trusting miners
B. Recomputing cryptographic hashes
C. Asking a central server
D. Using passwords
Correct Answer: B
Explanation: Independent verification ensures correctness.
44)Private blockchains are best suited for:
Options:
A. Open cryptocurrencies
B. Anonymous trading
C. Enterprise or organizational use
D. Public voting
Correct Answer: C
Explanation: They require controlled participation.
45)Which element ensures the chronological order of blocks?
Options:
A. Timestamp
B. Merkle tree
C. Signature
D. Public key
Correct Answer: A
Explanation: Timestamps record when blocks are created.
46)Digital signatures do NOT provide:
Options:
A. Authentication
B. Integrity
C. Confidentiality
D. Non-repudiation
Correct Answer: C
Explanation: Signatures do not encrypt data.
47)Hash collisions are dangerous because they break:
Options:
A. Speed
B. Data integrity
C. Network topology
D. Key ownership
Correct Answer: B
Explanation: Different data producing same hash damages trust.
48)Which layer is responsible for maintaining copies of the ledger?
Options:
A. Application layer
B. Network layer
C. Data layer
D. Consensus layer
Correct Answer: C
Explanation: The data layer stores blockchain records.
49)Blockchain addresses are considered pseudonymous because:
Options:
A. They hide all transactions
B. They are encrypted identities
C. They change daily
D. They are not directly linked to real identities
Correct Answer: D
Explanation: Addresses do not automatically reveal user identity.
50)Blockchain security depends most on:
Options:
A. User interface design
B. Token value
C. Cryptographic strength
D. Network speed
Correct Answer: C
Explanation: Weak cryptography compromises the system.
51)Blockchain technology is best defined as:
Options:
A. A centralized database
B. A cloud storage service
C. A peer-to-peer payment app
D. A distributed, immutable ledger
Correct Answer: D
Explanation: Data is shared across nodes and cannot be easily altered.
THANK YOU
For your attention and participation.

Blockchain-Technology-multi choice uestion