Skip to main content
  1. Resources/
  2. Study Materials/
  3. Information Technology Engineering/
  4. IT Semester 6/
  5. Fundamentals of Blockchain (4361603)/

Foundation of Blockchain (4361603) - Summer 2024 Solution

·
Study-Material Solutions Blockchain 4361603 2024 Summer
Milav Dabgar
Author
Milav Dabgar
Experienced lecturer in the electrical and electronic manufacturing industry. Skilled in Embedded Systems, Image Processing, Data Science, MATLAB, Python, STM32. Strong education professional with a Master’s degree in Communication Systems Engineering from L.D. College of Engineering - Ahmedabad.
Table of Contents

Question 1(a) [3 marks]
#

Explain benefits of using distributed ledger systems.

Answer:

Table: Benefits of Distributed Ledger Systems

BenefitDescription
TransparencyAll participants can view transaction history
SecurityCryptographic protection against tampering
DecentralizationNo single point of failure or control
ImmutabilityRecords cannot be altered once confirmed

Mnemonic: “T-S-D-I” (Transparent, Secure, Decentralized, Immutable)

Question 1(b) [4 marks]
#

Define: 1) Blockchain 2) Distributed systems

Answer:

Table: Key Definitions

TermDefinition
BlockchainA chain of blocks containing transaction data, linked using cryptographic hashes
Distributed SystemsNetwork of independent computers working together as a single system

Key Features:

  • Blockchain: Uses hash pointers, consensus mechanisms, and merkle trees
  • Distributed Systems: Fault tolerance, scalability, and resource sharing

Mnemonic: “Chain-Hash-Consensus” for Blockchain, “Network-Independent-Together” for Distributed

Question 1(c) [7 marks]
#

Illustrate CAP theorem with the help of Blockchain network.

Answer:

Table: CAP Theorem Components

PropertyDescriptionBlockchain Context
ConsistencyAll nodes see same dataAll nodes have identical ledger
AvailabilitySystem remains operationalNetwork stays accessible
Partition ToleranceWorks despite network failuresContinues during node disconnections

Diagram:

graph TD
    A[CAP Theorem] --> B[Consistency]
    A --> C[Availability] 
    A --> D[Partition Tolerance]
    B --> E[Bitcoin prioritizes C+P]
    C --> F[Some systems choose A+P]
    D --> G[Essential for blockchain]

Key Points:

  • Trade-off: Can only achieve 2 out of 3 properties simultaneously
  • Blockchain Choice: Most blockchains choose Consistency + Partition Tolerance
  • Example: Bitcoin may become temporarily unavailable but maintains consistency

Mnemonic: “CAP-2-out-of-3” (Choose Any 2 Properties out of 3)

Question 1(c) OR [7 marks]
#

List and explain applications of blockchain network.

Answer:

Table: Blockchain Applications

ApplicationDescriptionExample
CryptocurrencyDigital money transactionsBitcoin, Ethereum
Supply ChainTrack products from originWalmart food tracing
HealthcareSecure patient recordsMedical data sharing
VotingTransparent electionsEstonia e-voting
Real EstateProperty ownership recordsLand registries

Key Benefits:

  • Transparency: All transactions visible to participants
  • Security: Cryptographic protection against fraud
  • Efficiency: Reduced intermediaries and costs

Mnemonic: “C-S-H-V-R” (Crypto, Supply, Health, Vote, Real estate)

Question 2(a) [3 marks]
#

Define and explain a permissionless blockchain in detail.

Answer:

Definition: A blockchain where anyone can participate without requiring permission from a central authority.

Table: Permissionless Blockchain Features

FeatureDescription
Open AccessAnyone can join and participate
Public VerificationAll transactions are publicly verifiable
DecentralizedNo central controlling authority

Key Characteristics:

  • Consensus: Uses proof-of-work or proof-of-stake
  • Examples: Bitcoin, Ethereum mainnet

Mnemonic: “Open-Public-Decentralized” (OPD)

Question 2(b) [4 marks]
#

Draw a figure and provide a brief explanation of a data structure of a blockchain.

Answer:

Diagram: Blockchain Data Structure

PMTNTreiorermnavkecnBilsesloet:aouaccsRmNtkop1iHo:o1atns:Tsh1::MRT01X1PMTNTreiorermnavkecnBilsesloet:aouaccsRmNtkop2iHo:o2atns:Tsh2::MRTH2X12PMTNTreiorermnavkecnBilsesloet:aouaccsRmNtkop3iHo:o3atns:Tsh3::MRTH3X23

Key Components:

  • Previous Hash: Links blocks together creating chain
  • Merkle Root: Summary of all transactions in block
  • Timestamp: When block was created
  • Nonce: Number used once for proof-of-work

Mnemonic: “P-M-T-N” (Previous, Merkle, Time, Nonce)

Question 2(c) [7 marks]
#

Explain the core components of blockchain with suitable diagrams.

Answer:

Table: Core Components of Blockchain

ComponentFunctionPurpose
BlocksData containersStore transaction information
Hash FunctionsCreate digital fingerprintsEnsure data integrity
Merkle TreesTransaction summariesEfficient verification
Consensus MechanismAgreement protocolValidate new blocks
Digital SignaturesIdentity verificationAuthenticate transactions

Diagram: Merkle Tree Structure

graph TD
    A[Root Hash] --> B[Hash AB]
    A --> C[Hash CD]
    B --> D[Hash A]
    B --> E[Hash B]
    C --> F[Hash C]
    C --> G[Hash D]
    D --> H[Transaction A]
    E --> I[Transaction B]
    F --> J[Transaction C]
    G --> K[Transaction D]

Key Points:

  • Immutability: Hash functions make tampering detectable
  • Efficiency: Merkle trees allow fast verification
  • Decentralization: Consensus mechanisms eliminate central authority

Mnemonic: “B-H-M-C-D” (Blocks, Hash, Merkle, Consensus, Digital)

Question 2(a) OR [3 marks]
#

Define and explain permissioned blockchain in detail.

Answer:

Definition: A blockchain where participation requires explicit permission from a governing authority.

Table: Permissioned Blockchain Features

FeatureDescription
Restricted AccessOnly authorized users can participate
Private NetworkControlled membership
Centralized ControlGoverning body manages permissions

Key Characteristics:

  • Privacy: Enhanced confidentiality for sensitive data
  • Performance: Faster transactions due to fewer validators
  • Examples: Hyperledger Fabric, R3 Corda

Mnemonic: “Restricted-Private-Centralized” (RPC)

Question 2(b) OR [4 marks]
#

Explain types of wallets in the context of blockchain. Also discuss the factors to be considered while selecting wallet for the specific need.

Answer:

Table: Types of Blockchain Wallets

Wallet TypeDescriptionSecurity Level
Hot WalletsConnected to internetMedium
Cold WalletsOffline storageHigh
Hardware WalletsPhysical devicesVery High
Paper WalletsPrinted keysHigh (if stored safely)

Selection Factors:

  • Security Requirements: Higher value needs better security
  • Frequency of Use: Regular use favors hot wallets
  • Technical Expertise: Simple wallets for beginners

Mnemonic: “H-C-H-P” (Hot, Cold, Hardware, Paper)

Question 2(c) OR [7 marks]
#

Explain sidechain in detail with suitable diagrams.

Answer:

Definition: A separate blockchain that is attached to a parent blockchain using a two-way peg.

Diagram: Sidechain Architecture

graph LR
    A[Main Chain] <--> B[Two-Way Peg]
    B <--> C[Sidechain]
    A --> D[Bitcoin/Ethereum]
    C --> E[Specialized Functions]
    E --> F[Smart Contracts]
    E --> G[Privacy Features]
    E --> H[Faster Transactions]

Table: Sidechain Benefits

BenefitDescription
ScalabilityReduces load on main chain
ExperimentationTest new features safely
Specialized FunctionsCustom applications
InteroperabilityConnect different blockchains

Key Mechanisms:

  • Two-Way Peg: Allows asset transfer between chains
  • SPV Proofs: Simplified payment verification
  • Federated Control: Multiple parties manage transfers

Mnemonic: “S-E-S-I” (Scalability, Experimentation, Specialized, Interoperability)

Question 3(a) [3 marks]
#

With respect to transaction in a blockchain network, define the terms “Confirmation” and “Finality”.

Answer:

Table: Transaction States

TermDefinition
ConfirmationNumber of blocks built on top of transaction block
FinalityPoint where transaction becomes irreversible

Key Points:

  • Confirmation Count: More confirmations = higher security
  • Bitcoin Standard: 6 confirmations for high-value transactions
  • Finality Types: Probabilistic (Bitcoin) vs Absolute (some PoS systems)

Mnemonic: “Count-Blocks-Security” for Confirmation, “Irreversible-Point” for Finality

Question 3(b) [4 marks]
#

Differentiate Proof of Work and Proof of Stake.

Answer:

Table: PoW vs PoS Comparison

AspectProof of Work (PoW)Proof of Stake (PoS)
ResourceComputational powerStake ownership
Energy UseHighLow
SecurityHash rate dependentStake dependent
RewardsMining rewardsStaking rewards
ExamplesBitcoin, Ethereum (old)Ethereum 2.0, Cardano

Key Differences:

  • Mechanism: PoW uses mining, PoS uses validators
  • Environmental Impact: PoS is more eco-friendly
  • Barriers to Entry: PoS requires initial stake, PoW needs hardware

Mnemonic: “Work-vs-Stake” (Computational Work vs Financial Stake)

Question 3(c) [7 marks]
#

With respect to blockchain network, explain 51% attack.

Answer:

Definition: An attack where a single entity controls more than 50% of the network’s mining power or stake.

Diagram: 51% Attack Scenario

graph TD
    A[Network Hash Rate] --> B[Honest Miners 49%]
    A --> C[Attacker 51%]
    C --> D[Can Create Longer Chain]
    D --> E[Double Spending]
    D --> F[Transaction Reversal]
    D --> G[Block Withholding]

Table: Attack Capabilities and Limitations

Can DoCannot Do
Double spend own coinsSteal others’ coins
Reverse recent transactionsCreate coins from nothing
Block specific transactionsChange consensus rules
Fork the blockchainAccess private keys

Prevention Measures:

  • Diversified Mining: Encourage multiple mining pools
  • Checkpoint Systems: Periodic finality markers
  • Economic Incentives: Make attacks unprofitable

Impact:

  • Network Disruption: Temporary service interruption
  • Economic Loss: Reduced trust and value
  • Recovery: Network usually recovers after attack ends

Mnemonic: “Majority-Control-Attack” (51% = Majority Control = Attack Power)

Question 3(a) OR [3 marks]
#

Define the terms “Hard fork” and “Soft fork”

Answer:

Table: Fork Types

Fork TypeDefinitionCompatibility
Hard ForkNon-backward compatible protocol changeNot compatible
Soft ForkBackward compatible protocol changeCompatible

Key Characteristics:

  • Hard Fork: Creates new blockchain branch, requires all nodes to upgrade
  • Soft Fork: Tightens rules, old nodes can still operate

Examples:

  • Hard Fork: Bitcoin Cash split from Bitcoin
  • Soft Fork: SegWit activation in Bitcoin

Mnemonic: “Hard-Breaks-Compatibility” vs “Soft-Keeps-Compatibility”

Question 3(b) OR [4 marks]
#

List various types of consensus mechanisms and explain any one in detail.

Answer:

Table: Consensus Mechanisms

MechanismDescriptionEnergy Use
Proof of WorkComputational puzzle solvingHigh
Proof of StakeStake-based validationLow
Delegated PoSVoted representatives validateVery Low
Proof of AuthorityPre-approved validatorsMinimal

Detailed Explanation - Proof of Stake (PoS):

Process:

  • Validator Selection: Based on stake amount and randomization
  • Block Creation: Selected validator proposes new block
  • Validation: Other validators verify and attest to block
  • Rewards: Validators earn fees and new tokens

Advantages: Lower energy consumption, reduced centralization risk Disadvantages: “Nothing at stake” problem, initial distribution issues

Mnemonic: “Stake-Select-Validate-Reward” (PoS Process)

Question 3(c) OR [7 marks]
#

With respect to blockchain network, explain sybil attack.

Answer:

Definition: An attack where a single adversary creates multiple fake identities to gain disproportionate influence in the network.

Diagram: Sybil Attack Structure

graph TD
    A[Attacker] --> B[Fake Identity 1]
    A --> C[Fake Identity 2]
    A --> D[Fake Identity 3]
    A --> E[Fake Identity N]
    B --> F[Network Influence]
    C --> F
    D --> F
    E --> F
    F --> G[Consensus Manipulation]

Table: Attack Methods and Defenses

Attack MethodDescriptionDefense
Identity FloodingCreate many fake nodesProof of Work/Stake
Routing ManipulationControl network pathsReputation systems
Consensus DisruptionInfluence votingResource requirements

Impact on Blockchain:

  • Network Partitioning: Isolate honest nodes
  • Double Spending: Facilitate fraudulent transactions
  • Consensus Failure: Prevent network agreement

Prevention Mechanisms:

  • Resource Requirements: PoW/PoS make attacks expensive
  • Identity Verification: KYC/AML procedures
  • Network Monitoring: Detect suspicious behavior patterns
  • Reputation Systems: Track node behavior over time

Real-world Examples:

  • P2P Networks: BitTorrent, Gnutella vulnerabilities
  • Social Networks: Fake account creation
  • Blockchain: Potential threat to permissionless networks

Mnemonic: “Single-Multiple-Influence” (Single Attacker, Multiple Identities, Network Influence)

Question 4(a) [3 marks]
#

Define the terms “Merkle Tree” and “Hyperledger”.

Answer:

Table: Key Definitions

TermDefinition
Merkle TreeBinary tree of hashes that efficiently summarizes all transactions
HyperledgerOpen-source blockchain platform hosted by Linux Foundation

Key Features:

  • Merkle Tree: Enables efficient verification without downloading full blockchain
  • Hyperledger: Enterprise-focused, modular architecture, multiple frameworks

Mnemonic: “Tree-Hash-Efficient” for Merkle, “Enterprise-Modular-Linux” for Hyperledger

Question 4(b) [4 marks]
#

Explain classic Byzantine generals problem in detail.

Answer:

Scenario: Multiple generals must coordinate attack on a city, but some may be traitors.

Table: Problem Components

ComponentDescription
GeneralsNetwork nodes/participants
MessagesTransactions/communications
TraitorsMalicious/faulty nodes
ConsensusAgreement on action

Solution Requirements:

  • Agreement: All honest generals decide on same action
  • Validity: If all honest generals want to attack, they should attack
  • Termination: Decision must be reached in finite time

Blockchain Relevance: Ensures network agreement despite malicious nodes

Mnemonic: “Generals-Messages-Traitors-Consensus” (GMTC)

Question 4(c) [7 marks]
#

Explain the process of Merkle tree creation with suitable example and supporting diagrams.

Answer:

Process Steps:

  1. Hash each transaction individually
  2. Pair hashes and hash the pairs
  3. Continue until single root hash remains

Example: 4 Transactions

HaTsxh(AAH)ash(AHRBaTo)sxoht(BBH)asHhaTsxhH(CaCs)h(CHDaT)sxh(DD)

Table: Merkle Tree Benefits

BenefitDescription
EfficiencyVerify transactions without full data
SecurityAny change affects root hash
ScalabilityLog(n) verification complexity

Verification Process:

  • To verify Tx A: Need Hash(B), Hash(CD), and Root Hash
  • Path verification: Hash(A) + Hash(B) = Hash(AB)
  • Hash(AB) + Hash(CD) = Root Hash

Applications:

  • Bitcoin: Block headers contain Merkle root
  • SPV Clients: Light wallets use Merkle proofs
  • Git: Version control system uses similar structure

Mnemonic: “Hash-Pair-Repeat-Root” (Merkle Tree Creation Process)

Question 4(a) OR [3 marks]
#

List various types of Hyperledger projects.

Answer:

Table: Hyperledger Projects

ProjectTypePurpose
FabricFrameworkPermissioned blockchain platform
SawtoothFrameworkModular blockchain suite
IrohaFrameworkSimple blockchain for mobile/web
BurrowFrameworkEthereum Virtual Machine
CaliperToolBlockchain performance benchmark
ComposerToolBusiness network development

Categories:

  • Frameworks: Core blockchain platforms
  • Tools: Development and testing utilities

Mnemonic: “F-S-I-B-C-C” (Fabric, Sawtooth, Iroha, Burrow, Caliper, Composer)

Question 4(b) OR [4 marks]
#

Explain Practical Byzantine Fault Tolerance algorithm in detail.

Answer:

Definition: Consensus algorithm that works correctly even when up to 1/3 of nodes are faulty or malicious.

Table: PBFT Phases

PhaseDescriptionPurpose
Pre-preparePrimary broadcasts requestInitiate consensus
PrepareNodes validate and broadcastVerify proposal
CommitNodes commit to decisionFinalize agreement

Algorithm Steps:

  1. Client sends request to primary replica
  2. Primary broadcasts pre-prepare message
  3. Backups send prepare messages if valid
  4. After receiving 2f+1 prepares, send commit
  5. Execute after receiving 2f+1 commits

Key Properties:

  • Safety: Never produces inconsistent results
  • Liveness: Eventually produces results
  • Fault Tolerance: Works with f < n/3 faulty nodes

Mnemonic: “Pre-Prepare-Commit” (3 Phases of PBFT)

Question 4(c) OR [7 marks]
#

“Eventual consistency is evident in the context of bitcoin.” Justify the given statement.

Answer:

Definition: Eventual consistency means the system will become consistent over time, even if it’s temporarily inconsistent.

Bitcoin Implementation:

Table: Bitcoin Consistency Mechanisms

MechanismDescriptionPurpose
Chain ReorganizationReplace shorter chain with longerMaintain consensus
Confirmation DelaysWait for multiple blocksIncrease certainty
Fork ResolutionLongest chain winsResolve conflicts

Scenarios Demonstrating Eventual Consistency:

  1. Temporary Forks: When two miners find blocks simultaneously
  2. Network Partitions: Isolated nodes may have different views
  3. Double Spending Attempts: Conflicting transactions in different blocks

Resolution Process:

  • Mining Continues: Miners build on their preferred chain
  • Longest Chain Rule: Network adopts chain with most work
  • Automatic Convergence: All nodes eventually agree

Diagram: Fork Resolution

graph TD
    A[Block N] --> B[Block N+1a]
    A --> C[Block N+1b]
    B --> D[Block N+2a]
    C --> E[Dies - Shorter Chain]
    D --> F[Becomes Main Chain]

Justification Points:

  • Probabilistic Finality: Longer confirmation time = higher certainty
  • No Immediate Consistency: New transactions aren’t instantly final
  • Convergence Guarantee: Network will eventually agree on single chain
  • Time-based Resolution: Consistency improves with time

Practical Implications:

  • Merchant Waiting: Wait for confirmations before accepting payment
  • Exchange Policies: Different confirmation requirements for different amounts
  • Risk Management: Balance speed vs security based on transaction value

Mnemonic: “Time-Brings-Consistency” (Eventual Consistency = Time + Convergence)

Question 5(a) [3 marks]
#

Explain advantages of ERC 20.

Answer:

Table: ERC-20 Token Advantages

AdvantageDescription
StandardizationCommon interface for all tokens
InteroperabilityWorks with all Ethereum wallets/exchanges
LiquidityEasy trading and exchange

Key Benefits:

  • Developer Friendly: Simple implementation standard
  • Market Adoption: Widely supported across platforms
  • Smart Contract Integration: Easy DeFi integration

Mnemonic: “Standard-Interoperable-Liquid” (SIL)

Question 5(b) [4 marks]
#

Describe working mechanism of a smart-contract in detail.

Answer:

Table: Smart Contract Workflow

StepDescription
Code DeploymentContract uploaded to blockchain
Trigger ConditionsPredefined conditions monitored
Automatic ExecutionContract executes when conditions met
State UpdateBlockchain state modified

Working Process:

  1. Development: Write contract in Solidity/Vyper
  2. Compilation: Convert to bytecode
  3. Deployment: Upload to blockchain network
  4. Execution: Triggered by transactions or events

Mnemonic: “Deploy-Trigger-Execute-Update” (DTEU)

Question 5(c) [7 marks]
#

What is smart-contract? Explain features and applications of smart-contract in detail.

Answer:

Definition: Self-executing contracts with terms directly written into code, running on blockchain.

Table: Smart Contract Features

FeatureDescriptionBenefit
AutonomousExecutes without intermediariesCost reduction
TransparentCode visible on blockchainTrust building
ImmutableCannot be changed once deployedSecurity
DeterministicSame input produces same outputPredictability

Diagram: Smart Contract Architecture

graph TD
    A[Smart Contract] --> B[Trigger Conditions]
    B --> C[Automatic Execution]
    C --> D[State Changes]
    D --> E[Event Emissions]
    A --> F[External Calls]
    F --> G[Other Contracts]

Applications:

Table: Smart Contract Applications

DomainUse CaseExample
FinanceAutomated lendingDeFi protocols
InsuranceClaim processingFlight delay insurance
Supply ChainProduct trackingFood provenance
Real EstateProperty transfersAutomated escrow
GamingDigital assetsNFT marketplaces

Advantages:

  • Efficiency: Reduced processing time and costs
  • Trust: No need for trusted third parties
  • Accuracy: Eliminates human errors
  • Global Access: Available 24/7 worldwide

Limitations:

  • Immutability: Difficult to fix bugs after deployment
  • Oracle Problem: Need external data sources
  • Gas Costs: Execution costs can be high
  • Complexity: Requires technical expertise

Development Considerations:

  • Security Audits: Essential before deployment
  • Testing: Extensive testing on testnets
  • Upgradability: Design patterns for updates
  • Gas Optimization: Minimize execution costs

Mnemonic: “Auto-Transparent-Immutable-Deterministic” (ATID) for features

Question 5(a) OR [3 marks]
#

Explain disadvantages of ERC20.

Answer:

Table: ERC-20 Token Disadvantages

DisadvantageDescription
Limited FunctionalityOnly basic token operations
No Built-in SecurityVulnerable to common attacks
Gas DependencyRequires ETH for transactions

Key Issues:

  • Transfer Limitations: Cannot handle complex transfers
  • Approval Risks: Double spending vulnerabilities
  • Network Congestion: High fees during peak times

Mnemonic: “Limited-Vulnerable-Dependent” (LVD)

Question 5(b) OR [4 marks]
#

Describe steps for Launching of a Decentralized Autonomous Organization (DAO)?

Answer:

Table: DAO Launch Steps

StepDescription
Concept DesignDefine purpose and governance rules
Smart Contract DevelopmentCode governance mechanisms
Token DistributionAllocate voting rights
Community BuildingAttract members and contributors

Detailed Process:

  1. Whitepaper Creation: Document vision and tokenomics
  2. Technical Implementation: Deploy governance contracts
  3. Initial Funding: Raise capital through token sales
  4. Operations Launch: Begin decentralized operations

Mnemonic: “Design-Develop-Distribute-Deploy” (4D Launch)

Question 5(c) OR [7 marks]
#

What is Decentralized Autonomous Organization (DAO)? Explain its advantages and disadvantages in detail.

Answer:

Definition: A blockchain-based organization governed by smart contracts and token holders rather than traditional management.

Table: DAO Structure

ComponentDescriptionFunction
Smart ContractsGovernance rules in codeAutomated decision execution
TokensVoting rights and ownershipDemocratic participation
ProposalsSuggested changes or actionsCommunity-driven initiatives
TreasuryShared fundsResource allocation

Diagram: DAO Governance Flow

graph TD
    A[Token Holders] --> B[Submit Proposals]
    B --> C[Community Discussion]
    C --> D[Voting Period]
    D --> E[Execution if Passed]
    E --> F[Smart Contract Updates]
    F --> G[Treasury Actions]

Advantages:

Table: DAO Benefits

AdvantageDescriptionImpact
DecentralizationNo single point of controlReduced corruption risk
TransparencyAll decisions on blockchainEnhanced accountability
Global ParticipationAnyone can joinDiverse perspectives
EfficiencyAutomated executionFaster decision implementation
Democratic GovernanceToken-based votingFair representation

Disadvantages:

Table: DAO Challenges

DisadvantageDescriptionRisk
Technical ComplexitySmart contract bugsSystem failures
Legal UncertaintyUnclear regulatory statusCompliance issues
Coordination ProblemsDifficult decision makingSlow progress
Token ConcentrationWealthy holders control votesCentralization risk
Security VulnerabilitiesCode exploits possibleFinancial losses

Types of DAOs:

  • Investment DAOs: Collective investment decisions
  • Protocol DAOs: Blockchain protocol governance
  • Social DAOs: Community-driven organizations
  • Collector DAOs: NFT and art collecting

Success Factors:

  • Clear Purpose: Well-defined mission and goals
  • Robust Governance: Effective voting mechanisms
  • Community Engagement: Active member participation
  • Technical Security: Audited smart contracts
  • Legal Compliance: Regulatory compliance where applicable

Notable Examples:

  • MakerDAO: Decentralized finance protocol
  • Uniswap: Decentralized exchange governance
  • Compound: Money market protocol

Future Outlook:

  • Regulatory Clarity: Evolving legal frameworks
  • Technical Improvements: Better governance tools
  • Mainstream Adoption: Growing corporate interest
  • Integration: Hybrid traditional-DAO models

Mnemonic: “Decentralized-Autonomous-Organization” (DAO = Democratic Automated Ownership)

Related

Mobile Computing and Networks (4351602) - Summer 2024 Solution
Study-Material Solutions Mobile-Computing 4351602 2024 Summer
Renewable Energy & Emerging Trends in Electronics (4361106) - Summer 2024 Solution
Study-Material Solutions Renewable-Energy 4361106 2024 Summer
Cloud and Data Center Technologies (4361602) - Summer 2024 Solution
Study-Material Solutions Cloud-Computing 4361602 2024 Summer
Foundation of AI and ML (4351601) - Summer 2024 Solution
Study-Material Solutions Ai-Ml 4351601 2024 Summer
VLSI (4361102) - Summer 2024 Solution
Study-Material Solutions Vlsi 4361102 2024 Summer
Computer Networks & Data Communication (4361101) - Summer 2024 Solution
Study-Material Solutions Computer-Networks 4361101 2024 Summer