4.
1 – Mining Ether
Q1 – How proof of Work Helps Regulate Block Time
1. Miners solve puzzles to add new blocks to the blockchain.
2. These puzzles are computationally hard and take time to solve.
3. The network has a target block time (e.g., 10 minutes for Bitcoin).
4. If blocks are mined too fast, the network increases the difficulty.
5. If blocks are mined too slow, it reduces the difficulty.
6. This keeps block creation steady and predictable.
7. It helps control the rate of new coin creation.
8. It ensures fairness among miners.
9. It keeps the network synchronized.
10. It adds security by making attacks expensive and time-consuming.
Q2 – Explain DAG and Nonce
1. DAG (Directed Acyclic Graph) is a large dataset used in Ethereum mining.
2. It is regenerated every few days and helps make mining memory-intensive.
3. DAG ensures that mining is GPU-friendly and resists ASIC domination.
4. Nonce is a random number miners change to find a valid block hash.
5. Miners try different nonces until the hash meets the difficulty target.
6. The correct nonce proves the miner did the required work.
7. DAG + nonce + block data = input for the hash function.
8. Changing the nonce changes the hash result.
9. Finding the right nonce is like guessing a winning lottery number.
10. Both DAG and nonce are essential for Proof of Work mining.
Q3 – Differentiate between Faster Blocks and Stale Blocks
Faster Blocks Stale Blocks
Blocks mined quickly Blocks not accepted in the main chain
Improve transaction speed Result from network delays or forks
Used in Ethereum (short block Wasted effort for miners
time)
Can increase stale rate Do not earn full rewards
Need fast network sync Are part of temporary forks
Help with scalability Reduce mining efficiency
Require better propagation May still get partial rewards (uncles in
Ethereum)
Lower confirmation time Not part of final blockchain
Can lead to more forks Increase block competition
Must be managed carefully Affect network performance
Q4 – How Ethereum and Bitcoin Use Trees
1. Both use Merkle Trees to organize and verify transactions.
2. A Merkle Tree is a tree of hashes built from transaction data.
3. It allows quick verification of whether a transaction is in a block.
4. Bitcoin uses it to summarize all transactions in a block.
5. Ethereum uses Patricia Merkle Trees for more complex data.
6. Ethereum stores account balances, contract storage, and receipts in trees.
7. Trees help reduce the amount of data needed for verification.
8. They allow light clients to verify data without full blockchain.
9. They improve efficiency and security.
10. Trees are essential for scalability and trust in blockchains.
Q5 – Explain Forking and Mining
1. Mining is the process of adding new blocks by solving puzzles.
2. Miners compete to find a valid block hash.
3. The winner gets to add the block and earn rewards.
4. Forking happens when two miners find a block at the same time.
5. This creates two versions of the blockchain temporarily.
6. The network eventually chooses the longest chain as valid.
7. The other chain becomes a stale or orphaned fork.
8. Hard forks are permanent splits due to rule changes.
9. Soft forks are backward-compatible updates.
10. Forking is part of how blockchains evolve and stay secure.
Q6 – Enlist Steps on executing commands in the EVM via the Get Console
1. Install and run Geth (Go Ethereum client).
2. Start a private or test Ethereum network.
3. Open the Geth console using the terminal.
4. Create or unlock an Ethereum account.
5. Use web3.eth.accounts to view accounts.
6. Deploy a smart contract using Solidity and compile it.
7. Use eth.sendTransaction() to send ETH or call contracts.
8. Use eth.getBalance() to check account balances.
9. Use eth.blockNumber to check the latest block.
10. Monitor logs and events using eth.getTransactionReceipt().
Q7 – Demonstrate Mining on the Testnet
1. Install Geth and connect to a testnet like Sepolia or Goerli.
2. Create a new Ethereum account.
3. Get test ETH from a faucet.
4. Start mining with geth --mine --miner.threads=1.
5. Use eth.mining to check if mining is active.
6. Use eth.getBalance(account) to see rewards.
7. Watch new blocks with eth.blockNumber.
8. Deploy and test smart contracts using test ETH.
9. Stop mining with miner.stop().
10. Use mined ETH for development and testing.
Q8 – Explain the concept of GPU Mining Rigs and Mining on Pool with Multiple GPU’s
1. A GPU mining rig is a computer with multiple graphics cards.
2. GPUs are good at solving mining puzzles quickly.
3. More GPUs = more hash power = better mining chances.
4. Solo mining is hard and unpredictable.
5. Mining pools let miners work together and share rewards.
6. Each miner contributes hash power to the pool.
7. Rewards are split based on contribution.
8. Software like PhoenixMiner or NiceHash is used.
9. Rigs need good cooling and power supply.
10. Pool mining with multiple GPUs is efficient and profitable.
4.2 Crytoeconomics
Q1 – Describe Crytoeconomics and enlist the application of based on it
1. Cryptoeconomics is the combination of cryptography and economics to design
secure, decentralized systems like blockchains
2. It uses economic incentives (like rewards and penalties) to encourage good
behavior and discourage bad actions in a network.
3. Uses cryptographic tools (like hashing, digital signatures).
4. Applies economic principles (like game theory and incentives).
5. Ensures network security and trust without central authority.
6. Encourages honest participation through rewards.
7. Discourages attacks through penalties or costs.
Applications of Cryptoeconomics:
1. Bitcoin & Ethereum – Use PoW and PoS to secure the network.
2. DeFi Platforms – Use tokens and staking to manage lending, borrowing, and
trading.
3. DAOs (Decentralized Autonomous Organizations) – Use voting and token
incentives for governance.
4. NFT Marketplaces – Use smart contracts and royalties to reward creators.
5. Stablecoins – Use collateral and algorithms to maintain price stability.
6. Token Economies – Reward users for contributing to a network (e.g., Helium,
Filecoin).
7. Layer 2 Solutions – Use incentives to reduce congestion and fees.
8. Prediction Markets – Use tokens to bet on outcomes (e.g., Augur).
9. Gaming (GameFi) – Reward players with crypto for in-game achievements.
10. Reputation Systems – Use tokens to build trust in decentralized platforms.
Q2 – How speed of Blocks play an important role in mining
1. Block speed is the time it takes to add a new block to the blockchain.
2. Faster blocks mean quicker transaction confirmations.
3. But too fast can lead to more forks and stale blocks.
4. Slower blocks reduce forks but delay transactions.
5. Ethereum has faster blocks (~12 seconds), Bitcoin is slower (~10 minutes).
6. Faster blocks require better network synchronization.
7. They increase the chance of two miners finding a block at the same time.
8. This can lead to wasted mining effort (stale blocks).
9. Block speed affects mining rewards and efficiency.
10. A balanced block speed is key for network performance and security.
Q3 – Explain common attacking scenarios in working of crytoeconomics
1. 51% Attack
• If one miner controls over 50% of the network, they can rewrite history.
• PoW makes this very expensive, discouraging such attacks.
2. Sybil Attack
• An attacker creates many fake identities to gain control.
• Staking or identity verification helps prevent this.
3. Double Spending
• Spending the same coin twice.
• Consensus rules and block confirmations prevent this.
4. Front-Running
• Seeing a transaction and placing a similar one before it.
• MEV protection and fair ordering help reduce this.
5. Smart Contract Exploits
• Bugs in code can be used to steal funds.
• Audits and formal verification help prevent this.
6. Pump and Dump Schemes
• Artificially inflating token prices and selling off.
• Tokenomics and regulations can reduce this.
7. Flash Loan Attacks
• Using instant loans to manipulate markets.
• Better oracle design and limits can help.
8. Governance Attacks
• Buying voting power to control DAOs.
• Quadratic voting and time locks can prevent this.
9. Bribery Attacks
• Paying miners to include or exclude transactions.
• Incentive alignment helps reduce this risk.
10. Nothing-at-Stake (PoS)
• Validators vote on multiple chains.
• Slashing penalties discourage this behavior.