University : University of Canberra UniLearnO is not sponsored or endorsed by this college or university.
Country : Australia

Assignment Task


1. Bitcoin transactions are maintained using a blockchain. Explain how Bitcoin utilizes cryptographic digital signatures and SHA to maintain and link records in a blockchain. Your answer must include descriptive text and one demonstrating figure. Your figure must illustrate how SHA, digital signatures, and blockchains are utilized in Bitcoin.

2. Bitcoin does not require any central controlling or trusted agency. Describe how Bitcoin ensures that no one can alter a Bitcoin transaction in a blockchain, e.g., currency transfer.

3. Discuss why Bitcoin mining is critical to secure the Bitcoin currency and to validate all Bitcoin transactions. How might it be possible for one entity to dominate Bitcoin and its mining?

4. Describe how Tor utilizes AES, RSA, SHA, and TLS to anonymously transmit data through a sequence of network nodes (also called onion routers). Your answer must include descriptive text and one Your figure must illustrate how Tor's onion routing utilises AES, RSA, SHA, and TLS.

5. File transfer protocol (FTP) is the most widely used protocol for transferring data between a server and a client over transmission control protocol (TCP). A TCP connection is established between a user client and a server program. The server side of an FTP connection listens on TCP port 21 for incoming FTP requests. The user client of an FTP connection is initialized on a TCP port number above 1080.

Suppose you manage a server that has an IP address of and runs both FTP and web services. Suppose you wish to build a packet-filtering firewall with a rule set to accept or deny inbound and outbound traffic

6. Use “Zenmap”, the GUI application for “Nmap”, to scan the target host “”.

a) What is the operating system of the target host?

b) What is the IP address of the target host?

c) What ports and services are open on the target host? Provide a screenshot to support your answer.


This IT Computer Science Assignment Help has been solved by our IT Computer Science Experts at Unilearno. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Eureka! You've stumped our genius minds (for now)! This exciting new question has our experts buzzing with curiosity. We can't wait to craft a fresh solution just for you!

  • Uploaded By : Andrew
  • Posted on : January 03rd, 2024

Whatsapp Tap to ChatGet instant assistance