INITIAL COIN OFFERING (ICO) - PROOF OF WORK - MINING ALGORITHM - DISTRIBUTED DENIAL OF SERVICE (DDOS) - ASYMMETRIC KEY ALGORITHM - SPV - COLD STORAGE - ASIC - QR CODE - LIGHTNING NETWORK -

in #cryptocurrency8 years ago


INITIAL COIN OFFERING (ICO) this allows mobile clients to make payments without needing a copy of the entire blockchain. acronym for “simplified payment verification”.
PROOF OF WORK qr codes are similar to barcodes found on physical products in that they are a machine-friendly way to embody a piece of data. a digital representation of a bitcoin public or private key that is easy to scan by digital cameras.
MINING ALGORITHM this protocol tries to solve the bitcoin scalability problem. the lightning network will allow bitcoin transactions to happen instantly, without worrying about block confirmation times. it's a decentralized network using smart contract functionality on the blockchain to enable instant payments across a network of participants.
DISTRIBUTED DENIAL OF SERVICE (DDOS) often compared to gpus, asics are specially made for mining and may offer significant power savings. short form for ‘application specific integrated circuit’.
ASYMMETRIC KEY ALGORITHM these wallets are known as “cold wallets”. this could be in the form of a hardware wallet, usb stick or a paper wallet. the safest way to store your private keys is by keeping them offline in “cold storage”.
SPV bitcoin’s mining algorithm is sha256, whilst litecoin & dogecoin’s are scrypt. the algorithm used by a cryptocurrency to sign transactions, these vary across different cryptocurrencies.
COLD STORAGE the more ‘work’ you do or the more computational power you provide, the more coins you are rewarded with. a consensus distribution algorithm that requires an active role in mining data blocks, often consuming resources, such as electricity.
ASIC public and private keys are needed to support cryptocurrency transactions. both sender and receiver have this key, and can send secure information. the algorithm used to generate public and private keys.
QR CODE happens when someone offers (in exchange against cryptocurrencies like bitcoin or ethereum) investors some units of a new cryptocurrency or crypto-token.
LIGHTNING NETWORK often this comes with a severe attack on the network, creating an army of ‘zombie’ computers who simultaneously flood a targeted website or network with requests. can cause a sustained downtime on said network or even make them crash completely. a very dangerous threat for cryptocurrency users.
Source + Source


INITIAL COIN OFFERING (ICO) happens when someone offers (in exchange against cryptocurrencies like bitcoin or ethereum) investors some units of a new cryptocurrency or crypto-token.
PROOF OF WORK the more ‘work’ you do or the more computational power you provide, the more coins you are rewarded with. a consensus distribution algorithm that requires an active role in mining data blocks, often consuming resources, such as electricity.
MINING ALGORITHM bitcoin’s mining algorithm is sha256, whilst litecoin & dogecoin’s are scrypt. the algorithm used by a cryptocurrency to sign transactions, these vary across different cryptocurrencies.
DISTRIBUTED DENIAL OF SERVICE (DDOS) often this comes with a severe attack on the network, creating an army of ‘zombie’ computers who simultaneously flood a targeted website or network with requests. can cause a sustained downtime on said network or even make them crash completely. a very dangerous threat for cryptocurrency users.
ASYMMETRIC KEY ALGORITHM public and private keys are needed to support cryptocurrency transactions. both sender and receiver have this key, and can send secure information. the algorithm used to generate public and private keys.
SPV this allows mobile clients to make payments without needing a copy of the entire blockchain. acronym for “simplified payment verification”.
COLD STORAGE these wallets are known as “cold wallets”. this could be in the form of a hardware wallet, usb stick or a paper wallet. the safest way to store your private keys is by keeping them offline in “cold storage”.
ASIC often compared to gpus, asics are specially made for mining and may offer significant power savings. short form for ‘application specific integrated circuit’.
QR CODE qr codes are similar to barcodes found on physical products in that they are a machine-friendly way to embody a piece of data. a digital representation of a bitcoin public or private key that is easy to scan by digital cameras.
LIGHTNING NETWORK this protocol tries to solve the bitcoin scalability problem. the lightning network will allow bitcoin transactions to happen instantly, without worrying about block confirmation times. it's a decentralized network using smart contract functionality on the blockchain to enable instant payments across a network of participants.
Source + Source

Latest posts from our Team !



Note for @steemcleaners / @cheetah:

The agreement of our Team:
The following authors decided to create a Team in order to collaborate and share formats and content in our posts. Any copy of content between this Team does not constitute a plagiarism.

@megan.brown @rstracer @matthew.davis @ali.wood @rssniper @rspower @realskilled

Get Free Gift Cards & Cash for the everyday things you do online.

Make money online

Coin Marketplace

STEEM 0.13
TRX 0.35
JST 0.034
BTC 114923.27
ETH 4525.38
SBD 0.86