SlideShare uma empresa Scribd logo
1 de 26
Baixar para ler offline
A DECENTRALIZED DIGITAL CURRENCY 
CAROLINE DAVID 
Reg no :12120097 
S7 Computer Science B 
SEMINAR GUIDE: 
Dr. Sheena Mathew
AGENDA… 
 INTRODUCTION 
 EVOLUTION 
 TERMS USED IN BITCOIN 
 MINING 
 AQUIRING BITCOIN 
 HOW TO STORE BITCOINS 
 TYPES OF WALLET 
 HOW BITCOIN ACTUALLY WORKS 
 TRANSACTION
AGENDA 
 WHO CONTROL THE NETWORK 
 MERITS AND DEMERITS 
 APPLICATIONS 
 CONCLUSION 
 REFERENCES
INTRODUCTION… 
 Virtual money that exist in cyber space. 
 It uses peer to peer technology. 
 Bitcoin is an open source. 
 Bitcoins are used for electronic purchases and transfers. 
 Not supported by any bank or government.
EVOLUTION 
 Bitcoin is the first implementation of a concept called 
"crypto-currency“. 
 First Bitcoin specification was published in 2009 in a 
cryptography mailing list by Satoshi Nakamoto. 
 1 BTC = 333.71$ is the current value. 
i.e Rs. 21,481.63
TERMS USED IN BITCOIN… 
 Installing a bitcoin wallet on mobile phone or PC. 
Generating a bitcoin address. 
The Bitcoin network is sharing a public ledger called the 
"block chain". 
 Authenticity of each transaction is protected by “digital 
signatures”. 
 Transaction is processed using “Mining” also.
Mining 
 New bitcoins are generated by a competitive and decentralized process called 
"mining”. 
 Mining is the process of adding transaction records to Bitcoin's public ledger 
of past transactions. 
 Mining is intentionally designed to be resource-intensive. 
 The primary purpose of mining is to allow Bitcoin nodes to reach a secure, 
tamper-resistant consensus. 
 Mining is also the mechanism used to introduce Bitcoins into the system. 
 Miners are paid any transaction fees as well as a "subsidy" of newly created 
coins.
HOW CAN ONE ACQUIRE BITCOIN? 
 As payment for goods or services. 
 Purchase bitcoins at a Bitcoin exchange. 
 Exchange bitcoins with someone near you. 
 Earn bitcoins through competitive mining.
HOW TO STORE BITCOIN ? 
 Bitcoins are stored in what are called wallets 
 Wallet is a randomly generated string of numbers and consists of two 
parts : Public key and private key 
 Public key – For transferring money to your account 
eg : 14GabW85FUMQy62CMWLCToQLo81w7iXL2x 
 Private key – Only for the wallet Owner. If anyone gets ahold your 
private key, they will have access to all your bitcoins 
(ALWAYS KEEP YOUR PRIVATE KEY PRIVATE!!!)
TYPES OF WALLET 
 Online wallet services 
* All that is required here is to create an account and 
remember the password 
* Most popular services are Blockchain.info and Coinbase 
 Local or Offline wallets 
* It is an application that can be downloaded in your 
computer 
* Your private key will be stored locally on the hard drive 
 Paper wallets 
* Here the public key and the private key which are generated 
offline are printed in a physical piece of paper and then stored 
in a safe location
HOW BITCOIN WORKS? 
Create a Bitcoin account using open source software. 
Software outputs a private key and a public key. 
Private key must be kept secret. 
Private key - transferring money from account. 
If private key is lost the funds are irrevocably lost . 
Public key -transferring money to our account.
HOW BITCOIN WORKS?(CONT..) 
• To transfer funds to your account, other people 
will enter in their owns account's private key and 
your public key. 
• Block chain - a global, distributed cartographic 
ledger of transactions 
• i.e. transaction details are recorded in the block 
chain
TRANSACTION 
 Sending or receiving bitcoins are as simple as 
scanning a QR code with your smartphone. 
 Online services such as Blockchain.com and 
Coinbase help us for this. 
 Both have security features that require you to use a 
PIN for transaction. 
 Simply scan the receivers QR , enter the number of 
coins to send, and you are done. 
(QR code will be generated when we enter the public 
key)
TRANSACTION OF 
BITCOIN 
QR CODE
WHO CONTROLS THE NETWORK ? 
 Nobody owns the Bitcoin network. 
 Bitcoin is controlled by all Bitcoin users around the 
world. 
The price of bitcoin is determined by 
“Supply and Demand” 
When demand for bitcoin increases, the price increases, 
and when demand falls, the price falls.
HOW TO KEEP BITCOIN SECURE? 
 Use strong passwords. 
 Always encrypt your wallet. 
 Keep your private key secret. 
 Always run antivirus software.
ADVANTAGES OF BITCOIN 
 Payment freedom. 
 Very low fees. 
 Few risk for merchants. 
 Security and control. 
 Transparent and neutral.
DISADVANTAGES OF BITCOIN 
 Lack of awareness. 
 No Physical Form. 
 Bitcoins are not widely accepted. 
 Wallets can be lost. 
 No valuation guarantee.
APPLICATIONS OF BITCOIN 
 You can save them . 
 You can spend them just like cash . 
 You can day trade with them . 
 You can invest in various BTC based companies .
BITCOIN TECHNOLOGY AND ITS USES
WHERE THEY 
ARE ACCEPTED 
www.wordpress.com 
www.torrentfreak.com 
www.overstock.com 
www.highcart.com 
www.bitcoinshop.us 
www.51attack.com 
www.venturebeat.com 
www.eztv.it 
And many more…
TOP 5 COUNTRIES FOR BITCOIN 
DOWNLOADS 
US -- 12,07,661 
CHINA -- 5,05,904 
GERMANY -- 2,70,043 
UK -- 2,36,523 
RUSSIA -- 2,26,680 
Note :- India ranks 16th -- 35,648
APPS WHICH YOU CAN 
DOWNLOAD 
 MultiBit is an app you can download for 
Windows, Mac and Linux. 
 Bitcoin Wallet for Android runs on your 
smartphone or tablet.
CONCLUSION 
Bitcoin is a revolutionary currency system which can 
work in parallel or even replace the existing forms of 
currencies in the future. Bitcoin can be used as a reliable 
alternative for fast cashless payments by proposing 
solutions .The low transaction fees of the network and 
the instant availability of money to the merchant might 
render bitcoins interesting for vending machine 
operators.
REFERENCE 
 https://bitcoin.org/en/ 
 http://en.wikipedia.org/wiki/Bitcoin#History 
 http://whatis.techtarget.com/definition/Bitcoin-mining 
 https://products.butterflylabs.com/ 
 https://bitcoin.org/en/faq#what-are-the-advantages-of-bitcoin 
 https://bitcoin.org/en/faq#what-are-the-disadvantages-of-bitcoin 
http://en.wikipedia.org/wiki/Bitcoin#Economics 
 http://en.wikipedia.org/wiki/Bitcoin#Security
BITCOIN TECHNOLOGY AND ITS USES

Mais conteúdo relacionado

Mais procurados

How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain workShishir Aryal
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to BlockchainJordan Harris
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoinWolf McNally
 
Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Kashif Khans
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?Rambus Inc
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologySabrina Kirrane
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Merlec Mpyana
 
Blockchain PowerPoint Presentation Slides
Blockchain PowerPoint Presentation SlidesBlockchain PowerPoint Presentation Slides
Blockchain PowerPoint Presentation SlidesSlideTeam
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsJohannes Ahlmann
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyEno Bassey
 

Mais procurados (20)

BLOCKCHAIN
BLOCKCHAINBLOCKCHAIN
BLOCKCHAIN
 
Blockchain
BlockchainBlockchain
Blockchain
 
How does blockchain work
How does blockchain workHow does blockchain work
How does blockchain work
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
Blockchain Technology
Blockchain TechnologyBlockchain Technology
Blockchain Technology
 
Blockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptxBlockchain by Aman Thakur.pptx
Blockchain by Aman Thakur.pptx
 
Introduction to bitcoin
Introduction to bitcoinIntroduction to bitcoin
Introduction to bitcoin
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 
Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)Introduction to Cryptocurrency (Bitcoin)
Introduction to Cryptocurrency (Bitcoin)
 
Introduction to Blockchain
Introduction to BlockchainIntroduction to Blockchain
Introduction to Blockchain
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum) Ethereum-Cryptocurrency (All about Ethereum)
Ethereum-Cryptocurrency (All about Ethereum)
 
Cryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technologyCryptocurrencies and Blockchain technology
Cryptocurrencies and Blockchain technology
 
Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges Blockchain Security Issues and Challenges
Blockchain Security Issues and Challenges
 
Blockchain PowerPoint Presentation Slides
Blockchain PowerPoint Presentation SlidesBlockchain PowerPoint Presentation Slides
Blockchain PowerPoint Presentation Slides
 
Blockchain
BlockchainBlockchain
Blockchain
 
Overview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus MechanismsOverview of Blockchain Consensus Mechanisms
Overview of Blockchain Consensus Mechanisms
 
Presentation on bitcoin
Presentation on bitcoinPresentation on bitcoin
Presentation on bitcoin
 
Blockchain ppt
Blockchain pptBlockchain ppt
Blockchain ppt
 
Blockchain Technology And Cryptocurrency
Blockchain Technology And CryptocurrencyBlockchain Technology And Cryptocurrency
Blockchain Technology And Cryptocurrency
 

Destaque

General Introdution to Bitcoin
General Introdution to BitcoinGeneral Introdution to Bitcoin
General Introdution to BitcoinJérémie Fays
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On BitcoinTouroxy
 
Bitcoin: Today and Future
Bitcoin: Today and FutureBitcoin: Today and Future
Bitcoin: Today and FutureIvano Digital
 
Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Paramkusa K
 
What is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginnersWhat is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginnersJonathan Waller
 
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...Melanie Swan
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016CoinDesk
 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Moneywinklevosscap
 
From Monopoly to Bitcoin
From Monopoly to BitcoinFrom Monopoly to Bitcoin
From Monopoly to BitcoinAshley Taylor
 
Introduction of Bitcoin
Introduction of BitcoinIntroduction of Bitcoin
Introduction of Bitcoinbansarirajani
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to BitcoinRon Gross
 
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...Cristina Dolan
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Melanie Swan
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionFerdinando Maria Ametrano
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedMelanie Swan
 

Destaque (20)

General Introdution to Bitcoin
General Introdution to BitcoinGeneral Introdution to Bitcoin
General Introdution to Bitcoin
 
Seminar Report On Bitcoin
Seminar Report On BitcoinSeminar Report On Bitcoin
Seminar Report On Bitcoin
 
Bitcoin: Today and Future
Bitcoin: Today and FutureBitcoin: Today and Future
Bitcoin: Today and Future
 
Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency) Bitcoin (Global Digital Currency)
Bitcoin (Global Digital Currency)
 
What is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginnersWhat is Bitcoin? - A guide for beginners
What is Bitcoin? - A guide for beginners
 
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
Bitcoin and Blockchain Technology Explained: Not just Cryptocurrencies, Econo...
 
State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016State of Bitcoin and Blockchain 2016
State of Bitcoin and Blockchain 2016
 
Bitcoin: The Internet of Money
Bitcoin: The Internet of MoneyBitcoin: The Internet of Money
Bitcoin: The Internet of Money
 
From Monopoly to Bitcoin
From Monopoly to BitcoinFrom Monopoly to Bitcoin
From Monopoly to Bitcoin
 
Introduction of Bitcoin
Introduction of BitcoinIntroduction of Bitcoin
Introduction of Bitcoin
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Intro to Bitcoin
Intro to BitcoinIntro to Bitcoin
Intro to Bitcoin
 
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
BitCoin and the Global Economy by Cristina Dolan Presented at MIT Center for ...
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
Bitcoin and Blockchain Explained: Cryptocitizen Smartnetwork Trust
 
Phone gap
Phone gapPhone gap
Phone gap
 
Bitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An IntroductionBitcoin and Blockchain Technology: An Introduction
Bitcoin and Blockchain Technology: An Introduction
 
Cyber crime and forensic
Cyber crime and forensicCyber crime and forensic
Cyber crime and forensic
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain ExplainedBlockchain Smartnetworks: Bitcoin and Blockchain Explained
Blockchain Smartnetworks: Bitcoin and Blockchain Explained
 

Semelhante a BITCOIN TECHNOLOGY AND ITS USES

Semelhante a BITCOIN TECHNOLOGY AND ITS USES (20)

Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin presentation
Bitcoin presentationBitcoin presentation
Bitcoin presentation
 
Bitcoin Presentation.pptx
Bitcoin Presentation.pptxBitcoin Presentation.pptx
Bitcoin Presentation.pptx
 
BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)BITCOIN TECHNOLOGY(AAappZZ)
BITCOIN TECHNOLOGY(AAappZZ)
 
Bitcoin-an innovative payment network
Bitcoin-an innovative payment networkBitcoin-an innovative payment network
Bitcoin-an innovative payment network
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 
Bitcoin:Global Digital Currency
Bitcoin:Global Digital CurrencyBitcoin:Global Digital Currency
Bitcoin:Global Digital Currency
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin digital cash basics svcc 2017 10 001 publish
Bitcoin digital cash basics svcc 2017 10 001 publishBitcoin digital cash basics svcc 2017 10 001 publish
Bitcoin digital cash basics svcc 2017 10 001 publish
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin A General Overview
Bitcoin A General Overview Bitcoin A General Overview
Bitcoin A General Overview
 
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
Bit kingdom { Join Bitkingdom http://bit.ly/1WVBMS8}
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
Bitcoin technology
Bitcoin technologyBitcoin technology
Bitcoin technology
 
Bitcoin.pg
Bitcoin.pgBitcoin.pg
Bitcoin.pg
 
Mining hub
Mining hubMining hub
Mining hub
 
Mining hub-
Mining hub-Mining hub-
Mining hub-
 
MINING HUB SUMIT
MINING HUB SUMITMINING HUB SUMIT
MINING HUB SUMIT
 

Mais de Rishikese MR

Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language ProcessingRishikese MR
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneRishikese MR
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelRishikese MR
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV'sRishikese MR
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed applicationRishikese MR
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTINGRishikese MR
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGERishikese MR
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.Rishikese MR
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its FeaturesRishikese MR
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud ComputingRishikese MR
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.Rishikese MR
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 jRishikese MR
 

Mais de Rishikese MR (19)

1 2 3 4 5 g
1 2 3 4 5 g1 2 3 4 5 g
1 2 3 4 5 g
 
Natural Language Processing
Natural Language ProcessingNatural Language Processing
Natural Language Processing
 
Fuzzy Logic
Fuzzy LogicFuzzy Logic
Fuzzy Logic
 
Crowd Sourcing With Smart Phone
Crowd Sourcing With Smart PhoneCrowd Sourcing With Smart Phone
Crowd Sourcing With Smart Phone
 
BLUE BRAIN
BLUE BRAINBLUE BRAIN
BLUE BRAIN
 
The No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra ModelThe No SQL Principles and Basic Application Of Casandra Model
The No SQL Principles and Basic Application Of Casandra Model
 
CYBORG
CYBORG CYBORG
CYBORG
 
DATA WAREHOUSING
DATA WAREHOUSINGDATA WAREHOUSING
DATA WAREHOUSING
 
Automatic 2D to 3D Video Conversion For 3DTV's
 Automatic 2D to 3D Video Conversion For 3DTV's Automatic 2D to 3D Video Conversion For 3DTV's
Automatic 2D to 3D Video Conversion For 3DTV's
 
Middleware and Middleware in distributed application
Middleware and Middleware in distributed applicationMiddleware and Middleware in distributed application
Middleware and Middleware in distributed application
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
EMOTION BASED COMPUTING
EMOTION BASED COMPUTINGEMOTION BASED COMPUTING
EMOTION BASED COMPUTING
 
3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE3D OPTICAL DATA STORAGE
3D OPTICAL DATA STORAGE
 
OUTERNET
OUTERNETOUTERNET
OUTERNET
 
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.OVERVIEW  OF FACEBOOK SCALABLE ARCHITECTURE.
OVERVIEW OF FACEBOOK SCALABLE ARCHITECTURE.
 
Google Glass and its Features
Google Glass and its FeaturesGoogle Glass and its Features
Google Glass and its Features
 
Virtualization and cloud Computing
Virtualization and cloud ComputingVirtualization and cloud Computing
Virtualization and cloud Computing
 
Artificial intelligence in gaming.
Artificial intelligence in gaming.Artificial intelligence in gaming.
Artificial intelligence in gaming.
 
A seminar on neo4 j
A seminar on neo4 jA seminar on neo4 j
A seminar on neo4 j
 

Último

UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimizationarrow10202532yuvraj
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5DianaGray10
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"DianaGray10
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementNuwan Dias
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 

Último (20)

UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization100+ ChatGPT Prompts for SEO Optimization
100+ ChatGPT Prompts for SEO Optimization
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5UiPath Studio Web workshop series - Day 5
UiPath Studio Web workshop series - Day 5
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
UiPath Clipboard AI: "A TIME Magazine Best Invention of 2023 Unveiled"
 
The Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API ManagementThe Kubernetes Gateway API and its role in Cloud Native API Management
The Kubernetes Gateway API and its role in Cloud Native API Management
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 

BITCOIN TECHNOLOGY AND ITS USES

  • 1. A DECENTRALIZED DIGITAL CURRENCY CAROLINE DAVID Reg no :12120097 S7 Computer Science B SEMINAR GUIDE: Dr. Sheena Mathew
  • 2. AGENDA…  INTRODUCTION  EVOLUTION  TERMS USED IN BITCOIN  MINING  AQUIRING BITCOIN  HOW TO STORE BITCOINS  TYPES OF WALLET  HOW BITCOIN ACTUALLY WORKS  TRANSACTION
  • 3. AGENDA  WHO CONTROL THE NETWORK  MERITS AND DEMERITS  APPLICATIONS  CONCLUSION  REFERENCES
  • 4. INTRODUCTION…  Virtual money that exist in cyber space.  It uses peer to peer technology.  Bitcoin is an open source.  Bitcoins are used for electronic purchases and transfers.  Not supported by any bank or government.
  • 5. EVOLUTION  Bitcoin is the first implementation of a concept called "crypto-currency“.  First Bitcoin specification was published in 2009 in a cryptography mailing list by Satoshi Nakamoto.  1 BTC = 333.71$ is the current value. i.e Rs. 21,481.63
  • 6. TERMS USED IN BITCOIN…  Installing a bitcoin wallet on mobile phone or PC. Generating a bitcoin address. The Bitcoin network is sharing a public ledger called the "block chain".  Authenticity of each transaction is protected by “digital signatures”.  Transaction is processed using “Mining” also.
  • 7. Mining  New bitcoins are generated by a competitive and decentralized process called "mining”.  Mining is the process of adding transaction records to Bitcoin's public ledger of past transactions.  Mining is intentionally designed to be resource-intensive.  The primary purpose of mining is to allow Bitcoin nodes to reach a secure, tamper-resistant consensus.  Mining is also the mechanism used to introduce Bitcoins into the system.  Miners are paid any transaction fees as well as a "subsidy" of newly created coins.
  • 8. HOW CAN ONE ACQUIRE BITCOIN?  As payment for goods or services.  Purchase bitcoins at a Bitcoin exchange.  Exchange bitcoins with someone near you.  Earn bitcoins through competitive mining.
  • 9. HOW TO STORE BITCOIN ?  Bitcoins are stored in what are called wallets  Wallet is a randomly generated string of numbers and consists of two parts : Public key and private key  Public key – For transferring money to your account eg : 14GabW85FUMQy62CMWLCToQLo81w7iXL2x  Private key – Only for the wallet Owner. If anyone gets ahold your private key, they will have access to all your bitcoins (ALWAYS KEEP YOUR PRIVATE KEY PRIVATE!!!)
  • 10. TYPES OF WALLET  Online wallet services * All that is required here is to create an account and remember the password * Most popular services are Blockchain.info and Coinbase  Local or Offline wallets * It is an application that can be downloaded in your computer * Your private key will be stored locally on the hard drive  Paper wallets * Here the public key and the private key which are generated offline are printed in a physical piece of paper and then stored in a safe location
  • 11. HOW BITCOIN WORKS? Create a Bitcoin account using open source software. Software outputs a private key and a public key. Private key must be kept secret. Private key - transferring money from account. If private key is lost the funds are irrevocably lost . Public key -transferring money to our account.
  • 12. HOW BITCOIN WORKS?(CONT..) • To transfer funds to your account, other people will enter in their owns account's private key and your public key. • Block chain - a global, distributed cartographic ledger of transactions • i.e. transaction details are recorded in the block chain
  • 13. TRANSACTION  Sending or receiving bitcoins are as simple as scanning a QR code with your smartphone.  Online services such as Blockchain.com and Coinbase help us for this.  Both have security features that require you to use a PIN for transaction.  Simply scan the receivers QR , enter the number of coins to send, and you are done. (QR code will be generated when we enter the public key)
  • 15. WHO CONTROLS THE NETWORK ?  Nobody owns the Bitcoin network.  Bitcoin is controlled by all Bitcoin users around the world. The price of bitcoin is determined by “Supply and Demand” When demand for bitcoin increases, the price increases, and when demand falls, the price falls.
  • 16. HOW TO KEEP BITCOIN SECURE?  Use strong passwords.  Always encrypt your wallet.  Keep your private key secret.  Always run antivirus software.
  • 17. ADVANTAGES OF BITCOIN  Payment freedom.  Very low fees.  Few risk for merchants.  Security and control.  Transparent and neutral.
  • 18. DISADVANTAGES OF BITCOIN  Lack of awareness.  No Physical Form.  Bitcoins are not widely accepted.  Wallets can be lost.  No valuation guarantee.
  • 19. APPLICATIONS OF BITCOIN  You can save them .  You can spend them just like cash .  You can day trade with them .  You can invest in various BTC based companies .
  • 21. WHERE THEY ARE ACCEPTED www.wordpress.com www.torrentfreak.com www.overstock.com www.highcart.com www.bitcoinshop.us www.51attack.com www.venturebeat.com www.eztv.it And many more…
  • 22. TOP 5 COUNTRIES FOR BITCOIN DOWNLOADS US -- 12,07,661 CHINA -- 5,05,904 GERMANY -- 2,70,043 UK -- 2,36,523 RUSSIA -- 2,26,680 Note :- India ranks 16th -- 35,648
  • 23. APPS WHICH YOU CAN DOWNLOAD  MultiBit is an app you can download for Windows, Mac and Linux.  Bitcoin Wallet for Android runs on your smartphone or tablet.
  • 24. CONCLUSION Bitcoin is a revolutionary currency system which can work in parallel or even replace the existing forms of currencies in the future. Bitcoin can be used as a reliable alternative for fast cashless payments by proposing solutions .The low transaction fees of the network and the instant availability of money to the merchant might render bitcoins interesting for vending machine operators.
  • 25. REFERENCE  https://bitcoin.org/en/  http://en.wikipedia.org/wiki/Bitcoin#History  http://whatis.techtarget.com/definition/Bitcoin-mining  https://products.butterflylabs.com/  https://bitcoin.org/en/faq#what-are-the-advantages-of-bitcoin  https://bitcoin.org/en/faq#what-are-the-disadvantages-of-bitcoin http://en.wikipedia.org/wiki/Bitcoin#Economics  http://en.wikipedia.org/wiki/Bitcoin#Security