[vc_row][vc_column][vc_column_text]

0-9
- 0x
- 0x is a decentralized exchange for trading ERC 20 tokens. the 0x protocol facilities the trading of Ethereum based assets.
- 2 Factor Authentication (2FA)
- 2 Factor Authentication is a security protocol that adds a second layer of security to an already existing security to tighten the system and further prevent a breach, unauthorized entry, and unauthorized modification of data.
- 51% Attack
- A 51% Attack is an attack on the crypto blockchain where a few miners control more than 50% of the network’s mining hashing rate. Learn more
A
- ASIC
- ASIC (Application-Specific Integrated Circuit device)
- ASIC Miners
- ASIC Miners are Technoscientific BTC Mining hardware specialized in bitcoin mining.
- Abstract
- Not relating to an object, existing as a thought or idea.
- Account
- An account is used to track the financial activities of a trader/asset
- Adam Back
- Adam Back is a widely known British crypto enthusiast, cryptographer, and cypherpunk.
- Address
- A virtual location in form of numbers and letters where cryptocurrency can be sent to and received.
- Air Gap
- A state where data cannot be accessed or corrupted.
- Airdrop
- An act of delivering cryptocurrency in a marketing campaign, to a selected audience.
- Algo-Trading (Algorithmic Trading)
- It is automated trading where orders are placed through a set of complex algorithmic patterns.
- Algorithm
- An Algorithm is a set of orders to be carried out by a computer and used to solve a problem.
- Algorithmic Stablecoin
- An algorithmic stablecoin uses an algorithm that releases more coins when prices are high and buys them back when prices plummet.
- All-Time-High (ATH)
- A All-Time-High (ATH) is the highest point in the price of a cryptocurrency in its history.
- All-Time-Low
- A All-Time-Low is the lowest point in the price of a cryptocurrency in its history.
- Allocation
- An Allocation is a trader who trades any other cryptocurrency apart from Bitcoin.
- Angel Investor
- An Angel Investor is a person who supports a new business venture financially.
- Anonymous
- An anonymous is person or entity, whose identity is unknown.
- Anti-Fragile
- Anti-Fragile is a characteristic of an asset that makes it do better whilst exposed to market volatility.
- Anti-Money-Laundering (AML)
- Anti-Money-Laundering are international laws set to ensure that criminals and criminal organizations do not launder illegal money through cryptocurrency into real-world cash.
- Anti-whale mechanism
- An anti-whale mechanism is a syntax of code in a cryptocurrency’s algorithm is meant to discourage excessive selling of the holders by big holders.
- Antivirus
- An antivirus is a software designed to protect computer-enabled devices from harmful software dangerous cyber-attacks.
- Apeing
- Apeing is when a cryptocurrency trader buys a token immediately after being launched without conducting any detailed research.
- Arbitrage
- Arbitrage involves buying an asset from one market and quickly selling it in another market to take advantage of price differences between the markets.
- Ashdraked
- Ashdraked is the loss of the entirety of a trader’s capital.
- Ask Price
- An Ask Price is the minimum price that a seller wants to receive for an asset.
- Asset-Backed Tokens
- Asset-Backed Tokens are tokens that are backed by a physical asset.
- Astroturfing
- Astroturfing is the act of making sponsored reviews seem like views of genuine users or community members.
- Atomic Swap
- Atomic Swap involves the transfer of cryptocurrency from one party to another without the use of an intermediary or exchange.
- AtomicDEX
- AtomicDEX gives users, access to a cryptocurrency wallet and a decentralized exchange, all in one application usually available on more than one platform.
- Attestation Ledger
- Attestation Ledger is usually used to show that a financial transaction has occurred and show its authenticity.
- Audit
- An audit is a process where software developers check the codes that comprise a cryptocurrency, system, or application.
- Automated Market Maker
- An automated market maker provides liquidity for an exchange through automated trading.
B
- BEP-2(Binance Chain Tokenization Standard)
- A technical standard for tokens on Binance chain
- BEP-20
- Binance smart chain standard created with many features of ERC-20.
- Bag
- A cryptocurrency term is used to refer to the contents in a crypto holder’s portfolio. It is also used to refer to a large quantity of a particular cryptocurrency.
- Bagholder
- It is used to refer to a holder of a large sum of a particular cryptocurrency, no matter its performance.
- Bakers
- Baking is a term used by Tezos to mean the additions of new blocks of transactions onto its blockchain.
- Bank for International Settlements (BIS)
- The Bank for International Settlements is an international monetary organization that ensures global monetary stability.
- Banking as a Service (Baas)
- Banking as a Service (Baas) ensures a better level of financial transparency by making Banks open the APIs+ for third parties to develop new services.
- Basket
- Basket refers to a collection of cryptocurrencies managed as one asset.
- Batch Auctions
- Batch auctions are trading tools where individual orders are assigned into a group (in batches) and executed at the same time.
- Bear
- A Bear is a person who believes that prices will continually decline over an extended period.
- Beartrap
- Beartrap is the attempt at manipulating the price of a particular cryptocurrency in coordinated activities by a group of traders.
- Bearwhale
- A bearwhale is a person who holds a large amount of a particular cryptocurrency intending to drive its price downwards to profit.
- Bid-Ask-Spread
- Bid-Ask-Spread is the price difference between what a willing buyer is willing to pay for an asset, and what the seller is looking to receive.
- Bit
- Bit is the basic unit of information in computing.
- Bit
- A Bit is a fraction of a single Bitcoin.
- BitLicense
- BitLicense is a business license issued by the New York State Department of financial services, that shows permission for regulated electronic currency activities.
- Bitcoin ATM (BTM)
- Bitcoin ATM (BTM) is an automated teller machine that allows people to buy and sell Bitcoin on it.
- Bitcoin Halving
- Bitcoin halving is done to reduce the potential wins of miners to sustain the value of the coin and to prevent too much circulation of bitcoin. The reward for a block reward is reduced by half. The last bitcoin halving occurred on May 11, 2020, to a reward of 6.25BTC per block and the next halving should occur about the same time in the next 4 years.
- Bitcoin talk
- Bitcoin talk is a popular online forum for discussing Bitcoin, cryptocurrency, and blockchain.
- Bitcoineer
- A Bitcoineer is a person who believes in Bitcoin.
- Bitpay
- Bitpay is a Bitcoin payment service provider.
- Block
- A Block is a blockchain file that contains information on completed transactions over a particular period.
- Block Explorer
- A Block Explorer is an application that lets users view details of blocks on a blockchain. It is also known as a blockchain browser.
- Block Reward
- A Block Reward are the coins that are awarded to cryptocurrency miners who solve the cryptographic problem needed to make a new block on a particular blockchain.
- Block Size
- Block size is the amount of data about transactions that one block in a particular blockchain can carry.
- Block Time
- Block time is the time taken for a blockchain-based system to create a new block.
- Blockchain
- Blockchain is a distributed ledger system containing layers of blocks of digital information, stored sequentially in a public database. Blockchain is the basis for cryptocurrencies.
- Blockchain 1.0
- Blockchain 1.0 is the earliest form of blockchain technology, which focuses on cryptocurrency and decentralization.
- Blockchain 3.0
- Blockchain 3.0 is the latest developmental stage of blockchain, which predicts worldwide institutional and business adoption.
- Blockchain Developement
- Blockchain development involves developing and optimizing blockchain protocols, the creation of blockchain systems architecture, smart contract development, and web apps using blockchain technology. Learn more.
- Blockchain Explorer
- A blockchain explorer is a search tool that allows users to look through blockchain records.
- Blockchain Trilemma
- The blockchain trilemma is a set of three problems that confront blockchains: decentralization, security, and scalability.
- Bollinger Band
- Bollinger Band is a tool plotted by Bollinger+ that recognizes a systemic pattern in prices.
- Bonding Curve
- A bonding curve is a mathematical curve that explains the relationship between the price of a particular asset and its supply.
- Bots
- Bots are software that automatically carries out tasks such as cryptocurrency trades and data management.
- Bounty
- A Bounty is a reward that users receive by performing particular tasks committed to them by a project or a blockchain.
- Brave Browser
- Brave Browser is a free and open-source browser developed by Brave software. Brave gives users options to turn on or off display Ads with the privilege to earn the Basic Attention Token (BAT) cryptocurrency. Learn more.
- Brian Armstrong
- Brian Armstrong is the founder of the cryptocurrency exchange, known as Coinbase, which is based in the United States.
- Bridges
- A blockchain bridge is a tool that allows seamless transactions of tokens and data between two different blockchain projects.
- Browser Extension
- A Browser Extension is a plugin for a browser that has embedded additional functions.
- Brute Force Attack (BFA)
- A Brute Force Attack (BFA) is an attempt to crack a password or encryption through automated trial and error.
- Bubble
- A Bubble is when an asset is traded far above its total value.
- Bug Bounty
- A Bug Bounty is an attack on a system based on its vulnerabilities.
- Bull
- A Bull is a person that believes that prices will increase. Such a person is said to be bullish about price or the market.
- Bull Trap
- A Bull Trap is seen when an asset that has been on a continuous downward move suddenly reverses into an upward trend briefly, only to continue the downward movement soon after.
- Burned
- Cryptocurrencies are burned when they have moved away from circulation permanently.
- Buy Wall
- A Buy Wall is a large, imbalanced buy limit order placed on a cryptocurrency exchange.
- Buy the Dip (BTD)
- A Buy the Dip (BTD) is a confident statement by supporters of a cryptocurrency for people to buy while its price is low.
- Byzantine Fault Tolerance (BFT)
- Byzantine Fault Tolerance (BFT) is a property of a computer system that allows it to reach a threshold irrespective of the failure of some of its components.
C
- C++
- C++ is the name of a programming language that allows development on multiple platforms.
- Call Options
- Call Options are financial contracts that allow a buyer to place buy orders on an asset at a particular time.
- Candlesticks
- Candlesticks are graphical representations that show changes in price at a particular time. A candlestick provided data on opening price, closing price, high and low.
- Capital
- Capital is the sum of money an investor chooses to invest.
- Capital Funds
- Capital Funds is the money provided in the form of equity or debt to run a company or venture.
- Capitulation
- Capitulation occurs when you sell a particular asset you own at significant losses because you no longer believe in the asset anymore.
- Cardano
- Cardano is a public blockchain platform, founded by Ethereum co-founder Charles Hoskinson. It is built on a proof of stake protocol.
- Casascius Coin
- A Casascius Coin is a physical form of a Bitcoin token, usually made of silver, brass, bronze, or gold-plated coins.
- Cash
- Cash is the common form of money. Its examples include banknotes and physical cash.
- Censorship Resistance
- Censorship Resistance refers to the school of thought that no party can stop anyone from participating in an event.
- Central Bank
- Central Bank is the (central) bank that is responsible for the formulation and transmission of monetary policy and regulation of member banks.
- Central Bank Digital Currency (CBDcs)
- Central Bank Digital Currency (CBDcs) are digital currencies issued by a central Bank whose operation is backed by law and government regulation.
- Central Ledger
- A central ledger is a computer file or in some cases, a physical book used to record transactions in a centralized manner.
- Central Processing Unit (CPU)
- Central Processing Unit (CPU) is the part of a computer that interprets, executes programs while coordinating the functions of other components of the computer.
- Centralized Exchange (CEX)
- Centralized exchanges are a type of cryptocurrency exchange whose operations are controlled by a centralized company and manages centrally.
- Centralized decentralized finance (CeDeFi)
- Centralized decentralized finance combines conventional centralized financing with the use of decentralized applications.
- Chains split
- Chains split is another term used to describe cryptocurrency hard forks – that is, the division of a single coin into other independently managed projects.
- Changpeng Zhao (CZ)
- Changpeng Zhao is the founder of cryptocurrency exchange Binance.
- Chargeback
- A chargeback is the return of money used for a particular transaction, usually made with debit or credit cards.
- Chicago Mercantile Exchange (CME)
- Chicago Mercantile Exchange (CME) is one of the largest exchanges in the world that engage in futures and options trading.
- Cipher
- Cipher a computer code that can be used to encrypt and decrypt information.
- Ciphertext
- Ciphertext is a result of encryption that has been carried out on plaintext through the use of computer code.
- Circulating Supply
- Circulating Supply is the amount of coins circulating in the market and the hands of the public is known as the circulating supply.
- Client
- A client is software that can access and process blockchain transactions on computer systems and mobile devices. An example is a cryptocurrency software wallet.
- Close
- Close is the closing price of an asset.
- Cloud Mining
- Cloud Mining is the mining cryptocurrency using remote processing power from other companies.
- Co-signer
- A co-signer is an entity or person, which has partial control over a cryptocurrency wallet.
- Code
- Coding is the writing programming statements for computation use.
- Coin
- A coin may be referred to as the single unit of a cryptocurrency or one that can operate independently.
- Coin Burning
- Coin burning is a process of rendering a coin unusable by sending it to an “Eaters Address” or a Black Hole condemning it forever. So, to reduce supply, such coins or tokens are acquired and then sent to unique addresses whose private keys are unobtainable. Learn more
- Coin Mixer
- A coin mixer is a tool that allows its users to mix cryptocurrency transactions between addresses such that, the sender or receiver address is traceable.
- Cold Storage
- Cold Storage is the storage of cryptocurrencies offline in hardware like USBs, paper wallets, or offline computers.
- Collateralized Debt Position (CDP)
- A collateralized debt position is own in which collateral is locked in smart contracts to generate stable coins.
- Commodity Futures Trading Commission (CFTC)
- Commodity Futures Trading Commission (CFTC) is a federal regulatory agency in the United States responsible for regulating the derivatives market in that country.
- Composable Token
- Composable Token is a non-fungible token based on the ERC-988 standard extension that gives a token the ability to own other non-fungible tokens (ERC-721) and fungible tokens (like ERC-20).
- Confirmation
- Confirmation is a measure of the number of blocks that have passed since a transaction was initiated on a blockchain.
- Consensus
- A consensus is reached when all participants of a network agree on the content and or of the block of a blockchain.
- Consensus Mechanism
- A consensus mechanism is a linking technology that backs the functionality of all blockchain technology that all cryptocurrencies use.
- Consensys
- Consensys is a blockchain company that offers enterprise solutions in blockchain as well as developer tools.
- Contract Account
- Contract Account is an account that has a cryptocurrency balance.
- Core wallet
- A core wallet can contain the entire blockchain as against just a piece of blockchain.
- Correction
- A correction is also known as a pullback of the price of an asset by at least 5% to adjust to overvaluation.
- Craig Wright
- Craig Wright is an Australian computer scientist who claims to be the inventor of Bitcoin-Satoshi Nakamoto.
- Cross-Chain
- Cross-chain is a technology that enhances the exchange of information between blockchain networks.Cross-ChainCross-chain is a technology that enhances the exchange of information between blockchain networks.
- Cross-Chain Communication
- Cross-Chain Communication exists to enable blockchains to verify data and transactions without third-party interference.
- Crowdfunding
- Crowdfunding enables fundraisers to collect money from a large number of people.
- Crypto Debit Card
- Crypto Debit Card is a type of debit card that allows its users to make different payments with cryptocurrencies.
- Crypto Dusting Attack
- Acrypto dusting attack is a large-scale attack on wallet addresses where small amounts of tokens or coins are sent to thousands or hundreds of thousands of wallets in order to de-anonymize them. The attacker does this to trace the identities of the wallet owners and thereafter launch an extortion spree, blackmail, stealing, or some other form of hacking activity. Learn more.
- Cryptocurrency
- A cryptocurrency is a digital currencies.
- Cryptocurrency Money Laundering
- Cryptocurrency Money Laundering is a process criminals use to make illegal funds legitimate by changing fiat to cryptocurrency and passing it through many complex processes to lose law enforcement authorities who may be tracing the money.
- Cryptocurrency Pairs
- Cryptocurrency pairs are used by exchanges to enable the trading of different tokens.
- Cryptography
- Cryptography is a field of study that seeks to ensure the security of information to prevent third parties from accessing information they should not have access to.
- Cryptojacking
- Cryptojacking is the use of another person/entity’s computer to mine cryptocurrency without their express permission. Cybercriminals hack into unsuspecting victims’ computers to steal computing power and mine cryptocurrencies without the users hardly noticing. Learn more.
- Cryptology
- Cryptology is the scientific study of cryptography.
- Currency
- Currency is the medium of exchange that determines value.
- Custodial
- Custodial cryptocurrency businesses are operated such that they have customers’ assets for the period that they use their services.
- Cypherpunk
- is a movement that publicizes the use of cryptography to advance social and political progress.
D
- DYOR
- DYOR is the acronym of Do Your Research. It is advised for potential investors to do due diligence in research about a project before investing.
- Dark Web
- The dark web is a part of the internet that exists on darknets, which are not cataloged by search engines. The dark web can only be accessed through special software and configurations.
- Data Privacy
- Data privacy is the aspect of data protection that focuses on managing sensitive data.
- Date of Launch
- Date of Launch
Date of Launch is the time that tokens will be put up for sale in an initial coin offering.
- Day Trading
- Day trading includes acts of buying and selling a range of assets to make a profit based on changes in price within a single day.
- DeFi
- DeFi is an alternative to traditional centralized forms of financial services.
- DeFi Aggregator
- A DeFi aggregator brings trade from different DeFi platforms together into one place.
- DeFi Degens
- DeFi Degens means DeFi degenerates in full. It is a part of decentralized finance infamous for pump and dump schemes.
- Dead Cat Bounce
- Dead Cat Bounce is a temporary recovery in prices after a previously sustained decrease.
- Dead Coin
- Dead Coin is a cryptocurrency that is no longer of use or no longer in existence.
- Decentralized Applications (Dapps)
- Decentralized Applications (Dapps) is a type of application that runs on a decentralized network.
- Decentralized Autonomous Organizations (DAO)
- A decentralized autonomous organization is founded based on blockchain smart contracts and is governed by a series of computer-defined rules.
- Decentralized Database
- A decentralized database is a storage innovation that combines decentralized technology with high-end computing to store data across multiple nodes.
- Decentralized Exchange
- A peer-to-peer cryptocurrency exchange platform that, does not need an intermediary.
- Decentralized Identifier (DID)
- A decentralized identifier (DID) is identifying information that can be issued by an independent decentralized platform that shows proof of ownership of digital identity.
- Decentralized Payment Network
- Decentralized Payment Network
A Decentralized Payment Network is a network where buyers and sellers of assets and services can exchange money without the interference of a third party to keep the network operational and secure.
- Decentralized Social Media
- Decentralized Social Media is a social media platform that is based on blockchain.
- Decryption
- Decryption involves transforming previously encrypted data into a format that is readable by a user or computer program.
- Deep Web
- Deep Web is a part of the internet that cannot be accessed through common search engines.
- Deflation
- Deflation is a sustained reduction in the general price level for goods and services in an economy.
- Delegated Proof-of-stake (dPOS)
- Delegated Proof-of-stake (dPOS) is an alternative to the proof of work and proof of stake consensus algorithms.
- Denial-of-service (DoS) Attack
- Denial-of-service (DoS) Attack is a malicious attack on a computer to prevent its availability to the intended users.
- Depth Chart
- Depth Chart is a graph-like representation of the bid and asks prices based on limit orders.
- Derivative
- A derivative is a financial instrument that derives its value from another underlying asset.
- Derivatives market
- Derivatives market is a public market for derivatives allows for the trading of instruments like futures, options, and contracts which are derived from other forms of cryptocurrency assets.
- Deterministic Wallet
- A deterministic wallet is a form of cryptocurrency wallet in which keys and addresses are created from a single seed phrase.
- Dex Aggregator
- Dex Aggregator are blockchain-based platforms that allow cryptocurrency traders to benefit from a large variety of financial tools usually with high liquidity.
- Difficulty
- Difficulty shows how hard it is to validate a new block on a blockchain.
- Digital
- Digital technologies include tools that can generate, store, and, process data.
- Digital Art
- Digital art includes art that is made with digital tools and technology.
- Digital Asset
- Digital Asset is a digital representation of something with a store of value.
- Digital Asset Custodian
- A digital asset custodian is a party that manages the digital assets of a client.
- Digital Commodity
- A Digital Commodity is a commodity that exists digitally.
- Digital Currency
- A digital currency is one that only exists in digital form against traditional physical currencies.
- Digital Signature
- Digital Signature is used to prove the authenticity of digital communication.
- Dildo
- Dildos are red or green candles on graphs showing cryptocurrency market data.
- Dip
- A dip is observed when the market experiences a short or long downward turn in prices.
- Distributed Consensus
- Distributed Consensus is a collective agreement is reached among nodes in a network.
- Distributed Denial of service (DDoS) Attack
- Distributed Denial of service (DDoS) Attack is an attempt to disrupt the operation of a network or server by flooding it with traffic.
- Distributed Ledger
- Distributed ledgers are used to store data throughout a network of decentralized nodes.
- Distributed Network
- A Distributed Network is a network in which the applications and data are based on multiple sources against just one source.
- Diversification
- Diversification is a risk management strategy that ensures that multiple investments are present in a portfolio.
- Dolphin
- A Dolphin is someone who holds a moderate amount of a particular cryptocurrency.
- Dorian Nakamoto
- Dorian Nakamoto is a Japanese-American physicist who some believe is Satoshi Nakamoto.
- Double Spending
- Double Spending is the undesirable potential of a cryptocurrency is to be spent twice.
- Dump
- A Dump is an unanticipated sell-off of digital assets.
- Dumping
- Dumping occurs when a large portion of a particular cryptocurrency is sold off suddenly in a short period.
- Dust Transactions
- Dust Transactions are very small amount of cryptocurrency in a wallet whose value would not be enough to be a basic transaction cost.
- Dusting Attack
- A dusting attack is simply a malicious activity where a person deliberately sends units of digital coins to the wallet of an unsuspecting person in other to steal their privacy. A suspicious inflow of coins into the digital wallet could grant a hacker access through some malicious programs in other to de-anonymize the wallet owner or the wallet provider. Learn more.
- Dynamic Coin Offering (DYCO)
- Dynamic Coin Offering (DYCO) is a new crowdfunding model that uses utility tokens that are backed by USD.
E
- E-signature
- E-signature is an electronic signature used in the lace of a physical signature.
- ELI5
- ELI5 is a short term for ‘explain like I am five’. Usually used to plead for a simpler explanation when someone is explaining crypto terms to you.
- ERC-20
- ERC-20 tokens are tokens designed and used only on the Ethereum platform
- ERC-721
- ERC-721 is the token standard for Ethereum non-fungible tokens.
- Elliott waves
- Elliott waves is a trading tool used by cryptocurrency traders.
- Email Phishing
- Email Phishing is a dubious means where cyberthieves steal information or extract data by luring victims to click on a suspicious link sent via email. The scamming act is geared towards identity theft, cyber extortion, blackmail and fraud. Learn more.
- Email Spoofing
- Email Spoofing is a trick to make users believe that a message came from another source.
- Emission
- Emission is the rate at which new coins are produced.
- Encryption
- Encryption is a way of protecting data by turning it into a code.
- Enterprise Ethereum Alliance (EEA)
- Enterprise Ethereum Alliance (EEA) is a group of organizations working together to promote the growth of the Ethereum network
- Escrow
- Escrow is an arrangement (maybe a person or a tool) that holds on to assets or cash while a buyer and seller complete a transaction.
- Ether
- Ether is the form of payment used on the Ethereum platform.
- Ethereum Improvement Proposal (EIP)
- Ethereum improvement proposal (EIP), includes standards for the Ethereum platform that includes Client APIs, protocol specifications, contract standards, and core protocol specifications.
- Ethereum Transaction
- Ethereum Transaction
Ethereum transactions are cryptographically signed instructions to begin a transaction to update the Ethereum network.
- Ethereum Virtual Machine (EVM)
- The Ethereum virtual machine is the runtime environment for every smart contract. All of Ethereum node runs on the EVM to enable the maintenance of consensus throughout the blockchain.
- Exchange
- An exchange is a business venture that allows clients to trade their crypto for other crypto or fiat.
- Exchange-Traded Fund
- An exchange-traded fund is a security that tracks an array of assets like cryptocurrencies, stocks, and bonds.
F
- FATF Travel Rule
- The FATF Rule mandates virtual asset providers to regulate information sharing for some large transactions.
- FOMO
- FOMO is an acronym that stands for ‘Fear of Missing out.’
- FUD
- FUD is an acronym that stands for ‘Fear, Uncertainty, Doubt.’ It usually discourages people from buying cryptocurrency.
- FUDster
- A FUDster is a person spreading FUD.
- Faucet
- A Faucet is a reward system in cryptocurrency, that rewards users for performing certain tasks.
- Fiat
- Fiat is any currency backed by constituted authorities such as the government, Federal Reserve, Central Bank. It is otherwise known as legal tender and it may come in the form of physical cash or an electronic form.
- Fiat On-Ramp
- Fiat On-Ramp is a way to get cryptocurrency regular fiat.
- Fiat Pegged Cryptocurrency
- Fiat pegged cryptocurrency is any coin released whose value is commensurate with a bank-issued currency.
- Financial Action Task Force (FATF)
- Financial Action Task Force (FATF) is an organization with reach throughout the globe that aims to fight money laundering as well as financing terrorists.
- Financial Crime Enforcement Network (FinCEN)
- Financial Crime Enforcement Network (FinCEN) is a federal regulatory bureau of the United States Treasury.
- Financial Transactions and Reports Analysis Centre (FINTRAC)
- Financial Transactions and Reports Analysis Centre (FINTRAC) is Canada’s financial intelligence agency.
- First In, First Out (FIFO)
- First In, First Out (FIFO) is an inventory method used for calculating tax based on cost.
- Fish
- A fish is a person who has a small investment in crypto.
- Flash Crash
- Flash Crash is seen when the market price of an asset falls very quickly over a short period.
- Flash Loan Attack
- Flash Loan Attack is an occurrence where a smart contract is exploited for malicious purposes.
- Flash Loans
- Flash Loans are loans without collaterals used in decentralized finance (DeFi).
- Flippening
- Flippening is a theoretical occurrence where Ethereum’s market capitalization overtakes that of Bitcoin.
- Flipping
- Flipping is an investment strategy where an asset resells at a higher profit later.
- Fork (Blockchain)
- Fork (Blockchain) is also known as chain spits occurs when an alternate version of the blockchain is created, leaving two blockchains to operate at the same time.
- Fractional Stablecoins
- A fractional stablecoin is backed collateral-wise and is algorithmically modified.
- Front Running
- Front running occurs when a transaction is placed on a queue with the knowledge of a future transaction.
- Full Node
- A full node is a type of node that downloads a blockchain’s entire history to enforce its rules.
- Fundamental Analysis
- Fundamental analysis is research on an asset-based on some key metrics like a team, technology, growth prospects, and other factors.
- Fungible
- A fungible token in cryptocurrency can be easily replaced by any other identical token.
- Futures
- A futures contract is a legal agreement between parties to buy or sell a particular asset at a predetermined price at a particular time in the future.
G
- Gains
- An increase in value and profit.
- Gas
- Gas is a term used on the Ethereum network that refers to a unit of quantifying the computational effort of validating transactions or launch of DApps.
- Gas Limit
- Gas Limit is a term used on the Ethereum network used to refer to the amount highest amount of gas that a user will be willing to spend on a transaction.
- Gas Price
- Gas Price is a term used on the Ethereum network to refer to the amount that a person can pay per transaction.
- Gavin Wood
- Gavin wood is one of the founders of Ethereum and the co-founder of Parity Technologies.
- Gems
- Gems is used to refer to relatively unknown coins with a low market cap that can yield very high returns if you invest in them.
- Genesis Block
- Genesis Block is the first block of data that is processed and validated to form a new blockchain.
- Geotagged NFT
- Geotagged non-fungible tokens, allow art enthusiasts to own both the virtual and physical version of art by using a 3D version of the art with its geo-location.
- Geth
- Geth is the short form for Go Ethereum. It is the command line that enables developers to mine Ethereum, run full Ethereum nodes, execute smart contracts, and mine Ethereum.
- GitHub
- Github is a popular code hosting platform that lets developers collaborate on various projects.
- Gold-Backed Cryptocurrency
- Gold-Backed Cryptocurrency is a cryptocurrency whose value is pegged to a commensurate value of gold. For example, one gram of gold to be equal to one piece of the coin.
- Governance
- Governance, in cryptocurrency, is defined as the people or organizations that have decision-making power over a project.
- Governance Token
- Governance Token is a token that can be used to vote on any decision that affects an ecosystem.
- Graphical Processing Unit (GPU)
- Graphical Processing Unit (GPU) is also known as a graphic card. It is a computer chip that is useful for mining cryptocurrencies.
- Group Mining
- Group mining is an occurrence where many people or organizations come to mine together.
- Gwei
- Gwei is the denomination is used for defining the cost of Ether transactions.
H
- HODL
- HODL is a type of investment strategy where the crypto asset is held for an extended period, irrespective of changes in market price. The term first became known, due to a typo error while trying to write ‘hold’. The term is now commonly expanded to mean “Hold on for Dear Life
- Hacking
- Hacking involves the manipulation of a computer device through another computing device in an unauthorized fashion.
- Hal Finney
- Hal Finney was a cryptographer who worked with Satoshi Nakamoto in the development of Bitcoin.
- Halving
- Halving is an occurrence of reducing the rewards per block confirmation by half. New bitcoins go into circulation due to the activities of miners who mine them with very expensive computer hardware.
- Hard Cap
- A hard cap is the maximum supply of a digital asset.
- Hard Fork (Blockchain)
- Hard Fork (Blockchain) is a type of protocol change that validates all previously invalid transactions and invalidates all previously valid transactions.
- Hardware Security Module
- Hardware Security Module is a type of device that encrypts data and secures digital keys.
- Hardware Wallet
- A Hardware Wallet is a cryptocurrency wallet where cryptocurrencies are kept offline.
- Hash
- A hash is the output of a hashing algorithm, which creates a unique, alpha-numeric string to secure a selection of data.
- Hash Function
- Hash Function is a function used to change any size of data to a fixed size.
- Hash Power / Hash Rate
- Hash rate is the unit of measurement for the amount of computing power being consumed by a network to continually operate, usually in hash per second H/s.
- Hashing
- Hashing is a cryptographic function for security details like passwords. Hashing is a means of encryption that keeps the network secure and hackproof. Examples of hashing algorithms include SHA-256, Cryptonight, Ethash, Scrypt, X11, and more.
- Helium (HNT)
- Helium (HNT) is a cryptocurrency on a decentralized blockchain for the internet of things (IoT) devices. Helium cryptocurrency can be earned when hotspots give and validate network coverage. So, anyone can earn HNT by being a network operator and providing connectivity. Helium was created in July 2019.
- Hidden Cap
- A hidden cap involves concealing the amount of money a team is willing to receive from investors in an initial coin offering. It is done to allow smaller investors to invest without big investors knowing the cap and adjusting their investment as a result.
- Hierarchical Deterministic wallet (HD)
- A Hierarchical Deterministic wallet (HD) is a wallet that uses a single master key of 12 mnemonic phrases.
- Honeyminer
- Honeyminer is a cryptocurrency mining application.
- Hosted Wallet
- A Hosted Wallet is a wallet managed by a third-party service.
- Hot Storage
- Hot Storage is a storage of private keys online, which allows for quicker access to cryptocurrency
- Hot Wallet
- A hot wallet is a cryptocurrency wallet that stores its crypto assets online.
- Howey Test
- A Howey test is used to determine whether an asset is a security asset.
- Hybrid PoW/PoS
- Hybrid PoW/PoS is an approach that brings together the security from proof of work and the governance and energy efficiency that comes with proof of stake, on a hybrid consensus distribution algorithm on the network.
- Hyperledger Foundation
- Hyperledger Foundation is the organization behind a collective project of open-source blockchain and blockchain-related tools aimed at supporting the development of blockchain-based distributed ledgers.
I
- IOU
- IOU is an acronym that stands for ‘I owe you, is a document stating that one party owes another a debt.
- Immutable
- Immutable is a term used to describe the characteristic that makes something unable to be changed. It is usually a clause in a code or contract that prevents it from being changed.
- Impermanent Loss
- Impermanent loss occurs when a liquidity provider loses money temporarily because of volatility in currency pairs.
- In-the-money/Out-of-the-money
- In-the-money/Out-of-the-money are additional tools in trading options that allow investors to work better with the market.
- Infinite Approval
- Infinite Approval is the pre-approving of a smart contract, to permit a platform to spend any amount of your coins.
- Infinite Mint Attack
- Infinite Mint Attack is an attack where a malicious actor mints a very high (usually infinite) amount of tokens within a protocol.
- Inflation
- Inflation is a sustained increase in the general price level and a fall in the purchasing power of money.
- Initial Bounty Offering
- Initial Bounty Offering is a way of launching a project whereby people contribute skills to the development of the platform rather than money.
- Initial Coin Offering (ICO)
- Initial Coin Offering (ICO) is a type of crowdfunding that uses crypto as a means of raising capital for startups.
- Initial Dex Offering (IDX)
- Initial Dex Offering (IDX) is an alternative to an initial coin offering.
- Initial Public Offering (IPO)
- Initial Public Offering (IPO) is the process of a company offering its shares to the public for purchase on the stock market for the first time.
- Insider Trading
- Insider trading occurs when someone buys or sells a particular stock because of having private information about that stock.
- Instamine
- Instamine is when a big portion of a coin’s total supply is distributed to investors just after launch.
- Intercontinental Exchange (ICE)
- The Intercontinental Exchange is a company founded in America to purchase and manage global exchanges and clearinghouses.
- Interest Rates
- An interest rate is a time-dependent charge made in proportion to an amount lent, borrowed, or deposited.
- Intermediary
- An intermediary is a person, who acts as a middleman between two parties to facilitate a transaction.
- Internet of Things (IoT)
- Internet of things (IoT) is a network of interconnected devices, software, and sensors that can connect and exchange data with each other in real-time over the internet.
- Interplanetary File System (IPFS)
- Interplanetary File System (IPFS) is a peer-to-peer, distributed system for storing and accessing files.
- Intrinsic Value
- Intrinsic Value is a term used in relation to assets. It depicts an asset’s actual worth based on a complex financial estimation, rather than its current price.
- Invest
- Investing involves putting money in a venture with the expectation of future profits.
J
- JOMO
- JOMO is an abbreviation of “Joy Of Missing Out”; used to express happiness in a past decision to not invest in a financial instrument.
- JSON
- JSON is a system that can be used to create computer-consumable information that is also easily understood by humans.
- JVM
- JVM is a software that acts like a computer and runs other software programmed in Java, Kotlin, and some other programming languages.
- Java
- Java is a programming language that is general-purpose, object-oriented, and used to create engineering-grade software.
- JavaScript
- JavaScript is a programming language that was invented to program web browsers, but is now used for other things like native application development.
- John Bollinger
- John Bollinger is a highly respected financial analyst and author of the popular book “Bollinger on Bollinger Bands”.
K
- Keylogger
- A Keylogger is a malicious spying tool used by fraudulent actors to record keystrokes made by users of a platform.
- Kimchi Premium
- Kimchi Premium is an anomaly that occurs in South Korean crypto exchanges that make prices appear higher than other crypto exchanges in other countries of the world.
- Know Your Customer (KYC)
- Know Your Customer (KYC) are mandatory checks by crypto exchanges to verify the identities of their clients.
L
- Lambo
- Lambo is the short form for Lamborghini, an Italian luxury car that many crypto investors dream of buying when they earn good profits. More recently used as the slang ‘when Lambo?’ meaning-when are will going to get rich from this project?
- Layer 0
- Layer 0 is known as the foundation of the blockchain. It is the framework beneath the blockchain, made of hardware, miners, protocols, connections.
- Layer 1
- A Layer 1 blockchain is a set of improvements on the base protocol of blockchain.
- Layer 2
- Layer 2 is the second layer of blockchain that acts as an intermediary between the first layer and the decentralized app. Layer2 improves the scalability and efficiency of a blockchain.
- Ledger
- A ledger is a record of financial transactions that cannot be changed.
- Ledger Nano
- Ledger Nano is a USB-like device that is used for cold storage of cryptocurrencies. Learn more.
- Leverage
- Leverage is the money that a trader borrows from a broker to gain more exposure to the market, leverage enables traders to bigger positions for a potentially bigger profit.
- Light Node
- Light nodes are downloaded wallets that are connected to the full node to further validate the blockchain.
- Lightning Network
- Lightning network is a solution developed to solve the scalability problem of Bitcoin, to allow transactions to be processed faster with the use of a second layer protocol.
- Limit Order
- A limit order is an order to buy an asset at a better price than is specified.
- Liquidation
- Liquidation involves the conversion of a cryptocurrency to fiat.
- Liquidity
- Liquidity shows how easily cryptocurrency can be bought without affecting the overall market price.
- Liquidity Bootstrapping Pool
- Liquidity Bootstrapping Pool is a contract that manages a pool of different tokens to be used on an exchange.
- Liquidity Pool
- Liquidity pools are crypto-related assets that are kept to enhance trading pairs on decentralized exchanges.
- Liquidity Provider Tokens (LP Tokens)
- Liquidity Provider Tokens (LP Tokens) are tokens issued to liquidity providers on DEXes that run on an automated market maker.
- Liquidity provider
- Liquidity providers are crypto-asset owners who finance a liquidity poo with the asset that they own.
- Liveness
- Liveness is a guarantee that a system will continue to supply data and function. It also means that it a system will not be susceptible to any form of shutdown from an authority.
- Long
- Long refers to buying a cryptocurrency asset with the expectation that its price will rise to yield profit for its holder.
M
- Mainet
- A mainet is an independent blockchain that uses its technology and protocol on its network.
- Malware
- Malware is malicious software used to have access to a computer, network, or server illegally.
- Man-in-the-Middle Attack (MITM)
- A man-in-the-middle attack occurs when a bad actor places himself illegally in the middle of a conversion to eavesdrop.
- Margin Call
- A margin call is a notification sent by a cryptocurrency brokerage, informing the trader that the account balance has fallen below the maintenance margin.
- Margin Trading
- Margin trading is a practice used by crypto traders to borrow money from a broker to trade in the market.
- Market
- A market is a platform or medium, where traders buy and sell cryptocurrencies.
- Market Capitalization (MCAP)
- Market capitalization is the total value of all the coins in circulation for a particular cryptocurrency.
- Market Maker
- A market maker makes an order to buy or sell at a quoted price.
- Market OrderA buy or sell order to execute the trade at the best available price.
- A Market Order is a buy or sell order to execute the trade at the best available price.
- Market Signal
- Market signals are trading calls from expert traders to buy or sell a cryptocurrency at a specific price at a stated time.
- Market Taker
- A market taker takes the order to buy or sell to make orders filled.
- Maximum Supply
- A Maximum Supply is the highest number of a coin that will ever exist.
- Medium of Exchange
- A medium of exchange is a system that is used to enable a trade of goods between two parties.
- Mempool
- A mempool contains a node’s collection of its unconfirmed transactions.
- MetaMask
- MetaMask is an online digital wallet that enables users to store and transfer cryptocurrency.
- MicroBitcoin (uBTC)
- A microbitcoin is equivalent to 0.000001 of a Bitcoin.
- Micropayment
- A micropayment is a very minuscule transaction carried out online, usually less than a cent.
- Microtransaction
- A microtransaction is a business type where small digital goods are exchanged for small payments, such as a scene in a video, a page in an eBook.
- Mineable
- This is observed in cryptocurrencies that reward miners whose computer/hash is used to creating blocks. Cryptocurrencies which can generate new cryptocurrencies through block confirmations are minable.
- Minecraft
- Minecraft is a video game where gamers can break a block of 3d walls.
- Miners
- Miners are individuals or companies who contribute their hashing power to a blockchain.
- Minimum Viable Product
- A minimum viable product comes with features in its early stage to attract early users and customers.
- Mining
- Mining is the process that adds blocks to a blockchain. For some cryptocurrencies, it is the process where new coins are minted.
- Mining Contract
- Mining contract is another name for cloud mining whereby miners use their devices to mine online.
- Mining Difficulty
- Mining difficulty refers to how difficult it is to find the next hash.
- Mining Farm
- A mining farm is a group of miners that combine their mining resources to mine usually to save energy.
- Mining Pool
- A mining pool is an arrangement where some miners pool their resources together to find the next block.
- Mining Rewards
- Mining rewards are the incentive that miners receive for mining a new block.
- Mining Rig
- A mining rig is equipment used for mining cryptocurrencies.
- Minnow
- A minnow is someone with a small amount of crypto investment, also known as fish.
- Mnemonic Phrase
- The mnemonic phrase consists of a group of phrases that are used sequentially to access a wallet or restore it.
- Mobile Wallet
- A mobile wallet is a crypto wallet installed on a mobile device, like a mobile phone.
- Monet Transfer License
- Monet Transfer License is also known as a money transmitter, they provide money transfer services.
- Money Laundering
- Money laundering is an illegal move used to hide the proceeds of illegal ventures.
- Moon
- A crypto asset is said to the moon when it experiences a sustained price increase.
- Moore’s Law
- Moore’s law states that computers’ speed and capability will increase every year, even as cost goes down.
- Moving Average Convergence Divergence (MACD)
- Moving Average Convergence Divergence (MACD) is a crypto trading indicator.
- Mt. Gox
- Mt. Gox is a crypto exchange that shut down in 2014, after a major hack.
- Multi-Signature (Multi-Sig)
- A multi-sig is extra layer security that requires multiple keys to authorize a transaction.
N
- Network
- Network refers to all the active nodes within a blockchain at a particular time.
- Newb
- A newb refers to a person new to a certain thing.
- Nick Szabo
- Nick Szabo is the inventor of Bit Gold and smart contracts.
- Nifty Gateway
- Nifty Gateway is an NFT platform.
- No-Coiner
- A no-coiner is someone who does not hold any cryptocurrency and does not believe in the success of cryptocurrencies.
- Node
- A node is the basic unit of a blockchain that stores information.
- Nominators
- Nominators are one of the two parties who use the nominated proof-of-stake (PoS) consensus algorithm.
- Non-Fungible-Token
- A non-fungible-token is a unit of data stored on the blockchain that shows the asset to be unique and unchangeable.
- Non-custodial
- A non-custodial refers to a setup where private keys are held by users themselves as against exchanges or wallets storing them.
- Nonce
- A nonce is an arbitrary number generated when a transaction is hashed by a miner. A nonce can only be used once.
O
- OKEx Chain
- OKEx Chain was created by OKEx exchange to improve the speed, safety, and confidentiality of the DeFi structure which is paramount to building a DEX. It uses the Tendermint consensus model, SDK, and IBC protocol from Cosmos to interoperate from chain to chain.
- OMG Network
- The decentralized OMG network was a solution created to improve the transaction speed and general scalability of the Ethereum network. It uses More Viable Plasma (MoreVP), a Layer-2 scaling tech to enhance the sending and receiving process of ETH and ERC-20. It is formerly known as OmiseGo and also has a tokenized coin called OMG.
- OXT
- OXT is a token coin owned by the Orchid crypto network. It aids the network’s blockchain community built on VPN. The Orchid blockchain enables its users to purchase bandwidth using OXT which is termed the probabilistic nano payment model. The network is a market platform that allows peer-to-peer transactions where users can buy bandwidth from Virtual Private Network providers.
- Observers
- Observers are unique nodes that store the history of a particular blockchain network. They are of two types: Light (stores details of the last two epochs) and Full (stores details of all transactions right from the inception of the network). They are not paid for their work.
- OceanDAO (Ocean Protocol)
- Ocean Decentralized Autonomous Organization is a grant proposal scheme governed by a community that enables OCEAN token users to have a say on funding grants for projects in the community. Its main goal is to completely decentralize the ecosystem of the Ocean protocol.
- Off-Chain
- Off-chain is any activity/transaction/mechanism that happens without observing the protocols of a blockchain community. It uses strategies that compliment on-chain protocols. For instance, a government body may vote to select the leadership body of a blockchain community using an off-chain protocol. Typically executed in a meeting/conference.
- Off-Chain Governance
- Off-Chain Governance is a form of off-chain mechanism based on prevailing global blockchain network (and other on-chain) parameters, and it is used in regulating the on-chain protocols and the entire blockchain network. It evolves periodically and helps to improve the ecosystem. Off-chain and on-chain governance both contribute to the growth of the blockchain community.
- Off-Ledger Currency
- Off-Ledger Currency is a currency used on a Ledger but was minted outside its protocol.
- Off-line storage
- Off-line storage is any device used to store crypto assets without an internet connection.
- Office of the Currency Comptroller
- Office of the Currency Comptroller is the United States Treasury branch that oversees all national and foreign financial institutions/agencies in the US.
- Offshore Account
- An Offshore Account is an account (bank, others) owned by an individual in a foreign country mostly to elude tax or protect asset(s). Using offshore financial services is legal, however, it is mostly used for illegal activities such as eluding taxes, money laundering, etc.
- On-Chain
- On-Chain refers to any activity/transaction/mechanism that happens by observing the protocol of a blockchain community. It is mostly done based on the computerized algorithm and cryptography codes of the blockchain network.
- On-Chain Data Availability (OCDA)
- On-Chain Data Availability (OCDA) is a hybrid storage system that enables users to either store their data on-chain or off-chain. When it is off, on-chain stores data at 2,025 transactions per second, and while on, off-chain mode stores data at about 16,400 transactions per second. The vibrant scalability solutions are called Volitions. It is a new feature included in the updated Loopring version 3.0.
- On-Chain Governance
- On-Chain Governance is a form of on-chain mechanism based on prevailing automated cryptographic algorithms and global blockchain network (and other on-chain) parameters. It is used to regulate the on-chain protocols and the entire blockchain network. It evolves periodically and helps to improve the ecosystem. Off-chain and on-chain governance both contribute to the growth of the blockchain community.
- On-Ledger Currency
- On-Ledger Currency is a currency was created and also used on the same Ledger such as Bitcoin.
- One Order cancels the Other
- “One Order cancels the Other” is a scenario where two crypto orders are placed at a time which results in one being accepted and the other rejected based on the existing rule.
- Online Storage
- An Online Storage is Crypto storage that works only when connected to the internet.
- Ontology Trust Anchor
- An Ontology Trust Anchor(trustor) is one of the three pillars in the three-tiered mechanism used by the Ontology blockchain to transparently verify its cryptographic and algorithmic data. The other two pillars are the “verifiers” and the “trustee”. A trustor can be a university, government body, bank, etc. with a part of the many-sided trust network of Ontology.
- Ontorand Consensus Engine (OCE)
- Ontorand Consensus Engine is the consensus model used by the Ontology blockchain. It was created by NEO inventors and centered on chain DNA. It uses the proof of stake and verifiable random function technology. OCE needs a low hashing rate and is highly scalable with its transaction verification speed as fast as the available internet speed.
- Open Finance
- Open finance is formed by incorporating blockchain-based apps into the banking system. The scheme was created to enhance the transparency, automatic, efficiency, and data-focused business activities of large companies, financial establishments, and central banks.Three things needed to create a strong open finance community are:A payment layer with numerous token coins.A data layer and enterprises that support the applications.Authorization of banks to use available data from trusted enterprises to build financial products.
- Open Representative Voting(ORV)
- ORV is a consensus model used by the Nano network. It allows Nano holders to delegate their assets to elect representative candidates of their choice. Elect representatives determines valid transactions and a new block is formed once a quorum is attained.
- Open Source
- Open source is a framework where users are licensed to modify, share, analyze the source code of computer software. Open-source software can be modified to perform other tasks rather than its intended purpose. This framework is mostly used in creating protocols of blockchain networks as it depicts the neutral, borderless, open, and unbiased elements of a typical cryptocurrency.
- Open price (open)
- Open is one of the basic four data points, OHLC(open, high, low, close) used daily in the local stock market. Trades occur during open hours(9 am to 4 pm) in a local stock market with no activities on weekends, hence there varying OHLC prices daily. Crypto market opens 24/7 having no OHLC price, however, they are on some charts to depict when the local stock market opened daily.
- OpenSea
- OpenSea is a peer-to-peer market platform where users buy, sell and auction various digital NFTs. On this platform, payments are made in ether(ETH).
- Opera Mainnet
- Opera mainnet creates decentralized apps for the Fantom network using an open-source format. It has numerous smart contract abilities that work together with Ethereum since they both support high-level programming language(solitude) and incorporation with EVM. It is backed by Asynchronous Byzantine Fault Tolerant.
- Operation Code (Opcode)
- An opcode is any low-level language programming instruction that humans can read. Ethereum Virtual Machine executes an opcode that has a set of unique 140 commands. For instance, EVM uses the opcode commands “POP” and “PUSH” to remove and add data respectively.
- Optimistic Rollup (OR)
- Optimistic Rollup (OR) is a Layer-2 scaling resolution that enables interoperability of Ethereum VM and Optimistic VM on Ethereum network to enhance the OR tech functions. The term shows how optimistic aggregators can avoid fraud cases while operating.
- Options Contract
- Options Contract is a form of contract which helps to execute a business deal of a particular security at the predetermined price and time. It is either purchased to guess the movement of a stock or sold to earn revenue. It is divided into two: a put and a call option. Put option obtained to benefit from a potential price fall of security while call option is bought to gain from a potential price rise of an asset.
- Options Market
- Options Market is an asset market platform where options contracts can be traded. It enables investors to trade with either put or call options on a particular asset.
- Oracle
- Oracles are bodies that provide a blockchain protocol with external practical information. The helps to exponentially protect, confirm and fortify the authenticity of the information received and used by a blockchain network which helps to strengthen the network. They can either be centralized or decentralized. They give the DeFi segment the price and news feed required to run decentralized smart contracts.
- Orchestrator
- An Orchestrator sets up the computational facilities on a Live peer network and also handles the sharing and proper transcoding of videos.
- Orchid Blockchain Protocol
- Orchid Blockchain Protocol is a market platform where trades are conducted among VPN service providers and their users. It enables off-chain bandwidth purchase with no gas fee or network congestion. Payment is made with OXT (Orchid’s native coin).
- Order Book
- Each security/asset exchange firm has its electronic record of buy and sees orders grouped by price, this record is known as the Order book. It records assets/shares that are sold or purchased and their price tags sequentially. It has two segments: the sell list (red) and the buy list (green). It can only be accessed online on an exchange’s platform.
- Order Ring
- This is a step used by ring miners to execute an order via Loopring smart contract. if the order was completed, there will be an atomic swap, if not, ring sharing would occur. It aids ring-matching and also separates Loopring policy from similar decentralized schemes such as IDEX, Waves, etc.
- Order Slicing
- The order slicing scheme is implemented by official investors whereby they purchase or sell large quantities of a particular asset in bits to avoid high price instability and secrecy. It is done using an order book and it helps to safeguard investment resources.
- Order and Execution Management System (OEMs)
- Order and Execution Management System (OEMs) are a software sector created by Caspian. Institutional investors can get the tools needed to manage their portfolios and trade innovatively.
- Orphan Block
- When a blockchain network mined two blocks simultaneously, only one is accepted and the one rejected, because of lag time, is the orphan/stale block. Consequently, it leads to soft work which means the network’s nodes would be upgraded hence, isolating the stale block. An orphan block is a valid block. However, it is useless because it is isolated from the original blockchain.
- Ouroboros Praos
- Ouroboros Praos is a consensus model which works on the proof of stake protocol. It was created by the IOHK group (the Cardano Network builders). Its innovative process helps to prevent fraudulent acts of any malicious actor in a semi-synchronous community. It is known to be an exceedingly safe, scalable, and inventive scheme that can be used to create a blockchain-based on the proof of stake protocol.
- Over-Optimization
- Over-optimization happens in a condition whereby a computerized system is used to build an algorithm for trading that is functional theoretically but failed to perform as expected when applied to a practical market trading situation. This situation often happens if the trading algorithm built is too sophisticated for the computer to comprehend or handle which causes the computational system to be overloaded.
- Over-the-Counter (OTC) Trading
- An over-the-counter trading scheme is a peer-to-peer third-party protection solution. Trade is done over the counter if the process to buy or sell an asset is carried out via a broker-dealer venture without the use of a centralized exchange (CEX) platform. A huge number of assets are purchased at over-the-counter desks to hasten transaction processes as well as reduce charges. The process helps to secure purchased assets and also helps to improve transparency. Securities and assets that are not listed on normal cryptocurrency exchanges can also be traded over OTC desks.
- Overbought
- When an asset is traded at a price that is higher than its supposed worth, such asset is said to be overbought and the current price is sometimes expected to decline soon. However, most times, such price refuses to fall or decline as the price situation may persist for a long while, hence price does not instantly decrease in a short-term scenario. An overbought or oversold asset can be detected by technical indicators. It involves analyzing various metrics like the trading vol., Bollinger Bands, etc.
- Oversold
- When an asset is traded at a price that is lower than its supposed worth, such asset is said to be oversold and the current price is sometimes expected to puff up soon. However, most times, such price refuses to rise or increase as the price situation may persist for a long while, hence price does not instantly increase in a short-term scenario. An overbought or oversold asset can be detected by technical indicators. It involves analyzing various metrics like the trading vol., Bollinger Bands, etc.
P
- PAX Gold (PAXG)
- PAX Gold (PAXG) is an ERC-20 stablecoin which is an enhanced method of buying gold. Each PAX Gold asset is pegged on a 1:1 ratio to one troy ounce out of a 400-ounce London Good Delivery gold bar that is stored in Brinks Security vaults in London.
- Paper Wallet
- A paper wallet is an obsolete off-chain paper-like material that holds a user’s private and public keys and wallet address. It was used when Bitcoin was first created, now replaced by hardware and software wallets.
- Parachain
- Parachains are independent blockchains that connect to the main relay chain. They are created by the Polkadot network and are used on Polkadot and Kusama Networks’ main relay chains.
- Parachain Slot
- A parachain slot refers to a port-like spot that connects a parachain to a Relay Chain of a Network (Polkadot or Kusama). The slots are limited relative to available teams. 100-parachain masters are selected after a successful auction.
- Parachain Slot Auction
- A parachain slot auction refers to how several teams are selected to be parachain masters within 6-24 months. Potential parachains compete by staking KSM or DOT in a validator node on Kasuma or Polkadot network respectively.
- Parallel Augur (ParaAug)
- Parallel Augur allows users to use 2 different interfaces ( one interface for ETH and the other for DAI) for Decentralized finance and prediction market via the Augur network.
- Parallel Processing or Parallelization
- Parallelization is used to simultaneously process multiple computations in parallel order. It helps to hasten the transaction process and improve the scalability of a network.
- Parent Chain
- Parent chain refers to the first-layer chain that maintains the consensus protocol of a network and also allows smaller blockchains to run on it.
- Parity Technologies
- Parity Technologies is a blockchain firm that creates decentralized computing apps that enhances the scalability, security, and interoperability for the future generation of decentralized services for NGOs, big firms, consortiums, etc.
- Participation Node
- Participation nodes are an important component that runs the Pure Proof of Stake consensus model on the Algorand blockchain network. Some users form participation nodes by staking ALGO and generating participation keys.
- Passive Yield
- Passive yield is any revenue realized from an investment that is mostly on a long-term basis. cryptocurrency investors yield passive income when they purchase crypto-assets and earn interest on them over time.
- Passphrase
- A passphrase is a password in the form unique word sequence used in accessing a certain device, system, or account. They are individual coherent words hence, it is easier to remember and increases the level of security if used properly.
- Password Manager
- A password manager is an online program that stores and manages a user’s passwords. It can also generate and retrieve complex passwords.
- Path
- A path is a blockchain term that refers to a chain of trades on order book on Stellar’s decentralized exchange.
- Path Payment
- Path Payment is a payment done in currency but delivered in another currency. it is processed by a decentralized exchange on the Stellar Network. They are atomic and help to prevent issues whereby consumers receive assets they did not order for.
- Pattern Day Trading
- A pattern day trader executes more than four margin trades per day during five consecutive business days. The PDT designation places specific limits on trading for a trader to remain compliant with NYSE regulations.
- Paxos Standard (PAX)
- Paxos Standard (PAX) is an ERC-20 stablecoin that is pegged at a 1:1 ratio to the US dollar and supported by proven reserves of US dollars.it enables users to use Paxos Standard financial services such as firm brokerage and settlement for institutions.
- Payment Rail
- A payment rail is a virtual device that transfers money without utilizing a bank account. It has two components, the near side which is the sender, and the far side which is the anonymous receiver. It is used on several FinTech firms such as Mastercard, Paypal, and Visa, etc.
- Peer to Peer (P2P)
- A peer-to-peer (P2P) blockchain network is a decentralized scheme designed to benefit all entities involved in a transaction. It works by enabling several nodes to interoperate thereby creating a platform that allows important data to be transferred across.
- Peer-to-Peer (P2P) Lending
- P2P lending allows an individual or business organization to borrow money, crypto, and other assets via a distributed online service platform that merges borrowers and lenders. Rates are cheap and more transparent.
- Peer-to-Peer (P2P) Marketplace
- A P2P marketplace is a decentralized blockchain platform that connects buyers with sellers to create an open, global, computational marketplace that benefits all parties involved.
- Peer-to-Peer (P2P) Trading
- P2P trading is a low-risk, decentralized trade via a decentralized exchange or crypto wallet, that involves two or more networks. It reduces transaction fees by excluding the middleman. However, it lacks popularity due to a lack of liquidity and a small overall user base.
- Peg
- Peg is a strategy for holding the value of two crypto-assets on an equal basis (1:1). It allows investors to purchase or sell assets peg to their native assets at the same value eg. The BEP2 Binance Chain version of bitcoin is pegged to Bitcoin.
- Peg-Zone
- A peg-zone is a finality device used by the Cosmos community to interoperate with blockchain networks like BTC and ETH. Peg-zone uses a 2-way peg, meaning that assets can be sent between chains in both directions.
- Permaweb
- The permaweb is a human-readable program that enables users to access the list of websites and dApps on the Arweave network. It can be accessed online through web browsers.
- Permissioned Ledger (Permissioned Blockchain)
- A permissioned ledger or a permissioned blockchain is a ledger that has an additional security protocol, hence it is only accessible by a selected few who has the specialized key.
- Permissionless Innovation
- Permissionless innovation is any blockchain-based network that does not require any permission to perform any transaction. Open public blockchains are mainly permissionless, while closed private blockchain systems are permissioned.
- Permissionless Ledger (Permissionless Blockchain)
- A permissionless ledger or permissionless blockchain refers to any ledger that is decentralized and open to the public. It uses the peer-to-peer protocol.
- Perpetual Swap
- A perpetual swap ( perpetual futures contract) enables investors to purchase or sell any asset at any point in time. It is traded with cash and has no expiry date.
- Phishing
- Phishing is an email scamming technique used by cybercriminals to deceive victims to extract personal data by sending them to a cloned or third-party site. Cryptocurrency hackers often lure victims to click on a suspicious link in other to perform a task. Learn more.
- Phishing
- A phishing attack refers to a common technological attack used in obtaining delicate data from an unsuspecting victim. It is carried out by scammers impersonating trustworthy entities like co-workers or institutions of authority to get access to accounts. It is more like a confidence trick rather than a hack.
- Physical Bitcoins
- Physical bitcoins are metals designed like bitcoins with hidden private keys under a tamper-proof sticker or hologram. They are bought pre-loaded with a particular cryptocurrency value. They once redeemed, cannot be re-used.
- Plaintext
- Plaintext refers to an unformatted text that can be understood or interpreted by an individual or computer-based software system. Plaintext processed over the internet should have an additional security layer to stay confidential. When encrypted, it becomes a ciphertext, which is encrypted data that is unreadable.
- Plasma Chain
- A plasma chain is an off-chain, Layer-2 scaling solution. It refers to a particular kind of non-custodial sidechain that enables users to withdraw their funds and revert to the mainchain in case of errors or security infringements.
- Platform
- A blockchain platform usually refers to any type of decentralized blockchain network that can be used to build and operate applications or other related technology. The platform is one of many terms that can be used to refer to a blockchain network protocol.
- Platform-as-a-Service
- Platform-as-a-Service (PaaS) is an easy and effective method for users to build and operate cloud-based apps individually without the aid of any software engineer. Its cloud computing can be designed for different types of computer network systems, including for use with distributed blockchain cloud computing solutions.
- Plutus
- Plutus smart contracts have both off-chain and on-chain computerized codes which run on the user’s device and the Cardano blockchain platform respectively. They are written in the Programming language Haskell by the Cardano blockchain network and IOHK.
- Point of Sale (POS)
- Point of sale is the physical or virtual location of a user’s purchase of an item. It can also refer to the physical, stationery, electronic point-of-sale device used for online and physical transactions.
- Polkadot
- Polkadot is a distributed blockchain network that enables independent blockchain networks to connect and share data via cross-chain interoperable technology. Polkadot was founded by Dr. Gavin Wood. Its native asset is DOT which is used to sign, send, and receive transactions.
- Polkadot Relay Chain
- The Relay Chain is the basic protocol and most important part of the Polkadot network. It maintains the proper functioning of the network with the aid of a hybrid GRANDPA and BABE Nominated Proof-of-Stake (NPoS) consensus mechanism.
- Polygon Matic
- Polygon Matic is a protocol and framework for connecting Ethereum compatible blockchain networks. It combines the best of Ethereum and other blockchains. Built by developers and for developers, it is inherently more secure, open, and powerful.
- Ponzi Scheme
- A Ponzi scheme refers to a fraudulent investment or deception where potential victims are promised high return rates for the minimal risk taken. It often uses funds from new members to offer profit to earlier investors. It crashes when funds stop coming in.
- PoolTogether
- PoolTogether is a decentralized open-source blockchain protocol that uses no-loss prize pools” that help developers do passively gain revenue via lending out assets deposited by users and in turn rewards users who deposited with prizes.
- Portfolio
- An investment portfolio is a compilation of different financial properties such as cryptocurrencies, stocks, etc. Diversification, risk tolerance, and time parameters are important factors when compiling and adjusting a portfolio. It can be managed by the owner or a financial advisor.
- Portfolio Manager
- A portfolio manager refers to a person or group of people that manage investments for a prospect. They function to reduce risk, affect investment methods and manage daily transactions for various investments.
- Position Management System (PMS)
- A Position Management System refers to an algorithmic portfolio created by Caspian, to help customers oversee their trading positions on multiple exchanges and wallets, monitor real-time and historical P&L data, etc that improve the trading and investment process.
- Position Trading
- Position trading is a long-term investment strategy that allows position traders to hold an asset for several months and years and value sustained growth. Position trading is also known ass holding, or “HODL” in blockchain terms.
- Post-Mine
- Post-mining is an activity of mining new coins after a blockchain project has been deployed but before public mining is done. Post-mining happens between the tokenization snapshot date but before the platform’s code has been executed and outsiders can mine tokens.
- Practical Byzantine Fault Tolerance (pBFT)
- pBFT refers to a consensus means used in solving the Byzantine problems that occur in decentralized networks. It helps to conserve consensus on different decentralized computer systems and blockchain platforms.
- Pre-Mine
- Pre-mining is a practice that creates a specific number of coins for a blockchain project before a public sale occurs, often awarding them to the developers and founders of the project.
- Pre-Sale
- A pre-sale is held by some blockchain enterprises after the private sale has been completed, but before the public sale, whereby a specific allocation of coins is sold to prospective investors.
- Prediction Market
- A prediction market is a platform where spectators practically bet on their determined expectation for a particular event, data set, or desired outcome with prices trade between 0 and 100%. It can also involve betting on the future outcome of events via derivatives trading with high leverage.
- Predictive Algorithm
- Predictive algorithm analytics is a software-based methodology that uses data mining, machine learning, and predictive modeling technology to analyze the impact of current data on future outcomes.
- Pretexting
- Pretexting refers to a fraudulent activity whereby an attacker impersonates a trusted figure like a bank official to defraud or manipulate victims into sharing sensitive information or capital.
- Price Discovery
- Price discovery is the process of determining the accurate price of an asset in the marketplace. This process is often used in the options and futures markets, or when an asset or class is new.
- Price Movement (Price Action)
- Price movement refers to the occurrence of a change in price over time for a particular asset in the market. Price action forms the foundational basis for market trading and charting interfaces.
- Price-to-Earnings Ratio (P/E Ratio)
- The P/E ratio is the ratio of a company’s share cost relative to the company’s per-share income. It is used to determine the relative value of a company’s shares, and if the share price is overvalued or undervalued. It is a key tool for basic critics defining an asset’s inherent value.
- Primary Market
- The primary market is the part of the capital market that issues and sells equity-based securities directly by the issuer for the first time via Initial Public Offerings (IPOs), private placements, preferred allotments, and rights issuances.
- Primary Network (Avalanche)
- The Primary Network is a subnetwork that helps to secure, validate and improve the functions of the Exchange chain (X-chain), Contract chain (C-chain), and Platform Chain (P-chain) on the Avalanche network.
- Prime Rate
- The prime rate is the interest rate central. The federal funds rate is the source of the prime rate, while the prime rate serves as the starting point for most retail bank interest rates, including for mortgages, personal loans, and small business loans.
- Principal
- The term principal refers to the original sum of money collected in a loan agreement. For example: If a borrower takes out a $500,000 mortgage, the principal is $500,000.
- Principal-Agent Dilemma
- The principal-agent dilemma is a dispute in preferences found between a person, or group (principal) and a party who has been authorized to act on their behalf (agent).
- Privacy Coin
- A privacy coin refers to a blockchain protocol that improves privacy by hiding the details of a transaction and its network protocol. Monero and Zcash platforms make use of this tech.
- Private Blockchain
- A private blockchain system is a decentralized network that is run by a single entity and used by large firms to solve speed and scalability issues. They are centralized.
- Private Key (symmetric cryptography)
- Private-key cryptography is a specialized cryptographic system that utilizes pairs of lengthy alphanumeric keys that only function when used in tandem. Private keys are to be known only by their owner and grant access to funds.
- Private Sale
- A private sale is the first round of funding that is allocated to a blockchain startup before the pre-sale and public sale (ICO). It helps to give large institutional investors the chance to invest large amounts of capital to fund the development of projects early on.
- Probabilistic Nanopayment
- A probabilistic nanopayment is a specialized payment means used on the Orchid blockchain platform. It improves the network speed and transparency and also reduces costs.
- Profit and Loss (P&L)
- Profit and Loss (P&L) is a macro-level measurement of how much capital has been gained or lost through trading for an individual or institution. P&L is an important data point for institutional investment firms.
- Profit and Loss (P&L) Statement
- A profit and loss (P&L) statement is a financial statement that summarizes revenue, expenses, and costs for a specific period. It is one of 3 main financial statements that a company issues regularly (the other 2 are a balance sheet and cash flow statement).
- Programmability/Programmable
- Programmability is the ability for a computerized system to be created through the process of software development via various types of programming languages. Programmable blockchain networks are more cost-effective, secure, and easily accessible.
- Proof of Access (PoA)
- PoA is the consensus mechanism aimed at incentivizing long-term data storage because miners must access older, random blocks from the blockweaves history to mine new blocks and receive mining rewards.
- Proof of Authority (PoA)
- Proof of Authority is a consensus mechanism that leverages the value of identity and reputation instead of cryptographic assets or computational power. It has a limited number of nodes to verify transactions and remarkable scalability and transaction speeds.
- Proof of Burn (PoB)
- Through the Proof-of-Burn consensus mechanism, miners intentionally burn tokens to obtain a balanced right to mine new blocks and verify transactions. The more tokens a miner burns, the higher the chance that the miner will be selected as the next block validator.
- Proof of Capacity (PoC)
- Proof of Capacity is a consensus mechanism that makes use of the available hard drive space in a miners device to decide its mining rights and validate transactions rather than expending computational power.
- Proof of Contribution (PoC/PoCo)
- Proof of Contribution is a consensus mechanism that is based on user contributions to the network. The node that has the highest contribution value in each round is given the right to generate the next block.
- Proof of Coverage (PoC)
- Proof of Coverage is a consensus mechanism employed by the Helium Network. It relies on mining to achieve network consensus and miners are known as Hotspots.
- Proof of Goods and Services Delivered
- This mechanism is used by payment merchants and customers to confirm the legitimacy of the payment process and ensure transparency.
- Proof of History (PoH)
- Proof of History is a consensus methodology on the Solana blockchain that incorporates the measurement of time into a blockchain ledger with the intent of scaling and streamlining transactional throughput.
- Proof of Importance (PoI)
- Proof of Importance is an innovative consensus algorithm developed by the NEM blockchain protocol and is a variation of Proof of Stake. It allows numerous users to participate in the addition of new blocks in exchange for receiving tokenized rewards.
- Proof of Replication (PoRep)
- Proof of Replication is a consensus algorithm used to verify the productivity status of participants on the Filecoin network via the zk-SNARK cryptographic proof technology.
- Proof of Service (Holochain)
- Proof of Service is a rare consensus mechanism that is used on certain blockchain protocols like Holochain. It is created to ensure that once a p2p transaction is completed, then the agent providing the service automatically issues an invoice and receives payment.
- Proof of Service (PoSe)
- Proof of Service is the mechanism on the DASH blockchain network used to determine if a stake-bearing master node is providing the correct services in good faith to users who have contributed coins to it.
- Proof of Spacetime (PoSpacetime)
- Proof of Space-time is a consensus mechanism utilized by the Filecoin network to prove its capacity by cryptographically verifying that the whole file is stored in an unaltered fashion for a predetermined time frame.
- Proof of Stake (PoS)
- Proof of Stake networks rewards participants to stake native coins in a network of validator nodes. It has high transaction scalability, speed, transparency and it is energy-efficient as compared with PoW.
- Proof of Storage (PoStorage)
- Proof of Storage is a consensus algorithm used to verify the productivity status of participants on the Filecoin network via the zk-SNARK cryptographic proof technology.
- Proof of Validation (PoV)
- Proof of Validation is a unique Proof-of-Stake consensus mechanism that works to achieve consensus by evaluating the stake of validator nodes.
- Proof of Work (PoW)
- Proof of Work is a blockchain consensus mechanism that uses the mining process to maintain the network. It is decentralized and secure however it has low scalability, speed, and high energy consumption.
- Prospectus
- A prospectus is a formal disclosure document that describes an investment offering to potential buyers. It is often shared by underwriters and brokerages to potential buyers who may buy security via an Initial Public Offering (IPO).
- Protocol
- Blockchain protocol refers to a particular blockchain network like the Bitcoin protocol. A protocol can also mean a set of rules that defines transactions on a blockchain network that involve consensus, network participation, and transaction verification.
- Protocol Buffers (Protobuf)
- Protocol Buffers is a Google-based methodology built to serialize structured data. It enables different database networks to incorporate the use of more software programming languages to be more adaptable as their capabilities expand.
- Provenance
- Provenance is the historical record of ownership of any tangible or intangible asset. Open public blockchain systems use an optimal structure to track the provenance of assets due to their decentralized components.
- Pseudo-Anonymity (Pseudonymity)
- Pseudo-anonymity is used to describe a hidden user with a concealed identity. A pseudonymous person uses a fake name to conceal their true identity.
- Public Address
- A public address is a shortened form of a public cryptographic key. It is used to receive transactions through a blockchain network protocol and it is commonly used instead of a public key.
- Public Blockchain
- A public blockchain is a distributed system that is open for general use, that is permission is needed before accessing networks based on a public blockchain.
- Public Key
- A public key allows you to receive cryptocurrency transactions. It is a cryptographic code that is paired to a private key. It can be shared with the public. The public key that can receive transactions is usually an address ( shortened form of the public key).
- Public Ledger
- A public ledger is a decentralized database that holds records of transactions and other important details of a blockchain network.
- Public Representative Node (P-Rep)
- A Public Representative Node is the most significant node on the ICON Network. It validates networks, creates blocks, and performs other important functions on the network.
- Public Sale or Initial Coin Offering (ICO)
- A public sale is the third funding round that a blockchain startup offers after the private sale and pre-sale rounds. To participate in public sales, the Retail & large investors and the entire public have to register and provide the valid Know Your Customer (KYC) identification details.
- Public-Key Cryptography (asymmetric cryptography)
- Public-key cryptography means a cryptographic system that uses pairs of long alphanumeric keys that work together in a pair: public keys, which can be shared, and private keys, only known by the owner. It is also coupled with a private key to spend cryptocurrencies.
- Public-Key Infrastructure
- Public-key infrastructure is a set of policies, procedures, and hardware-software combinations required for the online authentication of users and devices. It helps to create, manage, share, utilize and save the virtual certificate and manage public-key encryption.
- Pump and Dump (P&D)
- A pump and dump scheme occurs in crypto markets when a whale buys a large number of specific crypto assets with a large sum of money to drastically increase the price before selling after a substantial profit.
- Pure Proof of Stake (PPoS)
- The Pure proof of stake refers to the decentralized Byzantine Agreement protocol on the Algorand network. It has a little entry barrier as only 1 ALGO is needed to own a node. It aims at processing transactions quickly.
- Put Option
- A put option contract enables investors to sell a specified crypto asset or security at a certain price and period. When it expires the investor can either sell the asset or allow the contract value to depreciate.
Q
- Qtum
- Qtum is a form of the bitcoin blockchain that works on the proof of stake consensus mechanism. Its unspent transaction output (UTXO) model is enhanced to use smart contracts. It can work with Ethereum (and other) Virtual Machines.
- Qualitative Analysis
- Qualitative analysis uses subjective judgment to analyze an enterprise’s value or potential long-term growth based on non-quantifiable information like management expertise, research, and development, industry cycles, etc.
- Quant Zone
- Quant Zone is a tool used to design programmed rules for executing automated trading protocols on the FTX crypto exchange. Quant Zone rules can be created and shared by and among users.
- Quantitative Analysis
- Quantitative Analysis uses maths and statistics samples to analyze behavior. It helps to predict the prices of stocks, digital assets, and other financial assets. It helps to analyze changes in the GDP of countries and also to compile financial data sets.
- Quantum Computing
- Quantum computing refers to an enhanced theoretical computing system that processes data faster and more efficiently than local computing systems. It uses superposition, entanglement, and other quantum states.
- Query
- The query is a public or private request for specific data collection via a database or a computing system used by firms, governments, and retail users. They are executed via a graphical querying platform or decentralized indexing.
- Quick Response Code (QR Code)
- QR code is a matrix barcode that contains vital info about the attached object in an optically machine-readable label. These codes have trackers that lead to mobile apps or websites. They store data via the 4 standard coding methods which are numeric, alphanumeric, kanji, binary.
- Quorum (Governance)
- Quorum is the least number of members needed to perform business in a particular group. In a platform, there is a minimum number of tokens needed to validate a vote, and the more the voters the more legitimate the vote.
R
- RARI
- RARI is an ERC-20 token of the Rarible network. It enables its users to determine the governance structure of the network.
- REKT
- REKT is a slang used in the crypto world that means “wrecked”, destroyed, ruined. It is used for an investor who lost a large sum of capital from a recent transaction or investment.
- RVN
- RVN is a source code fork of BTC owned by the Ravecoin Blockchain. The token is based on the proof of work consensus mechanism.
- Race Attack
- A race attack is a fraudulent act that occurs when a dubious actor runs two transactions rapidly in succession and then terminates one while the other is being confirmed, hence getting the good/service and also the supposed payment back.
- Radio Frequency Identification (RFID)
- Radio Frequency Identification (RFID) is an electromagnetic mechanism used in tracking and authenticating objects, it is powered by the VechainThor blockchain network. An RFID tag has a radio transponder, transmitter, and receiver. It shows the location of the item it is attached to via an RFID device reader.
- Raiden Network
- Raiden network refers to an off-chain solution aimed at solving Ethereum blockchain’s scalability issues by improving transaction speed and reducing its gas fee.
- Random Beacon (Keep Network)
- Random Beacon is a blockchain-built device that generates random numbers used by the KEEP blockchain network to select transaction signers (they create new bitcoin pairs of keys used in creating tBTC tokens). The randomness improves safety.
- Random-Access Memory (RAM)
- Random-Access Memory (RAM) is a readable computer memory that can be modified to store a specified data or machine code.
- Rank
- Rank is the relative position of a cryptocurrency by market capitalization.
- Ransomware
- A ransomware is malware that of denies computer users access to their devices and also leaks sensitive/personal data. Ransomware attacks are launched by fraudsters to blackmail their victims into exchanging their crypto assets with the restoration of what was hijacked.
- Ransomware as a Service (RaaS)
- Ransomware as a Service (RaaS) is a ransomware software program services are offered by dubious cybercriminal experts to other online criminals who want to attack potential victims. They are advertised on dark web marketplaces and payments are in cryptocurrencies.
- RaptorQ
- RaptorQ is a coding mechanism used in separating data into encoded/decoded bits for safe and secured transmission. It ensures high recoverability success of lost/corrupted data.
- Rarible
- Rarible is a renowned peer-to-peer exchange platform for a wide variety of Non-Fungible Tokens. Payments are in form of ETH.
- Ravencoin
- Ravecoin is a source code fork of BTC owned by the RVN. The token is based on the proof of work consensus mechanism.
- Real Estate Investment Trust (REIT)
- Real Estate Investment Trust (REIT) is a firm that runs real estate for revenue generation purposes. It usually uses capital from investors for its operations, hence a purchaser can financially benefit without owning any property.
- Rebase Currency (Price-Elastic Currency)
- A rebase currency like Ampleforth (AMPL) is a cryptocurrency whose price fluctuations determine whether its quantity in circulation would increase or decrease. Both stable coins and rebase coins have similar rebalancing protocols but different functions.
- Recall Block
- The recall block is the first block in the history of the Arweave protocol which must be presented by miners to create a new block in the network. It is linked together with the new block and the preceding one.
- Receipt Paradigm
- A receipt paradigm is an innovation of Ethereum 2.0 Beacon Chain which uses a shard chain to produce receipts for its transactions. It aimed at increasing the rate of DeFi apps usage on the Ethereum platform.
- Reciprocally Analogous Virtual Machine (VM)
- A reciprocally analogous VM enables two or more Virtual machines to interoperate beneficially. A virtual machine is a virtual device that can mimic a computer system/OS/software application.
- Recovery Phrase (Mnemonic Phrase)
- Recovery Phrase (Mnemonic Phrase) is any of the 24,18 or 12-word phrase models used to gain access to a lost cryptocurrency wallet/linked private key. It is also known as the recovery seed phrase or seed phrase.
- Recovery Share
- Recovery Share is a form of security whereby users designate the numbers of shares to be produced as well as the percent needed to renew a wallet as well as its public/private keys. This mechanism makes wallet renewal processes easier and it is also safe and secure.
- Recurring Buy
- Recurring Buy is when an investor deposits an amount of capital to purchase a particular digital asset or multiple assets periodically, using an exchange or a stockbroker as leverages, such a phenomenon is termed as a recurring buy.
- Regulated
- When something is governed or controlled by a particular set of rules, it is said to be regulated.
- Regulation T (Reg. T)
- In 1974, the Federal Reserve Board introduced the Regulation T protocol to minimize risks involved in securities trades. Regulation T contains a set of rules that controls risks in leverage trading as well as minimizes the buying prowess of traders.
- Regulatory Compliance
- Regulatory compliance is a way government bodies like (SEC) ensure certain enterprises obey specified guidelines. The act is mainly to protect the rights of investors and to ensure all transactions are transparent, efficient, and fair.
- Rehypothecation
- Rehypothecation is the situation where brokers, exchanges, banks, or other financial organizations use their customers’ assets to fund a personal project which is beneficial to both parties. Clients are given incentives as rewards. Examples are BlockFi, Binance, Huobi, etc.
- Relative Strength Index (RSI)
- The relative strength index is an investment metric used in calculating whether an asset is oversold or overbought. The technical analytic device is like a line graph or oscillator that moves up or down on a scale of 0 to 100. When it reads 70 and above, the asset is overbought while 30 and below means oversold.
- Relay Node
- Relay nodes are used to connect two or more nodes on the Algorand platform. They are mainly accessed online to help reduce the propagation time.
- Relayer (0x)
- Relayers are users who handle off-chain order books on the 0x decentralized exchange. Their main function is to oversee list, sell and buy orders as well as to deduct transaction charges.
- Release to Manufacturing (RTM) Version
- Release to Manufacturing (RTM) Version is the last version in a sequence of a particular software released, it comes after the pre-alpha, alpha, beta, and release candidate versions. It usually precedes the general availability (GA) version is released to the public, while the golden master build (GM) is typically the final build of the software.
- Remittance
- A remittance simply refers to a payment made online via a service provider, cryptocurrency wallet, or other tech-enabled financial. Blockchain-based remittance medium is faster and more cost-effective than other means.
- Remittance Network
- A remittance network is a Financial intermediary between customers and their contacts that process and validates remittance payments which are sent both domestically and abroad. Examples are PayPal, Western Union, etc. Blockchain-enabled payment networks are fast and cost-effective.
- Remix
- Remix refers to an online integrated development environment that uses a Solidity programming language to write Ethereum smart contracts. It helps developers to easily write or test a code via its graphic user display and other helpful tools.
- Remote File Inclusion (RFI)
- Remote File Inclusion (RFI) is an attack that uses the referencing function in an application to upload malware from a remote location using a different domain instead of accessing a file on a local webserver to target vulnerabilities in web applications. It is used to leak data, change servers, and modify the content of an application.
- Remote Procedure Call (RPC)
- A remote procedure call occurs when a computer uses a program to execute a procedure on another computer through a discrete address space. This is done via coding or by leveraging location transparency to exclude details on the remote interaction.
- Ren (REN)
- The Ren Network allows interoperability between various Decentralized Finance protocols. It uses a multiple-party computation algorithm consensus mechanism that allows it to lock assets on-chain and mint them independently. The Ren Dark Nodes run the network and payments are made in REN.
- Repair Miners
- Repair miners are upcoming mining nodes in the Filecoin network aimed at self-healing the network’s protocol.
- Replace by Fee
- Replace by fee refers to a Bitcoin protocol that uses a transaction with a higher fee to replace an initially unconfirmed transaction stored in then mempool. It helps to minimize network congestion however, it can alter the immutability of the transactions involved.
- Replay Attack
- Replay Attack is an attack launched to intercept comms between a sender and a receiver with the sole purpose of leaking sensitive info.
- Replicated Ledger
- Replicated Ledger is a duplicate of a decentralized ledger sent to all members of a cryptocurrency network.
- Reporting
- Reporting in institutional investment refers to the medium of compiling information and data used in monitoring a portfolio’s productivity. It is used to analyze both long/short trading terms. Specialized reporting tools allow investment firms to analyze profit & loss data, execution data, position size, entry type, exposure, etc.
- Reserve (RSV) Stablecoin
- Reserve Stablecoin is a token that aids the reserved protocol to operate efficiently. It is a digital representation of a fiat currency or other assets. It works via confirmable cryptography while operating smart contracts on the Reserve protocol network. RSV is a 1:1 ratio with US dollars.
- Reserve Rights (RSR) Token
- Reserve Right Token is a governance token that determines the efficiency of the Reserve protocol operations. It has high price volatility that investors used in analyzing the overall worth of the network. It also plays an important part in maintaining the Reserve protocol’s integrity.
- Resharding
- Sharding aka horizontal partitioning helps to split a network into multiple databases. Resharding is a way of adjusting to network demands by resetting the number of shards contained in a data stream. It helps to improve the data transmission process and can be used on both decentralized and centralized networks.
- Resistance
- Resistance is the maximum price of a particular asset in a period.
- Retail Investor
- A retail investor is an investor who trades in cryptocurrencies, securities, etc, on offline or online platforms through an exchange or a broker. Retail investors are non-professional and deals in securities and other investment assets for personal gains.
- Retargeting
- Retargeting is an algorithm used on PoW blockchains like BTC. It is also known as a difficulty adjustment algorithm.
- Retrieval Miner
- Retrieval miners are one of the 3 benefactors and key components of the Filecoin network. They serve data in the retrieval market which is off-chain and they are rewarded with tokens.
- Return on Assets (ROA)
- Return on Assets Is a mechanism used by firms to analyze how prolific their assets are. It is the percentage of a firm’s net income divided by its total number of assets. It also considers the debt level of the firm. Unlike ROE.
- Return on Investment (ROI)
- Return on Investment (ROI) is a metric that compares an investment firm’s current value with its initial cost to determine its productivity and performance over time. It is calculated in percentage using the formula: ROI = (Current Value of Investment – Cost of Investment) / Cost of Investment.
- Revenue Participation Tokens
- Revenue Participation tokens are a pair of token protocols that use one for participation and the other for payout.
- Reverse Indicator
- Reverse Indicator is a person who is always wrong at predicting price directions of crypto-assets such that you can use these predictions as a guide on how not to purchase or sell orders.
- Ride
- The ride is an advanced programming language that uses dApp scripts, account scripts, and asset scripts to create smart contracts and decentralized applications on the Waves blockchain network. Hence, an account or asset with a script becomes a smart account or asset.
- Ring Miner
- Ring miners fill orders before they are validated or terminated on the Loopring network. They use a method that bypasses general order books and the AMM mechanisms governing liquidity pools.
- Ring Signature
- With the right cryptographic keys, users can transact secretly on a particular network by concealing their digital signature. Ring signature depicts the signature algorithm’s ring-like structure. It was invented by the Monero network in 2015.
- RingCTs (Confidential Transaction)
- Ring Confidential Transactions is a strategy that keeps the amount involved in a transaction as well as the details of receiving and sending addresses hidden. The Monero network has been using it to retain the anonymity of transactions since 2017.
- Rinkeby
- Rinkeby refers to a platform used by Ethereum to test smart contracts, network structure, and other potential features of the Ethereum 2.0 Beacon Chain. It uses a Proof of Authority (POA) consensus model that enables few nodes to mine blocks.
- Ripple Gateway
- Ripple Gateway is a platform where users trade their funds for Ripple IOUs and an entrance into the Ripple network. It enables users to perform transactions and it also secures all transactions and funds.
- Risk Curve
- The risk curve graphically shows the relationship between the risk taken (x-axis) and the expected return (y-axis) in an investment. It implies that the greater the risk the greater the returns in an investment. It involves multi-data points that stand for distinct assets.
- Risk Management System (RMS)
- The Risk management system invented by Caspian is used by investors to analyze all risk parameters and thereby help them to make a better choice when trading or investing.
- Roadmap
- A roadmap is a blockchain term that refers to a pre-planned proposal to execute a long- and short-term agenda over a calculated period. It is an important component to consider before investing in a project.
- Rococo Relay Chain
- The Rococo relay chain runs the Kusama eco-system. It aids interoperability among internal parachains and other blockchain communities. It also helps to examine the optimization and deployment of parachains.
- Roger Ver
- Roger Ver is also known as Bitcoin Jesus is a long-term supporter of Bitcoin and bitcoin cash.
- Roll-Up
- Roll-up is an off-chain collection and processing of Ethereum’s smart contract transactions. It helps to reduce gas fees. It does not solve scalability issues but solves throughput problems.
- Ronin Sidechain
- The Ronin sidechain is used by Axie infinity to solve scalability problems and it is linked to Ethereum. It reduces transaction period and fees and It is developed by Sky Mavis.
- Rootkit
- A Rootkit refers to a Trojan malware used in gaining administrative access to a targeted network or device. A typical rootkit can subvert security apps and damage, hijack or steal sensitive info from the affected device. It is removed by reinstalling the device.
- Roth IRA
- A Roth IRA refers to a retirement account that allows US citizens to save and withdraw money without tax. Benefactors are US citizens of 59.5 years old and above who have active accounts of at least 5 years old.
- Ruby
- Ruby refers to a high-level computer programming language that supports other programming languages and is used to develop different software. It was created by Yukihiro “Matz” Matsumoto.
- Rug Pull
- A rug pull refers to a fraudulent blockchain scheme that leverages Bitcoin or Ethereum to scam unsuspecting victims. It occurs when a fraudster(s) uses DEX to create and list a new asset-based on either BTC or ETH. After receiving significant investment funds the founders would withdraw and bolt away funds leaving their victims with useless assets.
- Runtime
- Runtime refers to the last stage of a computer program lifecycle where the close is run via the CPU. The program uses Random Access Memory at this stage. Most blockchains and computer networks have an in-built runtime environment. It is also known as execution time.
- Russell 3000 Index
- The Russell 3000 index is an equity index weighted by market capitalization. The index was founded in and based in Britain but it is used to track the performance of the 3,000 largest publicly held U.S. stocks that make up 98% of the U.S. stock market. It has the large-cap Russell 1000 Index and the small-cap Russell 2000 index. It is launched in 1984 and is maintained by FTSE Russell.
- Rust
- Rust refers to a multi-faceted programming language created to enhance security and performance levels in other software. It was created by Graydon Hoare in 2010 at Mozilla Research. It works with Microsoft to create security-based software features.
- Ryuk Ransomware
- Ryuk ransomware attacks are common ransomware attacks in which a victim is unable to access essential files and then blackmailed by the attacker to pay a certain amount to release them. It accounts for tens of millions of dollars worth of damages each year.
S
- S&P 500 (Standard and Poor’s 500)
- The S&P 500 is a stock index made up of 500 of the largest companies listed on stock exchanges in the United States and consists of many of the largest tech stocks on the planet such as Apple Inc., Microsoft, Amazon.com, Facebook, etc.
- SCORE (Smart Contract on Reliable Environment)
- SCORE is a framework for composing, amending, and initializing smart contracts on the ICON network. It is aimed at improving the integration and developmental capabilities of software developers.
- SHA-256 (Secure Hash Algorithm)
- SHA-256 helps to secure data by utilizing a cryptographic mathematical operation to generate a unique 256-bit, 64-character random sequence of letters and numbers (hash) out of input. Its actions are irreversible.
- SIM Swap Attack
- A SIM swap attack refers to taking control of a victim’s SIM card via social engineering techs to access private user data and a broad range of user access credentials.
- SKALE (SKL) Token
- SKL is an ERC-777 token that facilitates SKALE Network staking and security, payments, rewards, and governance voting.
- SKALE Elastic Sidechains
- SKALE Elastic Sidechains are highly configurable blockchains that work on digitalized sub-nodes. Users create Elastic Sidechains by submitting their request to the SKALE Manager along with the required subscription fee.
- SKALE Network
- SKALE is an Ethereum sidechain network that creates a high-throughput, low-latency, low-cost environment for decentralized app (dApp) development.
- SKALE Node Core
- A SKALE Network node is known as a SKALE Node Core. Each of these nodes is compartmentalized into virtualized subnodes to accommodate multiple Elastic Sidechains simultaneously.
- SKALE Virtualized Sub-node
- SKALE virtualized sub-nodes enable each SKALE Node Core to run multiple Elastic Sidechains simultaneously. It generally enables elastic provisioning of network resources according to each user’s requirements.
- SMART Alpha Bond (BarnBridge)
- A SMART Alpha Bond is a flagship product offering of the BarnBridge Defi protocol. The SMART acronym stands for Structured Market Adjusted Risk Tranches. More specifically, they are tokenized tranches of volatile products created to mitigate exposure to price volatility.
- SMART Yield Bond (BarnBridge)
- SMART Yield Bonds is a flagship product offering of the BarnBridge DeFi protocol. The SMART stands for Structured Market Adjusted Risk Tranches. More specifically, SMART Yield Bonds are tokenized tranches of debt-based derivatives designed to mitigate interest rate volatility.
- SMS (Short Message Service)
- SMS is the most used text messaging format that operates on standardized communication protocols that enable mobile devices to send and receive short text messages up to 160 characters in length.
- STRIDE
- STRIDE is an acronym for “Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, and Elevation of Privilege.” Each of these concepts is a cybersecurity threat category, and they are used as a conceptual framework to protect a system from being attacked.
- Safety Module (Aave)
- The Safety Module is a security measure used to reduce the effect of a sudden liquidity drop-off and sustain the value of the AAVE network native coin.
- Sandbox (Security)
- Sandbox is a security measure that allows programs to operate independently of the network’s main operating system. It helps to keep the network running even when there is a system failure and also helps to examine the performance of virtual machines.
- Satellite (Storj)
- Satellite helps the Storj decentralized data storage network to manage its data storage nodes by ensuring they are functioning properly and productive.
- Satoshi Nakamoto
- Satoshi Nakamoto is the creator and publisher of the Bitcoin whitepaper in 2008, also mined the first bitcoin block in 2009. However, to date, the identity of this individual or group is unknown.
- Satoshis
- Satoshis or sats were named after the pseudonymous group or person who created bitcoin. They are the smallest divisible bit of the bitcoin. One Bitcoin token BTC consists of 100 million Satoshis.
- Scalability
- Scalability is a blockchain term that refers to how fast and efficient a blockchain network can process data and finish transactions. Scalability, decentralization, and security are the 3 key components of an efficient blockchain network.
- Scaling Solution
- Scaling solutions are mostly Layer-2-protocols like sidechains and off-chains layers that help to increase the transaction speed and computational efficiency of a blockchain network.
- Scalp Trader (Scalper)
- A scalp trader is an investor who enters and exits a financial position in a split second to benefit from the continuous rise in the asset’s value.
- Scareware
- Scareware is malware that uses social engineering to ignore fear, anxiety, or shock in a target to deceitfully persuade them to buy unwanted software. Most times, the proposed software is a malignant iris or a useless subscription service.
- Schelling Point (Focal Point)
- Schelling point is a blockchain term that means the attention of the user or designer is naturally directed towards a specific point or several focal points that make up the overall structure.
- Screen-locking Ransomware
- Screen-locking ransomware is software that denies a target user from gaining access to the OS of their device. It works by locking the device and displaying a message prompting the user to pay a specific ransom to unlock their device or run the risk of forever losing the contents inside.
- Scrypt
- Scrypt is the hash function that is used by the Litecoin network to converts input data into an encrypted output using a PoW mechanism. It was developed to limit mining to only CPUs and GPUs.
- Secondary Market
- The secondary market refers to any marketplace that is used to exchange goods or assets that are not used for their main purpose like corn for ethanol instead of food production or livestock feed. It allows investors to directly exchange their assets without issuing them unlike on the primary market.
- Secure Hash Algorithm (SHA)
- Secure Hash Algorithm is a form of cryptographic hash function created to keep data secure on different types of computer networks. It transfers the original data to a hash function algorithm that consists of several unique compression functions and modular additions.
- Secure Multi-Party Computation (SMPC)
- Secure Multi-Party Computation is a subset of sharing decentralized computing to multiple parties and also retaining the privacy and security in a blockchain network.
- Secure Proof of Stake (SPoS)
- Secure Proof of Stake is Elrond Network’s enhanced version of Proof of Stake (PoS). It enables advanced security and distributed fairness while eliminating computational waste that PoW systems struggle with.
- Secure Sockets Layer (SSL) & Transport Layer Security (TLS) Certificate
- A Secure Sockets Layer Certificate is a technological standard used to enable a secure connection between a Web server and a client online. A TLS Certificate is a recent, updated version of SSL with enhanced security.
- Securities and Exchange Commission (SEC)
- The U.S. SEC is an independent body of the U.S. federal government that proposes, implements, and regulates securities rules in the U.S. investment industry. It protects investors, maintains fair and smooth functioning of U.S. securities markets, and facilitates capital formation.
- Securitization
- Securitization is the process of pooling an asset or group of assets into security. It includes residential and commercial mortgages, car loans, credit card debt, etc that are packaged, purchased, securitized, and sold to prospective investors.
- Security
- Security is an ongoing concern that companies usually seek to address via numerous policies, practices, and procedures that help detect, prevent, and monitor unauthorized access, modification, misuse, or denial of computer network resources.
- Security (Financial Asset)
- A security is any tradeable financial asset like a stock, bond, commodity, some cryptocurrencies (not all), etc. More generally, securities are classified into three types: equity, debt, and a hybrid of the two.
- Security Token
- Security tokens are a tokenized stake in the ownership of any asset that has value, such as a business or a piece of real estate, which is recorded in a blockchain ledger. They offer a more flexible yet secure way to transfer, exchange, and store value.
- Security Token Offering (STO)
- STO is a method of distributing security tokens that offer instant settlement times, clearer regulatory guidelines, higher liquidity, and a lower barrier to entry in many instances. It offers a straightforward, investor-friendly method to issue, trade, and store cryptocurrencies.
- Seed Funding (seed capital)
- Seed funding refers to a very early investment to help support a startup until it gets off the ground and starts generating cash flow or is in a position to obtain further investment capital. It is often by friends and family, seed venture capital funds, etc.
- Seed Phrase
- A seed phrase is a 12, 18, or 24-word code that is used as a backup access mechanism when a user loses access to a cryptocurrency wallet or associated private key.
- Seeding
- Seeding refers to the process of p2p file sharing that involves uploading files that were initially downloaded for others to download. A computer connected to a P2P network generally becomes a seed after it has the desired file.
- Segregated Witness
- Segregated Witness is a soft fork that separates signature data from transaction data in the bitcoin blockchain to increase the amount of data within a specific block.
- Self-Regulatory Organization (SRO)
- A self-regulatory organization is a potent entity that can independently create and enforce accepted professional regulations and standards without the need for external oversight or intervention.
- Self-Sovereign Identity (SSI)
- Self-sovereign identity refers to a user’s ability to own their identifying data without the need for third-party assignment or validation.
- Sell Wall
- A sell wall is a form of market manipulation when a large limit order is placed at a specific price level to sell a large amount of a certain asset that can cause a drastic drop in the price of the asset.
- Sell-Off
- A sell-off refers to a form of market manipulation where a large volume of an asset is sold suddenly at a lower price than its value. It is mostly caused by negative rumors about the asset causing panic in the market-leading to mass sales of the asset.
- Semantic Web
- The semantic web is created to enable machines to read internet data to improve the processes of the transaction, data usage, and the dissemination of information. It is an upcoming version of the World Wide Web (W3) that expands on the parameters set by the W3 Consortium.
- Separate Account
- A separate account is a business portfolio owned by an investor but managed by an investment firm/individual. It is also referred to as separately managed accounts (SMAs) or individually managed accounts.
- Sequencer (aggregator)
- Sequencer is a layer-2 scaling solution that starts transactions off-chain and finishes them on-chain. It is utilized on the Ethereum network to save capital and improve its throughput capacity.
- Serenity
- Serenity refers to an upcoming upgrade of Ethereum aimed at changing its consensus mechanism from proof of work to proof of stake. It would launch in four phases within 5 to 10 years. Phase 0, the beacon chain, was successfully deployed in Dec. 2020.
- Service Chain
- A Service chain is a unique order of actions that are used to automate traffic and data flow between services in a digital network. It helps to enhance the usage of network resources to improve application performance by choosing the best routing path.
- Settlement
- Settlement is a way investors confirm when a transaction is completely successful. Until a transaction is confirmed, it remains pending and unresolved. Shorter settlement times speed up business operations, save money, and remove uncertainty.
- Settlement Agent Node
- Settlement Agents are nodes used on the Crypto.com blockchain that allow settlement between the platform’s native CRO token and other stable cryptocurrencies. These nodes are rewarded by charging a .5% fee for payouts in fiat.
- Settlement Layer
- The settlement layer on a blockchain network is the segment used to settle business transactions via smart contracts and to minimize the role of third-party intermediaries. It takes place through an Automated Market Maker.
- Shard Chain
- Shard chains are formed by separating a blockchain into smaller and manageable bits. It helps to prevent congestion on validator nodes hence increasing the transaction speeds.
- Sharing
- Sharding is a means used to separate a blockchain network or database by sending the computational and storage database of the network to numerous nodes to improve the transaction speed and throughput of the network.
- Sharing Economy
- The sharing economy is a socioeconomic system that enables p2p mutual sharing of resources within a network to benefit all its members.
- ShibaSwap
- ShibaSwap is a decentralized exchange that enables safe and user-friendly cryptocurrencies trading on the Shiba Inu blockchain project.
- Shielded Transaction
- Shielded transactions are unique transactions that conceal specific data about a transaction, as an amount transferred or the account addresses, such that it is still verifiable on the blockchain.
- Short Position (Shorting)
- Short selling is the process of selling borrowed shares, then buying at a cheaper rate when the price of the asset falls, to replace the borrowed share. It can result in either profit or loss for the short seller.
- Short Seller
- A short seller sells shares borrowed from a broker, then purchase and return the same asset when its price drops. The short seller profits from the difference between the purchase price and the price the stock was initially sold. If the price rises, it would result in loss.
- Short Squeeze
- A short squeeze is activated when a shorted stock rise in value as a result of positive financial news or buyers purchasing shares with the knowledge that short-sellers must cover their positions. If short-sellers don’t close out their positions before the stock price rises too high, they could incur financial losses.
- Sidechain (Side Chain)
- A sidechain is a subordinate blockchain protocol linked to the main chain of a blockchain network and aimed at improving the interoperability, scalability, and flexibility of the network.
- Signature (Cryptographic)
- A cryptographic signature is an algorithm scheme that uses both public and private keys to confirm the originality of a virtual document in a blockchain network and to easily detect and prevent forgery and data thieving.
- Signature-Based Security Program
- This is a security measure aimed at preventing malware attacks by cross-checking the signature of a suspicious program with the signatures of already known malware stored in a special database.
- Silk Road
- Silk Road was an online black market platform for selling illegal drugs, weapons, and other sensitive commodities and data. The platform used the Tor web browser where users traded anonymously. It has been shut down by the FBI.
- Simplified Payment Verification (SPV)
- Simplified payment verification allows a crypto wallet user to verify crypto transactions without needing to download an entire copy of the block containing the transaction the user wants to verify.
- Skynet (Sia)
- Skynet is a Layer-2 platform built on top of the Sia blockchain to facilitate decentralized content delivery and file sharing. It stores and serves content, providing the infrastructure to host websites and applications in a decentralized manner.
- Slashing
- Slashing is an automated preventive measure used on blockchain protocols with the PoS consensus model that penalizes a token depositor whose nodes behave suspiciously dishonestly when staking their crypto assets into the main node.
- Slippage
- Slippage is the difference between the expected price of a trade relative to the actual price at which the trade is executed. Slippage generally occurs when an investor buys or sells an asset on a platform with poor liquidity and low trading volume.
- Slot
- The Cardano blockchain utilizes a protocol called the Ouroboros Praos protocol. This unique consensus mechanism functions by breaking downtime into epochs that last approximately 5 days, which are then broken down into 432,000 slots.
- Small Love Potions (SLP)
- Small Love Potions (SLPs) are tokens that Axie Infinity users are required to have if they wish to breed their Axis. The tokens can be earned within the Axie Infinity metaverse and can be traded on Uniswap.
- Small and Medium Enterprises (SMEs)
- SMEs are businesses with a few numbers (50 to 250) employees. On a national scale, they have the most employees, hence called the lifeblood of a nation’s economy, and consist of startups and newly launched businesses.
- Small-Cap
- A small-cap coin refers to a cryptocurrency asset with a small market capitalization that is determined by the number of circulating coins that are accessible to the public, multiplied by the price per coin.
- Smart Contract
- A smart contract is a decentralized, transparent, and self-executing protocol that carries out a set of instructions that is verified on a blockchain. Once it has been deployed, it is irreversible and unmodifiable.
- Smart Contract Intermediate-Level Language (Scilla)
- Smart Contract Intermediate-Level Language was developed by Zilliqa to confirm the security level of smart contracts and decentralized applications on a blockchain network. Tit uses the scalability and sharding architecture of the Zilliqa network.
- Smart Home
- A smart home is a tech-enabled home setup in which functions like heating, lighting, and appliance configurations are automated or remotely controlled via network-connected devices such as a mobile phone or tablet. It uses both hardware and software protocol to improve the convenience and efficiency of occupants.
- Smart Order Router (SOR)
- Smart order routing is an automated online trading method that detects and executes the best available trading opportunity throughout a given range of financial markets and trading venues.
- Smart Pool (Balancer)
- Smart Pools are liquidity pools whose factors can be managed and adjusted through a smart contract to enable a high degree of flexibility for liquidity providers on the Balancer platform.
- Smart Token
- Smart tokens are crypto assets that are programmed with a wide range of factors. They can specifically be made for a particular function, some are used to reduce liquidity risk, improve security measures, or shape consumer behavior. The Bancor Network’s Bancor token is the first smart token.
- Smart Treasury
- Smart treasury helps to automatically manage an establishment’s funds by choosing desired liquidity provider for their smart pool and also controlling who can withdraw or deposit capital.
- Smishing
- Smishing is a phishing attack that uses deceitful messages to lure potential victims into taking some actions that would lead them into sharing sensitive data unintentionally.
- Snapshot
- Snapshot is the capability to record the current state of a blockchain network at a certain period. It also refers to a dataset that records the balance of each user’s blockchain address to fairly distribute tokens during a token airdrop giveaway or token distribution event.
- Snowball Consensus Mechanism
- Snowball is a form of PoS consensus mechanism on the Avalanche network that uses continuous deliberations among validator nodes within a subnet to validate transactions until a consensus is reached.
- Social Engineering
- Social engineering refers to psychological-based techniques like distress, trust, anxiety, ignorance, confusion, etc. to manipulate individuals to perform actions that may be harmful to them like leaking sensitive data or unconsciously transferring funds to a fraudster.
- Social Impact Fund
- A social impact fund is an investment fund that benefits society, humanitarian and social issues, etc. Socially Responsible Investing (SRI) and Environmental, Social, and Governance (ESG) Investing are the two commonest types of impact investing.
- Socios (Chiliz)
- Socios is a blockchain-enabled sports entertainment model that rewards users who buy CHZ (chiliz’s native coin) thereby helping the Chiliz platform sustain long-term growth.
- Soft Cap
- The soft cap is the lowest sum of capital that a forthcoming blockchain project wants to use its initial funding round to generate. When the soft cap is not reached, projects may either continue or be dejected.
- Soft Fork
- A soft fork is a software update of a blockchain network whereby the updated software is still compatible and interoperable with its older computational system. It results in fewer changes in a protocol.
- Soft Peg
- A soft peg is an exchange rate model applied to a currency to maintain its value relative to a reserve currency. It helps to mitigate economic fluctuations and shocks.
- Software Development Kit (SDK)
- A software development kit contains software development equipment created to help software engineers to produce digital applications and perform other beneficial functions. The most useful software development tools are compilers, debuggers, and software frameworks.
- Software Stack
- A software stack is a bunch of software gears used to build applications that work self-sufficiently on a computer network. Software stacks have diverse levels (e.g. operating system, web server, database), on which applications run.
- Software Wallet
- A software wallet refers to the virtual wallet that holds a user’s public and/or private keys, hence securing their digital assets. They are stored on a desktop or mobile phone and are remotely connected to the internet. However, they are susceptible to online theft.
- Software-as-a-Service (SaaS)
- Software-as-a-Service is also known as “on-demand software” is a protocol that allows enterprises to rent software platforms and then modify them into their particular needs.
- Solana (SOL)
- Solana refers to a blockchain that uses smart contracts to locally improve the scalability and throughput on the Solana network. SOL is the native token of the Solana network and is used to pay for fees on the Solana network.
- Solid-State Drive (SSD)
- A solid-state drive is an advanced type of computer storage device that is much faster than its traditional hard disk drive (HDD) counterpart because it uses flash memory instead of spinning and moveable components like HDDs.
- Solidity
- Solidity is the software development programming language used in building smart contracts that work in unison with the Ethereum Virtual Machine (EVM) and the Ethereum network.
- Solvency
- Solvency is the capacity of a company to meet its financial duties from a regulatory and compliance perspective.
- Somnium Cube Token (CUBE)
- Somnium Cube is an ERC-20 utility token that facilitates economic activity across the Somnium metaverse.
- Somnium Space Metaverse
- The Somnium Space metaverse hosts users in a single realm while enabling the development of individual worlds. Players utilize virtual reality (VR) headsets and the internet to create a connection between their physical reality and the Somnium VR world.
- Source Code
- Source code is a collection of informatics code that determines how a software program will operate based on a list of deterministic instructions and measures. It is the primary initial state of blockchain-based software during its creation.
- Source-Code Fork
- A source-code fork is a kind of hard fork that occurs when software engineers take the source code from an existing blockchain network to create a new network. It has the same effects as a typical hard fork and it cannot be reversed to its previous state.
- Spartacus Attack
- A Spartacus attack is a Sybil attack that takes place during a targeted network’s bootstrapping phase. It works by stealing the identity of other nodes within a distributed network to inherit its trust value.
- Spear Phishing
- Spear Phishing is a phishing scheme that uses deceitful emails or other forms of electronic communications. It requires more background research on a target than most other forms of phishing attacks.
- Speculative Investment
- A speculative investment involves taking a high degree of risk of financial loss via capital and possible profit. They are often with a high potential profit that makes them attractive opportunities for investors.
- Spot Market
- The spot market is a public financial market in which the trade of financial commodities is immediately settled and delivered.
- Spot Trading
- Spot trading is a process that enables investors to buy an asset at its current market price rather than using leverages to reduce risks.
- Spyware
- Spyware is malware that is created and sent to potential victims via infested websites, pop-up ads, emails, file downloads, to record, track, and harvest sensitive data like private wallet keys from an infected device.
- Stablecoin
- A stable coin is a digital currency created to have a stable value and used for investment purposes. The value of most existing stablecoins is tied directly to a predetermined fiat currency.
- Staking
- Staking is the process through which a blockchain network user ‘stakes’ or locks their cryptocurrency assets on a network as part of the consensus mechanism, thus ensuring the security and functionality of the chain.
- Staking Pool
- A staking pool is a platform where stakeholders combine their computational resources and staking power to effectively verify and validate new blocks, which increases their chances of earning a portion of the ensuing block rewards.
- Stalling Delay
- A stalling delay is a coded, time-based technique that certain types of malware used to bypass a network’s cybersecurity defenses.
- Standard Deviation
- Standard deviation is used to compute a current rate of return on an investment relative to its historical mean to determine the investment’s historical volatility. Generally, the higher the standard deviation, the higher the volatility of the investment and vice versa.
- Startup
- A startup is a recently launched company that is in the early stages of its development lifecycle.
- State
- The state is a blockchain term that means the particular status of a computer system that is continually changing over time. It records and stores all the historical changes, hence it helps to restore the system to a previous version when needed.
- State Channel
- A state channel facilitates two-way communication between a blockchain and off-chain transactional channels using various mechanisms to improve overall transaction capacity and speed.
- State Machine Replication (SMR)
- State Machine Replication is decentralized computing for creating fault-tolerant systems via replication of servers by deploying copies of a web service across a set of servers rather than just one.
- Status Network Token (SNT)
- The Status Network Token is the native ERC-20 token of Status Network, an open-source messaging platform. It allows any Status community stakeholder to vote on the network’s proposals.
- Stellar (XLM)
- Stellar is a decentralized payment protocol that allows smooth, cross-border transactions between all kinds of currency. Its native token, Stellar Lumens (XLM), is used to pay the network’s transaction fees, prevent network spam, and provide liquidity via the Stellar DEX.
- Stock Keeping Unit (SKU)
- Stock Keeping Units are inventory management methods of classifying the different types of items for sale. Different SKU classifications include color, size, packing material, manufacturer, description, and warranty terms.
- Stop Loss Order
- A stop-loss order is an order created to minimize business losses by setting a specific “stop” and “loss” price. When the “loss” price is reached, the asset is prepared for sale, and eventually “sold” when the stop price is reached.
- Storage Miner
- The Filecoin protocol relies on storage miners to furnish its marketplace of decentralized cloud storage. Storage miners are essentially nodes that solve cryptographic proofs to verify storage across time.
- Storage Node (STORJ)
- The Storj network utilizes storage nodes to provide bandwidth to the network and store clients’ data in a secure, decentralized format. Any entity with a stable internet connection and excess hard drive space and bandwidth can set up a storage node.
- Store of Value
- A store of value refers to assets that retain their purchasing power for a long period and can be easily retrieved and traded after a while. Assets considered as stores of value include fiat, bitcoin, real estate, gold, and silver.
- Storj
- Storj is a blockchain-enabled data storage network that allows users to access remote, decentralized data storage and retrieval services, or offer storage services by using excess hard drive space and bandwidth.
- Strike Price
- A strike price is a price at which an asset can be sold or bought in an option contract. The value of the strike price is the market price of the security at the period when the option contract was made.
- Subgraph (The Graph)
- A subgraph is an application programming interface used to build the global graph of some of the world’s most important public data, enabling software developers to use, index, and serve blockchain data in a cryptographically verifiable manner.
- Subgraph Manifest
- Subgraph manifests are part of the digital database that defines the smart contracts that a subgraph will index, which events from the contracts are important, and how to map event data to entities that Graph Node stores and generates queries around.
- Subnetwork (Subnet)
- A subnetwork is a special blockchain protocol created to function in a Layer-1 blockchain like Bitcoin or Ethereum. There is numerous subnet and they all work in harmony with and complement the parent chain.
- Substrate (Polkadot Development Framework)
- The substrate is an integration platform that helps to simplify the creation of decentralized applications or independent blockchains used on the Polkadot platform.
- Supermini
- Supermini refers to a mining rig created on the Akash network that rewards its users with AKT tokens. It also gives its users access to an AKT token node which is a powerful and portable supercomputer.
- Sushi Liquidity Provider (SLP) Token
- The Sushi liquidity provider tokens are part of a pooled asset in a particular SushiSwap liquidity pool. Eg. If user-provided liquidity to a liquidity pool for ether (ETH) and sushi (SUSHI), they would receive SUSHI-ETH SLP tokens.
- Swap (Derivative Swap)
- A derivative swap is a contract that allows parties to swap the cash flows or value of one asset with another. It involves cash flows contingent on a notional principal amount like a bond or loan. It is executed by large organizations over the counter.
- Swarm
- A swarm is the group of peers that are sharing a torrent (file) on the BitTorrent protocol.
- Swing Trader
- Swing traders use swing trading techniques for investing. They actively speculate their positions and time trades meticulously as they depend on the charted technical signals to seek trading opportunities.
- Swing Trading
- Swing trading is a form of market trading that aims at accumulating short- to medium-term profits based on fluctuations in the value of stocks, commodities, and/or currencies over a short period.
- Switcheo
- Switcheo is a blockchain exchange that improves the transparency and interoperability and trading of ETH, EOS, and NEO tokens on the NEO network. It uses Switcheo Token (SWTH).
- Sybil Attack
- A Sybil attack refers to cybercrime that an attacker can use to control a network by flooding it with many nodes registered with false identities. It exploits how connections are made among legitimate nodes.
- Symmetric Encryption
- Symmetric Encryption uses a single key to decrypt and encrypt electronic data. Both parties involved in encrypted communication have similar copies of the key which are kept personal to retain the secrecy of their discussion.
- Synthetic Asset
- Synthetic assets are the digital cryptographic representations of local assets such as gold, fiat currency, silver, stablecoins, etc. It enables investors to invest in traditional assets via decentralized finance tools and their relative protocols, hence it makes investing in the assets easier.
- Synthetix (SNX)
- Synthetix is an Ethereum-based trading platform that enables its users to exchange tokens, cryptocurrencies, stocks, fiat currencies, valuable metals in form of ERC-20 tokens via a synthetic dual-token mechanism.
T
- T-Address
- T-Address is one of the two types of the address of the Zcash cryptocurrency platform. It stands for “Transparent Address”.
- TCAP (Total Market Cap)
- TCAP (Total Market Cap) is the total value of all the tokens in a cryptocurrency platform.
- TRC-10 Token
- TRC-10 Token is one of the Tokens of TRON.
- TRC-20 Token
- TRC-20 Token is one of the Tokens of TRON.
- TRON
- TRON protocol is one of the biggest cryptocurrency operating systems in the world. TRON is dedicated to building a decentralized internet.
- TRON Virtual Machine (TVM)
- TRON Virtual Machine (TVM) Software that executes programs as though it is a computer. It is used to execute financial programs (contracts) that are created on TRON.
- TRONZ
- TRONZ is a smart contract privacy protocol built upon the zk-SNARK methodology by TRON.
- TRONix (TRX)
- TRONix is one of the Tokens of TRON.
- Tailgating (or Piggybacking)
- Tailgating is a technique of breaching the security of a place, by following an authorized person in a way that does not raise suspicion.
- Taint
- Taint is the percentage of cryptocurrency tokens in a wallet can be traced back to another wallet.
- Taint
- Taint is the percentage of cryptocurrency tokens in a wallet can be traced back to another wallet.
- Tamper-Proof Ledger
- A Tamper-Proof Ledger is a ledger that can not be manipulated by unauthorized entities.
- Tangle
- Tangle is the name of the architecture of the IOTA cryptocurrency platform.
- Taproot
- Taproot is the name of a major Bitcoin upgrade that was proposed in 2017. It will reduce Bitcoin transaction costs and improve privacy.
- Tardigrade (STORJ)
- Tardigrade (STORJ) is a cryptocurrency platform. Its major selling point is that its currency is hyper-deflationary.
- Technical Analysis (TA)
- Technical Analysis (TA) is a type of financial analysis that involves using charts to study the price movement of a digital asset.
- Technical Indicator
- A Technical Indicator is a signal is found in the price movements of an asset and can be used to make financial decisions.
- Technical Resistance Level
- A Technical Resistance Level is a price point an asset has had trouble exceeding, within a given period.
- Technical Support Level
- A Technical Support Level is the level of support that can be offered to users of the technology.
- Telegram
- Telegram is a cloud platform that enables the exchange of messages and information.
- Tendermint
- Tendermint is the company behind the Proof-of-Stake (PoS) Tendermint Core Byzantine Fault Tolerant (BFT) consensus mechanism.
- Tendermint Core Byzantine Fault Tolerance (BFT)
- Tendermint Core Byzantine Fault Tolerance (BFT) is a low-level protocol composed of a blockchain consensus engine and an abstract application interface.
- TerraUSD (UST)
- TerraUSD (UST) is a cryptocurrency platform. Its main selling point is its infinitely scalable monetary policy.
- Terraswap
- Terraswap is a cryptocurrency platform. Its main selling point is using liquidity pools (LPs) to make markets without the need for a central entity.
- Testnet
- A Testnet is a test Bitcoin or Ethereum cryptocurrency platform is used by smart contracts developers to test their smart contract codes.
- Text-Based User Interface (TUI)
- A Text-Based User Interface (TUI) is an interface mainly powered by text. This is in contrast to Graphics User Interface which is mainly powered by Texts and Graphics.
- Tezos (XTZ)
- Tezos (XTZ) is a cryptocurrency platform.
- The DAO
- The DAO is a decentralized autonomous organization. It is an investor-directed cryptocurrency venture capital.
- The Gold Standard
- The Gold Standard is a financial system back by valuable items like Gold, Silver, etc.
- Theta Token Minter
- A Theta Token Minter is a term used in the Theta cryptocurrency platform. It is the name of a system that helps any interested individual to create a cryptocurrency token.
- Third-Party Storage
- A Third-Party Storage is a storage solution provided by a third party (e.g. Google Drive, Dropbox, AWS, etc).
- Throughput
- Throughput is the number of X that can be Y in a given Z.
- Ticker
- A Ticker is a 3 or 4-uppercase-English-character string that serves as an alternative name for a cryptocurrency.
- Ticker Symbol
- A Ticker Symbol is the symbolic form of a cryptocurrency’s ticker.
- Time-Based One-Time Password Algorithm (TOTP
- A Time-Based One-Time Password Algorithm (TOTP) is a one-time password that expires if not used within a particular period.
- Time-Weighted Average Price (TWAP)
- A Time-Weighted Average Price (TWAP) is a weighted average is calculated based on some time factor.
- Timelock/Lock time
- A Timelock/Lock time is a Bitcoin feature that prevents transactions from being carried out on an account until a time in the future.
- Timestamp
- Timestamp is the point in time that an event occurred.
- Timing-Based Evasion
- A Timing-Based Evasion is an evasion tactic is used by malware to avoid detection. The tactic involves running only during periods when there is no system scanning for malware.
- Tipset
- A Tipset is a set of blocks (they may not necessarily be a chain) in a blockchain.
- Token
- A Token is a transferable unit of a cryptocurrency.
- Token Economy/Tokenomics
- A Token Economy/Tokenomics is an economy of goods and services that can be run with a DeFi system.
- Token Generation Event
- A Token Generation Event is an event where the generation of some cryptocurrency tokens takes place.
- Token Issuance
- A Token Issuance is the introduction of new tokens into the total supply of tokens in a cryptocurrency platform.
- Token Migration
- A Token Migration is the migration of a cryptocurrency’s tokens from one blockchain platform to another.
- Token Sale
- Token Sale is the sales of pre-available tokens as a means of raising funds to create a cryptocurrency.
- Token Standard
- A Token Standard is a standard used to create a cryptocurrency.
- Token Swap
- Token Swap is the exchange of tokens of a cryptocurrency for tokens of another cryptocurrency.
- TokenSets
- A TokenSets is a web browser-powered interface for interacting with the Set Protocol
- Tokenization
- Tokenization is the conversion of a physical asset to a digital asset on a cryptocurrency platform.
- Tokenization Standard
- A Tokenization Standard is a standard used for tokenization.
- Tokenized Security
- A Tokenized Security is a cryptographic tokenized version of traditional security.
- Tokenized Stock
- A Tokenized Stock is a cryptographic tokenized version of a traditional stock.
- ToolChain
- A ToolChain is a collection of tools used one after the other.
- Tor
- Tor is a decentralized VPN that enables an entity to use the internet anonymously.
- Tor Browser
- Tor Browser is a web browser that accesses the web through Tor.
- Torrent
- A Torrent is a file is downloaded from a network powered by the BitTorrent protocol.
- Total Hash Rate
- Total Hash Rate (TH/s) is the estimated number of terahashes per second the Bitcoin network is performing in the last 24 hour.
- Total Supply
- Total Supply is the total amount of tokens that exist in a cryptocurrency platform.
- Total Value Locked (TVL)
- Total Value Locked (TVL) is the total monetary value of all the digital assets is locked in a decentralized financial system.
- Traceability
- Traceability is the ability to trace a cryptocurrency element (e.g. Token, Transaction, User, etc).
- Trade Execution Coordinator (TEC)
- Trade Execution Coordinator (TEC) is an entity charged with coordinating the import and export of goods, as well as other related elements.
- Trade Volume
- Trade Volume is the amount of cryptocurrency traded in a period.
- Trading Bot
- A Trading Bot is a computer (or software)trading a digital asset.
- Trading Tournament
- A Trading Tournament is a tournament that involves testing the knowledge of participants about the cryptocurrency market.
- Traditional Finance (TradFi)
- Traditional Finance (TradFi) is the financial systems presently used by countries of the world.
- Traditional Value Chain
- Traditional Value Chain is the chain of all the physical activities carried out to produce a good or service.
- Tranche
- Tranche is a decentralized protocol for managing risk.
- Transaction (TX)
- A Transaction (TX) is a financial exchange.
- Transaction Cost Analysis (TCA)
- A Transaction Cost Analysis (TCA) is an analysis of the cost of deciding to trade over a particular period.
- Transaction Fee
- A Transaction Fee is a money charge to facilitate a transaction.
- Transaction ID (TXID)
- A Transaction ID (TXID) is a combination of characters is used to identify a transaction.
- Transaction Settlement Time
- Transaction Settlement Time is the duration takes for a transaction to complete.
- Transactions Per Second (TPS)
- Transactions Per Second (TPS) is a unit for describing the number of transactions that get processed in a given time.
- Transcoder
- A Transcoder is a computer that converts videos from one format to another.
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Transmission Control Protocol/Internet Protocol (TCP/IP) is the suite of message exchange protocols that power the internet.
- Trapdoor Function
- A Trapdoor Function is an algorithm that converts a piece of information from one form to another in a way that the new form can not be converted back to the old form using any algorithm.
- Treasury Bill (T-Bill)
- Treasury Bill (T-Bill) is a financial instrument issued by the US Treasury, with typical maturing periods of a few days to 52 weeks.
- Treasury Bond (T-Bond)
- Treasury Bond (T-Bond) is a type of debt issued by the US Treasury to the US government.
- Trend
- A Trend is a repeated sequence of the same pattern in a financial market.
- Trend Analysis
- A Trend Analysis is an analysis of a trend.
- Trezor
- Trezor is a digital wallet for cold storage of cryptocurrencies manufactured by SatoshiLabs, Prague Czech republic.
- Trojan
- A Trojan is a malicious software disguising as harmless software.
- Trojan Banker
- A Trojan Banker is a Trojan software that targets something in the banking industry.
- Trojan-Downloader
- A Trojan-Downloader is a Trojan software that further downloads additional malicious software.
- Trojan-Ransom Malware
- A Trojan-Ransom Malware is a Trojan malware is also ransomware. It is a type of cryptovirology that threatens to expose a victim’s data or block them from accessing it until a ransom is paid.
- Troy Ounce
- Troy Ounce is a unit used across the world to communicate the mass of precious metals. 1 t oz = 28.35 grams.
- Truffle
- Truffle is a development toolbox for creating Ethereum smart contracts.
- Trust Company
- A Trust Company is a legal entity that can act as a trustee.
- Trusted Execution Environment (TEE)
- A Trusted Execution Environment (TEE) is an environment within a processor that a code can run in, with high privilege software (e.g. anti-virus) not being able to touch it.
- Trustless
- A financial system where you do not need to trust any single entity for things to always go right.
- Tumbler (Crypto Tumbler)
- Tumbler is an entity that helps to obscure the origin of some cryptocurrency tokens, by bringing so many tokens together, mixing them up, and returning them to each contributor, the same amount of tokens they provide.
- Turing Complete
- Turing Complete is an adjective is used to describe a thing (computer, programming language, etc) that can be used to carry out any computational task.
- Turnkey Solution
- A Turnkey Solution is a solution created from other already available solutions.
- Two-Factor Authentication (2FA)
- A Two-Factor Authentication (2FA) is an authentication that requires two means of authenticating (e.g password and one-time password).
- Two-Way Peg (2WP)
- Two-Way Peg (2WP) is a mechanism in a blockchain protocol that enables the transfer of tokens (and other data) to an independent cryptocurrency platform.
- TypeScript
- TypeScript is a programming language. It is primarily used to program web browsers.
- Typosquatting
- Typosquatting is the use of a domain name similar to a target domain name, so that if the target domain name is misspelled by a user, the attacker will receive that visitor. E.g. the domain googgle.com typosquats google.com.
- tBTC
- tBTC is a Bitcoin representation on the Ethereum platform. With it, you can leverage some features of Ethereum.
U
- U.S. Financial Crimes Enforcement Network
- U.S. Financial Crimes Enforcement Network is a department of the U.S. Treasury is charged with administering and enforcing economic and trade sanctions against targeted entities.
- UMA Improvement Proposal (UMIP)
- A UMA Improvement Proposal (UMIP) is a proposal that was created by a member of the UMA platform to propose an improvement to the platform.
- UMA Token
- UMA Token is the cryptocurrency of the UMA cryptocurrency platform.
- UNI Token
- UNI Token is the cryptocurrency of the Uniswap platform.
- USD Coin (USDC)
- USD Coin (USDC) is a cryptocurrency that was created to be a crypto equivalent of the US dollar, in terms of value.
- UTC
- UTC is the acronym of Coordinated Universal Time, which is a standard for telling time.
- Unbanked
- Unbanked is an adjective used to describe individuals not using the services of banks.
- Underbanked
- Underbanked is an adjective used to describe individuals not using a significant portion of the services of banks.
- Uniswap (UNI)
- Uniswap (UNI) is a cryptocurrency platform. Its main selling point is using liquidity pools (LPs) to make markets without the need for a central entity.
- Unit of Account
- A Unit of Account is an item (typically money) that can be used to know the totality of a set of transactions, without having to do a prolonged calculation.
- United States House Committee on Financial Services
- United States House Committee on Financial Services is the United States governmental entity is charged with overseeing the entire financial services industry of the country.
- Universal Market Access (UMA)
- Universal Market Access (UMA) is a decentralized finance protocol was developed by Risk Lab.
- Unpermissioned Ledger
- An Unpermissioned Ledger is a ledger that is open to contributing to. This is in contrast to permissioned ledgers which require some authorization to be contributed to.
- Unspent Transaction Output (UTXO)
- Several cryptocurrency tokens are left to be spent in the future after a transaction was completed.
- Unstoppable Domains
- Unstoppable Domains is a blockchain-powered domain name provider in San Fransico.
- User Experience (UX)
- User Experience (UX) is the experience of a user while using technology.
- Utility Token
- A Utility Token is a type of cryptocurrency token offered as something that can be spent on the platform on which it was issued.
V
- Validator
- A Validator is a thing that checks the validity of something.
- Value Investing
- Value Investing is the investment technique of buying assets that are underpriced in hope that they will eventually sell for at least their proper price.
- Vanity Address
- A Vanity Address is a customized Bitcoin address (e.g. mybitcoinaddress123). This is in contrast to addresses that are sequences of characters selected at random (e.g. skdhk2ke3l43h4lkh3).
- Vaporware
- A Vaporware is a software that has been announced or marketed but has not been developed.
- Vault
- A Vault is a crypto wallet requires further conditions to be satisfied before money can be withdrawn from it.
- VeChain Improvement Proposal (VIP)
- A VeChain Improvement Proposal (VIP) is a proposal that was made by someone in the VeChain platform, to propose an improvement to the VeChain platform.
- VeChain Token (VET)
- A VeChain Token (VET) is a token of a cryptocurrency of the VeChain platform.
- VeThor (VTHO)
- VeThor (VTHO) is a cryptocurrency of the VeChain platform.
- Venture Capital (VC)
- A Venture Capital (VC) is an entity that provides the capital needed to pursue a venture, usually in exchange for some of the future profit.
- Verifiable Delay Function (VDF)
- A Verifiable Delay Function (VDF) is a technique of imposing a delay on the output of a pseudorandom generator.
- Verifiable Random Function (VRF)
- A Verifiable Random Function (VRF) is a technique of imposing randomness on the output of a pseudorandom generator.
- Verification Code
- A Verification Code is a sequence of characters that may be used for verification.
- Vertical Scalability
- Vertical Scalability is a scalability approach involves making a computer more powerful. This is in contrast to horizontal scalability which involves handling scalability issues by bringing in more computers.
- Vesting
- Vesting is the process of releasing tokens that were set aside for a while.
- Video Transcoding
- Video Transcoding is the conversion of a video from one format to another.
- Virgin Bitcoin
- A Virgin Bitcoin is a Bitcoin that has never been transferred to another Bitcoin wallet.
- Virtual Commodities Association (VCA)
- Virtual Commodities Association (VCA) is a non-profit organization founded to pursue the goal of regulating the U.S. virtual currency industry.
- Virtual Machine (VM)
- A Virtual Machine (VM) is a software that executes programming instruction as though it is a hardware computer.
- Virtual Private Network (VPN)
- A Virtual Private Network (VPN) is a conceptually private network powered by the internet.
- Virtual Reality (VR)
- A Virtual Reality (VR) is an alternate reality powered by a computer.
- Virus
- A virus is a computer malware can spread itself from one computer to another.
- Vishing
- Vishing is a social engineering activity that was done over the phone.
- Vitalik Buterin
- Vitalik Buterin is one of the co-founders of Ethereum.
- Voice Over Internet Protocol (VOIP)
- Voice Over Internet Protocol (VOIP) is a protocol that enables calls to be made over the internet.
- Volatility
- Volatility is a measure of how volatile an asset is.
- Volume Weighted Average Price (VWAP)
- Volume Weighted Average Price (VWAP) is the ratio of the value of an asset traded to the total volume traded over a period.
W
- Wabi-Sabi
- Wabi-Sabi is a popular open-source and privacy-focused Bitcoin wallet.
- WallStreetBets (WSB)
- WallStreetBets (WSB) is a Reddit subreddit where people discuss stock and options trading strategies.
- Wallet
- Wallet is a digital wallet where cryptocurrency tokens are stored.
- WannaCry Ransomware
- WannaCry Ransomware is a malware that holds your computer in ransom, by encrypting your computer files and asking you to pay for it to decrypt them.
- Wash Trading
- Wash Trading is the market manipulation of buying a financial instrument from oneself.
- Watcher
- A Watcher is a computer watching a cryptocurrency platform for unusual and malicious activity.
- Watchlist
- A Watchlist is a list of things to be watched.
- WeNano App
- WeNano App is an app that enables people to donate to a social wallet, from which other community members who need financial help can collect some money.
- Weak Hand
- A Weak Hand is a cryptocurrency holder is likely to panic on sight of a slight fall in the value of the cryptocurrency.
- Web 1.0
- Web 1.0 is the first version of the world wide web.
- Web 2.0
- Web 2.0 is the second version of the world wide web. It is a version that facilitates sharing of information without having to understand web technologies at technical levels.
- Web 3.0
- Web 3.0 is the anticipated third version of the world wide web. The major feature of the version is decentralization, using technologies like blockchain.
- Web Application
- A Web Application is an application software powered by web technologies.
- Web Application Firewall (WAF)
- Web Application Firewall (WAF) is a firewall for web applications. It manages HTTP trafic.
- Web Socket
- Web Socket is a suite of technologies that make it possible to communicate bi-directionally over web technologies.
- Web Wallet
- A Web Wallet is a cryptocurrency wallet that is accessed with a web browser.
- Web of Trust
- Web of Trust is a concept used in internet security to facilitate digital authentication.
- Web3 Foundation
- Web3 Foundation is the non-profit organization was created to manage web technologies.
- WebAssembly (WASM)
- WebAssembly (WASM) is an open-standard assembly language that can be used to program web browsers.
- WebAuthn
- WebAuthn is a standard that provides a reliable means for users to authenticate easily to web applications.
- Wei
- Wei is the smallest denomination of Ethereum’s native cryptocurrency. 1,000,000,000,000,000,000 wei equals 1 ether.
- Whale
- A Whale is an entity having an amount of cryptocurrency sufficient to manipulate the price of the cryptocurrency.
- When Lambo
- When Lambo is a parody website that can tell you when your investment in a particular cryptocurrency will appreciate enough to buy a Lamborghini Aventador (Lambo).
- When Moon
- When Moon is a cryptocurrency-themed game that revolves around going to the moon, earning cryptocurrency tokens, and getting Lamborghinis.
- Whitelabel Product
- A Whitelabel Product is a product that was developed by company A for another company B and branded as though it was developed by company B.
- Whitelist
- A Whitelist is a list of entities declared to be allowed to receive interaction from.
- Whitepaper
- A Whitepaper is an authoritative document introducing a creation to the world.
- Winding Down
- Winding Down is the unwrapping of a token.
- Winding Up
- Winding Up is the wrapping of a token.
- Window Proof of Spacetime (WindowPoSpacetime)
- Window Proof of Spacetime (WindowPoSpacetime) is a mechanism of checking the storage miners of Filecoin to see if they are fulfilling their storage commitments.
- Withdrawal Allowlist
- Withdrawal Allowlist is a list containing wallet addresses that tokens may only be transferred to. Tokens shall not be transferred to wallets that are not on the list.
- World Wide Web Consortium (W3C)
- World Wide Web Consortium (W3C) is the international organization that manages major web technologies.
- Worldwide Asset eXchange (WAX)
- Worldwide Asset eXchange (WAX) is a prominent cryptocurrency exchange that is accessible to entities from all parts of the world.
- Wrapped Bitcoin (wBTC)
- Wrapped Bitcoin (wBTC) is a Bitcoin token on the Ethereum platform.
- Wrapped Ether (wETH)
- Wrapped Ether (wETH) is an Ether token on another ERC-20 platform.
- Wrapping
- Wrapping is the bringing of tokens of a cryptocurrency platform to another cryptocurrency platform.
X
Y
- YFI Token
- YFI Token is one of the currencies of Yearn.Finance.
- YTD
- YTD is an abbreviation of “Year-to-Date”.
- Yearn Improvement Proposal (YIP)
- Yearn Improvement Proposal is a proposal that was created by a member of Yearn. Finance, to propose an improvement to the platform.
- Yearn.Finance
- Yearn.Finance is a decentralized community with the collective aim of creating financial products on top of Ethereum.
- Yield Farming
- Yield Farming is a way of making money from a cryptocurrency, by investing in decentralized finance markets.
- Yield Sensitivity
- Yield Sensitivity is a measure of how much a fixed-income asset price moves when its interest rate changes.
- yToken
- yToken is one of the tokens of the Yearn.Finance platform. The token is derived.
- yVaults
- yVaults is an automation of the yield farming process in the Yearn.Finance platform.
Z
- Z-Address
- Z-Address is the second type of address of Zcash. It offers more privacy compared to the T-address.
- Zcash (ZEC)
- Zcash (ZEC) is a cryptocurrency platform. Its selling point is that it offers much better privacy, compared to most other platforms.
- Zerion
- Zerion is an interface for decentralized finance (DeFi) investors, to manage their portfolios.
- Zero Confirmation Transaction
- Zero Confirmation Transaction is a transaction that is yet to be verified and validated.
- Zero-Knowledge Proof
- Zero-Knowledge Proof is a way of proving to know something without revealing that thing itself.
- zk-SNARK
- zk-SNARK is an acronym of Zero-Knowledge Succinct Non-Interactive Argument of Knowledge. It is a way of carrying out “Zero-Knowledge Proof”.
cryptocurrency dictionary
Cryptocurrency Dictionary
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]
[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]
[/vc_column_text][/vc_column][/vc_row]