Sign In
Not register? Register Now!
You are here: HomeEssayIT & Computer Science
Pages:
4 pages/≈1100 words
Sources:
2 Sources
Level:
APA
Subject:
IT & Computer Science
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.6
Topic:

Types of Cryptocurrencies (Essay Sample)

Instructions:

this sample talks about the different types of cryptocurrencies, their similarities and differencences. IT EXPLAINS CRYPTOCURENCY AS A decentralized form of money. THIS SAMPLE BROADLY TALKS OF THE TWO TYPES OF CRYPTOCURENCIES, THAT IS BTCOIN AND ETHERUM. THE SAMPLE DESCRIBES BITCOIN AS a form of digital currency that works on cryptography, and hence it is more secure than most other forms of transactions. IT FURTHER EXPLAINS THAT Bitcoin was developed as an alternative to traditional currencies to reduce corruption and the black market; its unregulated nature allows for this purpose. THE SAMPLE FURTHER EXPLAINS Ethereum AS a blockchain-based open software platform, enabling developers to build and deploy decentralized applications. THE MAIN SIMILARITY AS THE SAMPLE CLAIMS IS THAT both Bitcoin and Ethereum are decentralized forms of money that no one
can control.WHERES, THE MAIN DIFFERENCE FROM THE SAMPLE IS THAT Bitcoin was created purely as an alternative to regular money, whereas Ethereum has tokens called “ether” that can be traded or used to send messages through its blockchain.

source..
Content:

Types of Cryptocurrencies
Cryptocurrencies
A cryptocurrency is a decentralized form of money. A decentralized system is a system in which no one can control it, and everyone has an equal say in the transactions carried out. There is no central authority that manages the cryptocurrency, and thus there are no service charges and transactions fees. Cryptocurrency is the latest trend in digital payment methods. The user base of cryptocurrencies such as Bitcoin and Ethereum is increasing exponentially worldwide.
Bitcoin
Bitcoin is the first-ever cryptocurrency created in 2009! It was created by someone under the pseudonym of Satoshi Nakamoto (Churchill, 2015). It is a form of digital currency that works on cryptography, and hence it is more secure than most other forms of transactions. Bitcoin was developed as an alternative to traditional currencies to reduce corruption and the black market; its unregulated nature allows for this purpose.  Banks are no longer needed because Bitcoin acts as an online bank itself, with its users operating their money supply directly from their digital wallets. Bitcoin can also be used as an investment since it is available for trade on several online exchanges.  As a store of value, users can hold their Bitcoin until the prices go up and then sells them off. Bitcoin users are not tied to any particular country: they can send and receive bitcoins anonymously.
Ethereum
Ethereum is a blockchain-based open software platform, enabling developers to build and deploy decentralized applications. Ether is the cryptocurrency used for trading and investing on the Ethereum platform, and it also pays for transaction fees and computational services on the network (Dannen, 2017). Ethereum’s creators’ key aim was to develop a platform that allows users to write smart contracts on the blockchain easily.  These are then followed through without any third parties (middlemen). The Ethereum platform has since graduated from its ‘beta’ status to become a dominant player in the cryptocurrency ecosystem.

...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Home Network Architecture
    Description: My home network is primarily WLAN that includes route, switch a modem, and an amplifier primarily used to boost the strength of the single, thus making it reach far distances. The modem is primarily in charge of availing the data from the network, thus making it play a key role in the home network setup. ...
    1 page/≈275 words| 1 Source | APA | IT & Computer Science | Essay |
  • The Impact of Cybercrime Awareness among The Elderly Population
    Description: Since technology development, big data, social networks, and online transactions have dominated the world, sharing information through automated services. Information technology presents data breaches causing long-lasting risks, which is the widely accepted knowledge and the assumption by the elderly ...
    5 pages/≈1375 words| 4 Sources | APA | IT & Computer Science | Essay |
  • Disadvantages of Dynamic Host Configuration Protocol
    Description: DHCP automation poses a security risk in the event of a rogue DHCP server getting introduced into the network. The network personnel would not have control of a rogue network that could provide IP addresses to those connecting to the network. In addition, users connected to the rogue DHCP can have their ...
    2 pages/≈550 words| No Sources | APA | IT & Computer Science | Essay |
Need a Custom Essay Written?
First time 15% Discount!