BountyBy bijok_adam | Updated on May 24, 2020
Much like the Bounties of the Wild West, but no dead cowboys needed. Crypto bounties are usually tasks available for "bounty hunters" to complete certain simple tasks such as liking a social media post, following a profile and other.
Total processing power of a blockchain or what is the same, are the amount of hash values that can be made in a period of time.
This type of auction has a fixed price per token that is sold on a first-come-first-serve basis.
A Merkle tree is also known as a hash tree in cryptography. It is a tree where every lead node is labelled with cryptographic hash of a data block, and every non-leaf node is labelled with the hash of the labels of its child nodes. It is used to verify of data stored within it and transferable in and between computers.
A consensus algorthm that assigns block validation queue based on the coins/token burned by the validator.
Hungry for more knowledge?Back to Glossary or Subscribe to our newsletter.