Atomic Swaps – The transfer of a digital asset from one party to another, without the use of an exchange or other intermediary (Peer to Peer Transfer).
Decentralized Network: System where components operate on local information to accomplish goals, rather than the result of a central ordering influence (this is about decision locality)
Federated Network: A cohesive unit formed of smaller sub units which collaborate to form the whole, but which retain significant local autonomy. (this is about retaining some autonomy)
Distributed Network: System in which computation is distributed across components, which communicate and coordinate their actions by passing messages. The components interact with each other in order to achieve a common goal. (this is about communication and message passing)
Peer-to-Peer Network: System in which a set of peers are equally privileged, equipotent participants in collaborative goals. (this is about equipotency)
Address: Digital Asset addresses are used to send or receive transactions on the network. An address usually presents itself as a string of alphanumeric characters. You have a Private Address/Key that connects to a Public Address/Key for security reasons.
ASIC: Short form for ‘Application Specific Integrated Circuit’. Often compared to GPUs, ASICs are specially made for mining and may offer significant power savings.
Bitcoin: Bitcoin is the first decentralized, open source cryptocurrency that runs on a global peer to peer network, without the need for middlemen and a centralized issuer.
Block: Blocks are packages of data that carry permanently recorded data on the blockchain network.
Blockchain: A blockchain is a shared ledger where transactions are permanently recorded by appending blocks. The blockchain serves as a historical record of all transactions that ever occurred, from the genesis block to the latest block, hence the name blockchain.
Block Explorer: Block explorer is an online tool to view all transactions, past and current, on the blockchain. They provide useful information such as network hash rate and transaction growth.
Block Height: The number of blocks connected on the blockchain.
Block Reward: A form of incentive for the miner who successfully calculated the hash in a block during mining. Verification of transactions on the blockchain generates new coins in the process, and the miner is rewarded a portion of those. There is no mining on Pecu Novus.
Central Ledger: A ledger maintained by a central agency.
Confirmation: The successful act of hashing a transaction and adding it to the blockchain.
Consensus: Consensus is achieved when all participants of the network agree on the validity of the transactions, ensuring that the ledgers are exact copies of each other.
Cryptocurrency: Also known as tokens, cryptocurrencies are representations of digital assets.
Cryptographic Hash Function: Cryptographic hashes produce a fixed-size and unique hash value from variable-size transaction input. The SHA-256 computational algorithm is an example of a cryptographic hash. Pecu Novus utilizes SHA-512 to ensure the highest level of security.
Dapp: A decentralized application (Dapp) is an application that is open source, operates autonomously, has its data stored on a blockchain, incentivised in the form of cryptographic tokens and operates on a protocol that shows proof of value.
DAO: Decentralized Autonomous Organizations can be thought of as corporations that run without any human intervention and surrender all forms of control to an incorruptible set of business rules.
Distributed Ledger: Distributed ledgers are ledgers in which data is stored across a network of decentralized nodes. A distributed ledger does not have to have its own currency and may be permissioned and private.
Distributed Network: A type of network where processing power and data are spread over the nodes rather than having a centralized data center.
Difficulty: This refers to how easily a data block of transaction information can be mined successfully.
Digital Signature: A digital code generated by public key encryption that is attached to an electronically transmitted document to verify its contents and the sender’s identity.
Double Spending: Double spending occurs when a sum of money is spent more than once.
Ethereum: Ethereum is a blockchain-based decentralized platform for apps that run smart contracts, and is aimed at solving issues associated with censorship, fraud and third party interference.
EVM: The Ethereum Virtual Machine (EVM) is a Turing complete virtual machine that allows anyone to execute arbitrary EVM Byte Code. Every Ethereum node runs on the EVM to maintain consensus across the blockchain.
Fork: Forks create an alternate version of the blockchain, leaving two blockchains to run simultaneously on different parts of the network.
Genesis Block: The first or first few blocks of a blockchain.
Hard Fork: A type of fork that renders previously invalid transactions valid, and vice versa. This type of fork requires all nodes and users to upgrade to the latest version of the protocol software.
Hash: The act of performing a hash function on the output data. This is used for confirming coin transactions.
Hash Rate: Measurement of performance for the mining rig is expressed in hashes per second.
Howey Test: The Howey Test refers to the U.S. Supreme Court case for determining whether a transaction qualifies as an “investment contract,” and therefore would be considered a security and subject to disclosure and registration requirements under the Securities Act of 1933 and the Securities Exchange Act of 1934.
Hybrid PoS/PoW: A hybrid PoS/PoW allows for both Proof of Stake and Proof of Work as consensus distribution algorithms on the network. In this method, a balance between miners and voters (holders) may be achieved, creating a system of community-based governance by both insiders (holders) and outsiders (miners).
Mining: Mining is the act of validating blockchain transactions. The necessity of validation warrants an incentive for the miners, usually in the form of coins. In this cryptocurrency boom, mining can be a lucrative business when done properly. By choosing the most efficient and suitable hardware and mining target, mining can produce a stable form of passive income.
Multi-Signature: Multi-signature addresses provide an added layer of security by requiring more than one key to authorize a transaction.
Node: A copy of the ledger operated by a participant of the blockchain network.
Oracles: Oracles work as a bridge between the real world and the blockchain by providing data to the smart contracts.
Peer to Peer: Peer to Peer (P2P) refers to the decentralized interactions between two parties or more in a highly-interconnected network. Participants of a P2P network deal directly with each other through a single mediation point.
Public Address: A public address is the cryptographic hash of a public key. They act as email addresses that can be published anywhere, unlike private keys.
Private Key: A private key is a string of data that allows you to access the tokens in a specific wallet. They act as passwords that are kept hidden from anyone but the owner of the address.
Proof of Stake: A consensus distribution algorithm that rewards earnings based on the number of coins you own or hold. The more you invest in the coin, the more you gain by mining with this protocol.
Proof of Time: A consensus distribution algorithm that was created by the Pecu Novus Network which rewards PECU based on the time a validator node is active. It promotes global inclusion as opposed to staking a cryptocurrency to gain rewards. It strengthens the security, scalability and speed of the entire network.
Proof of Work: A consensus distribution algorithm that requires an active role in mining data blocks, often consuming resources, such as electricity. The more ‘work’ you do or the more computational power you provide, the more coins you are rewarded with.
Scrypt: Scrypt is a type of cryptographic algorithm and is used by Litecoin. Compared to SHA256, this is quicker as it does not use up as much processing time.
SHA-256: SHA-256 is a cryptographic algorithm used by cryptocurrencies such as Bitcoin. However, it uses a lot of computing power and processing time, forcing miners to form mining pools to capture gains.
Smart Contracts: Smart contracts encode business rules in a programmable language onto the blockchain and are enforced by the participants of the network.
Soft Fork: A soft fork differs from a hard fork in that only previously valid transactions are made invalid. Since old nodes recognize the new blocks as valid, a soft fork is essentially backward-compatible. This type of fork requires most miners upgrading in order to enforce, while a hard fork requires all nodes to agree on the new version.
Solidity: Solidity is Ethereum’s programming language for developing smart contracts.
Testnet: A test blockchain used by developers to prevent expending assets on the main chain.
Transaction Block: A collection of transactions gathered into a block that can then be hashed and added to the blockchain.
Transaction Fee: Most cryptocurrency transactions involve a small transaction fee. These transaction fees add up to account for the block reward that a miner receives when he successfully processes a block.
Turing Complete: Turing complete refers to the ability of a machine to perform calculations that any other programmable computer is capable of. An example of this is the Ethereum Virtual Machine (EVM).
Validators: A validator node is a special type of node that participates in the “consensus” process. By participating in consensus, validator nodes become responsible for verifying, and adding a transaction to the block.
Wallet: A file that houses private keys. It usually contains a software client which allows access to view and create transactions on a specific blockchain that the wallet is designed for.
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.