wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

What is Minting & Mining

profile
shaikh fatma
Apr 30, 2023
0 Likes
0 Discussions
204 Reads

MINTING:- Minting crypto is the process of generating new coins by authenticating data, creating new blocks, and recording the information onto the blockchain through a “proof of stake” protocol.
Minting in simple term means "to produce something new, especially to invent a new phrase or word".
Money minting refers to the process of producing coins. A mint refers to a manufacturing facility that produces coins that are used as a nation's currency. National currencies are generally minted by a country's central bank or through an independent mint with authorization from the central bank.
MINING:- The term 'Blockchain mining' is used to describe the process of adding transaction records to the bitcoin blockchain. This process of adding blocks to the Blockchain is how transactions are processed and how money moves around securely on Bitcoins.

Bitcoin mining is the process by which Bitcoin transactions are validated digitally on the Bitcoin network and added to the blockchain ledger. It is done by solving complex cryptographic hash puzzles to verify blocks of transactions that are updated on the decentralized blockchain ledger.

 

 

Minting often uses the PoS consensus mechanism, which relies on validators or stakers to verify transactions and add new blocks to the blockchain.

Mining typically uses the PoW consensus mechanism, which requires a lot of computational power and energy to validate transactions and add new blocks to the blockchain.

DIFFERENCE :-


Comments ()


Sign in

Read Next

gis substation

Blog banner

Memory Management in an Operating System

Blog banner

What do you mean by online marketing and why do you need to know about it

Blog banner

Demystifying Cryptography: A Beginner's Guide

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

COMFORT IS ALL ABOUT FASHION

Blog banner

MOBILE DEVICE FORENSIC

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

MACHINE LEARNING

Blog banner

Why You Need 2FA (Two-Factor Authentication) On Your Email And Other Online Accounts

Blog banner

Virtual machine and virtualizing

Blog banner

10 Reasons Why Guy BestFriends are the Must in Every Girl's Life

Blog banner

Predictive Analytics: How Data Science Predicts Trends(Weather ,Stock Market,Sales Forecasting ).

Blog banner

A Review on Data Acquisition in Cyber Forensics

Blog banner

Defining youtubr

Blog banner

Getting into anime My anime suggestions

Blog banner

LEMON PICKLE SWEET AND MILD HOT

Blog banner

Some web vulnerabilities

Blog banner

Virtual memory in windows

Blog banner

Understanding - Proof of Work!

Blog banner

INTRODUCTION TO C#

Blog banner

Stephen Hawking : A Remarkable Physicist

Blog banner

File sharing

Blog banner

Data Security and Data Privacy in Data Science

Blog banner

Bitcoin sent using radio waves! No internet!

Blog banner

Street foods

Blog banner

Understanding Input Based Keylogger Activation Systems: Risks and Mitigation

Blog banner

Electronic data interchange

Blog banner

Juveniles, Internet and Computer Crime

Blog banner

1 Dentist in Maroubra, Sydney and her 10 obsessions

Blog banner

A Statistical Analysis of Player Performance and their Value in cricket

Blog banner

Docker Framework

Blog banner

Why am I never satisfied with my Life?

Blog banner

Evolution of Operating System

Blog banner

Components of GIS

Blog banner

Cache memory

Blog banner

Full Disk Encryption

Blog banner

Deadlock and starvation in operating system

Blog banner

Service stratergy principles

Blog banner

A-B-C of Networking: Part-1 (Basics)

Blog banner

Landslide Hazard

Blog banner

Processes: Process Description and Control.

Blog banner