Block Chain PowerPoint
Block Chain PowerPoint
Block Chain PowerPoint
The timestamp proves that the transaction data existed when the block
was published in order to get into its hash.
As blocks each contain information about the block previous to it, they
form a chain, with each additional block reinforcing the ones before it.
02 Decentralization
By storing data across its peer-to-peer network, the blockchain eliminates a
number of risks that come with data being held centrally.
Openess
03 Open blockchains are more user-friendly than some traditional ownership records,
which, while open to the public, still require physical access to view.
Standardisation
04 Blockchain technologies show much potential as it provide capabilities that cannot
normally be met in any other way if the requirement of interoperability between
blockchains and with other technologies is met.
How Blockchain Works
Requesting a
transaction Verification
Validation
A block is created
Transaction is completed The block joins the chains
Distributed Ledger
A distributed ledger(also called a shared
ledger or distributed ledger technology or DLT) is a
consensus of replicated, shared, and synchronized
digital data geographically spread across multiple sites,
countries, or institutions. Unlike with a centralized
database, there is no central administrator.
Distributed Ledger
Anonymous Immutable
The identity of participants is either anonymous or Any validated records are irriversible and cannot be
pseudonymous. changed.
Time-Stamped
A transaction timestamp is recorded in a block.
Blockchain Hashing
Hashing in blockchain refers to the process of having
an input item of whatever length reflecting an output
item of a fixed length.
01 02 03 04
A public blockchain A private blockchain A hybrid blockchain has a A sidechain is a
has absolutely no
access restrictions. is permissioned. combination of centralized designation for a blockchain
and decentralized features. ledger that runs in
Anyone with an Internet One cannot join it The exact workings parallel to a primary
connectioncan send unless invited by of the chain can vary blockchain.
transactions to it as well the network administrators. based on which portions Entries from the primary
as become a validator. Participant and validator of centralization decentralization blockchain can be linked to
Example- Bitcoin and ethereum access is restricted. are used. and from the sidechain.
blockchain DLT is used for private
blockchains.
Content Here Content Here
You can simply impress your audience You can simply impress your audience
and add a unique zing and appeal to and add a unique zing and appeal to
your Reports. your Reports.
To get started with Bitcoin you would first need to download a Bitcoin
‘wallet’ to your desktop or mobile device. The wallet is used to both
store Bitcoin securely and to make transactions.
Your wallet generates ‘public keys’ of 34 letters and numbers (think of
this as an email address) that can be shared with anyone you want to
make a transaction with. Addresses should only be used once.
When making a transaction, two wallets will connect with each other
via the ‘public key’ and then the transaction is signed off by the ‘private
key’ (think of this as a PIN or password) which is stored in the wallet
releasing the funds.
Once a transaction has been made, it’s broadcast to the Blockchain
network for recording. This is the ‘mining’ process that involves
validating the transaction and recording it into a block.
Once the transaction is verified and recorded across the network, it
cannot be changed and becomes a permanent record.
How secure is Bitcoin?