Skip to main content

Blockchain the future of money transaction

Today I am back with new topic so learn about it.

Reserve bank banned the transaction of Bitcoin and say the he use the technology of Block chain to transfer of money but the main question is that what is in the Block chain why all the government are ready to accept the technology of Block chain in the simple words the transaction of money one to another account is being fast, simple and secure.

HOW BLOCK CHAIN WORKS ?

Block chain is the alternate this technology is not in control in any bank or INDIVISUALLY and this is the centralized conduct, in this technology transaction prosperous among two people in this technology money transfer very fast those people using Block chain who knows very well and it's free off cost and it can't be hacked simply so your info will be secure in Block chain.

WORKS LIKE OPEN LAZOR

In the Block chain there is a OPEN LAZOR  concept. You know that all bank have a ledger and record all the transaction and they are limited to bank staff but in the OPEN LAZOR system anybody can see the recent transaction among person but they can't see how much money send among that people and they we called OPEN LAZOR and one more thing in the world millions of computers are run for the Block chain and they we knows as Node and as you know all the transaction are stored in the nodes for the security the ledger stored in the Node will be synchronized and will be updated in every ten minutes so for hackers this is very hard to hack the Block chain system.

WHAT IS THE ROLE OF BANK IN BLOCK CHAIN

What bank do the bank accomplished your money transfer the same work do on the international stage whose we talk about past the LAZOR technique this will make the block and they interconnect with our past and present transaction and if someone try to see still your data system will inform your right now and they encrypt your data more securely and you are now secured so that's why the Block chain system is so secure than other.

WHERE WE CAN USE THE  BLOCK CHAIN

For information technology, data management, police records, banking Information and many more.

This is the open system so you can't imagine how many Nodes are run for Block chain if hacker hack more than one hundred computer hacker can't still the all Block chain system data if hacker have to hack full Block chain system then hacker have to hack more than half Node runs in  all over the world  so I think you learn all about the Block chain and how it's work.

THANKS FRIENDS TO READ MY ARTICLE

NEW TIPS FOR TECH

Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet