Facebook pixel

Blockchain (n.)

Accuracy in the digital world.

Component Legend

The section below shows mock ups of all of the components which can be used on FAQ and lesson pages.

Definitions

HASHING

Creating a unique identifier for a specific piece of data.

Notes

plain text body of the note. Will be prefixed with the word 'NOTE:' in bold.

Callouts

Title

html formatted string for the body of the callout

Code Snippets

The title of the snippet

1 Lines of code
2 for(as many as you need) {
3 indented with spaces
4 }

Terminal

>_

The title of the example

alex@ubuntu: ~/ $ A list of commands
alex@ubuntu: ~/ $ separated by commas
alex@ubuntu: ~/ $ and including a

Image Gallery Lightbox

The title of the gallery

The title of the gallery The title of the gallery The title of the gallery The title of the gallery The title of the gallery The title of the gallery

Images With Captions

The Token Lifecycle

The Token Lifecycle

1. Tokens are distributed as rewards when a new block is mined. 2. ...

Image with Text Callout

Images with right aligned callouts can be used when listing brands or concepts that each have an associated image. The images will have a circular border.
CryptoKitties

CryptoKitties

A popular collectible dApp released in 2017. Users could bid on digital cats in the form of ERC-721 tokens. This proved to be one of the first “viral” dApps which rapidly gained popularity. As a result, the Ethereum network quickly became overloaded, as it could not process the transactions that were being conducted, resulting in a backlog and very high fees. This incident displayed the limitations of the Ethereum blockchain and showed that the network would have to scale to meet real-world demand.

Big Quotes

Public-key cryptography, or asymmetric cryptography, is a cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner. The generation of such keys depends on cryptographic algorithms based on mathematical problems to produce one-way functions. Effective security only requires keeping the private key private; the public key can be openly distributed without compromising security. Wikipedia