123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computer-Programming >> View Article

Blockchain

Profile Picture
By Author: Wisemonkeys
Total Articles: 277
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Blockchain is a chain of blocks that contain information. Each block contains 3 elements, viz, transaction data, a hash of the block and a hash of the previous block. A data can be any raw data that is stored inside the block, it can be details of a transaction stating the sender, the receiver and the amount transferred, it can also be any medical records of patient along with patient’s name and basic information in it, etc. Every blockchain has a hash, hash is a cryptographic code. We can say that a hash is a fingerprint for a block, which means every block has a unique hash. If the data of the block has been changed it will cause in a change in the hash of the block. Thus making it more secure to know that if any block has been manipulated. A block also has a hash of its previous block, which makes it a chain of blocks as every block will show the connection to a previous block and making it a chain of blocks. If the data of any block is manipulated the hash of that particular block changes resulting in disruption in chain as the next block will not be linked to any block, because it holds the hash of the unchanged block.

The ...
... first block will always have the previous hash value as zero because it is not linked to any previous block and it is also called as the genesis block. These interconnected blocks supports the decentralization of systems and ensures that the data is securely distributed and publicly visible. People also say that blockchain is a public distributed ledger.

Blockchain uses a P2P network, Peer to Peer network, where everyone is allowed to join. In this, every user or node gets a full copy of the blockchain. If someone creates a new block, it is sent to everyone in the network. Each node verifies the block to check if it is tampered or not and then if everything goes right they will add the block to their chain of blocks. If a node changes or tampers any block then the whole copy is sent to all the nodes to verify if the transaction or change was valid then every node will accept the new blockchain or else will reject it. This gives security in data, if any hacker tries to change a block then he has to hack all the nodes to accept the change or change every block. This is quite difficult and thus makes the data more secure. In any centralized database system only the admin can alter the data, i.e. to add, remove and edit any row or column of the data, but in blockchain there is no centralised system, many transactions occur at the same time, so the one doing the transaction makes a new block which consists the details of the transaction. The node that created the block has to prove that the work done qualifies them to get the right to add a new transaction, i.e. a block. This method is a type of consensus method known as Proof-Of-Work.

Launched to world in 2017, Wisemonkeys(https://wisemonkeys.info/) is now a robust Learning management system.
Just follow a 3-step registration process and get connected. Since we appreciate genuine users and do not encourage spammers we follow small registration process:
1.Sign up(https://me.wisemonkeys.info/login)
2.Confirm your email. (for the first time the email might fall in your spam/junk/promotion folder. Please mark it not spam and confirm the link).
3.Login and get started.
4.Or Login via Google/Microsoft.

Our hardworking team is thriving hard to make this platform better and better. If you have any suggestions and feedback, then do write to us at: genius@wisemonkeys.info

Total Views: 416Word Count: 612See All articles From Author

Add Comment

Computer Programming Articles

1. Java Servlet Tutorial Made Simple: Everything You Need To Know To Get Started
Author: Tech Point

2. Complete Java Tutorial: A Guide For Students And Developers
Author: Tech Point

3. Using Redux Or Mobx With React.js And Laravel: A Comparison
Author: Andy

4. Why 2025 Is The Year To Invest In Android And Mern Stack App Development?
Author: Albert Smith

5. How Ai Developers Are Changing The Way We Code
Author: Alex Costa

6. Career Opportunities After Completing The Best Business Analytics Courses In Bhopal
Author: Rohan Rajput

7. Network Security Essentials For It Professionals
Author: TCCI - Tririd Computer Coaching Institute

8. Emerging Programming Languages To Watch In 2026
Author: TCCI - Tririd Computer Coaching Institute

9. Python Scipy Tutorial: Simplifying Scientific And Technical Computing
Author: Tech Point

10. Is Scalatra The Right Fit For Your Web Framework Needs? Why You Should Hire Scalatra Developers Today
Author: Stellanova GlobalTech

11. Why Office 365 Is The Smartest Choice For Modern Businesses
Author: michellumb44

12. Why Choose Bhopal For The Best Business Analytics Courses? A Student’s Guide
Author: Rohan Rajput

13. Top Devops Certification Course In Chennai | Industry-ready Skills
Author: login360

14. Beyond The Code: Key Considerations When You Hire Software Developers For Skill And Cultural Alignment
Author: Stellanova GlobalTech

15. How Cism Certification Can Boost Your Cybersecurity Career
Author: Johnny

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: