A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | Y | Z
When a cryptocurrency has been sold by more and more investors over time, with its price decreasing for an extended period of time.
Trade between one cryptocurrency and another, for example, the trading pair BTC/ETH.
Paper trading or simulated trading is the practice of using a virtual transactional environment to simulate trading without the use of real capital.
A physical document containing your private key or seed phrase.
Parachains are application-specific data structures that run in parallel to each other within Polkadot.
Participation nodes are present in the Algorand platform to help in conducting the Pure Proof of Stake (PPoS) consensus process.
Passive income is money produced from investments that do not require the earner to be actively involved.
A password manager is a tool or software that stores all sorts of passwords needed for online applications and services.
Paul Le Roux is a criminal kingpin that many believe could be the founder of Bitcoin, Satoshi Nakamoto.
A payee is a party within an exchange of goods or even services that can receive payment.
The decentralized interactions between parties in a distributed network, partitioning tasks or workloads between peers.
Crypto P2P lending refers to a practice of lending assets without the involvement of a middleman. Such loans rely on collateral material originally owned by borrowers.
A “peg” is a specified price for the rate of exchange between two assets.
A stablecoin is a currency whose value is pegged to a real-world asset, such as a fiat currency.
A ledger designed with restrictions, such that only people or organizations requiring access have permission to access it.
Often used to describe blockchains, a system is said to be permissionless when there is no entity that can regulate who can use it and how it can be used.
A perpetual contract is a derivative similar to a futures contract but without an expiry date.
When a scammer pretends to be a trusted institution or person to trick people into revealing sensitive information such as Social Security numbers, passwords, banking details, etc., often through a malware link disguised as legitimate.
Phone phishing, also known as a telephone scam or vishing (voice phishing), refers to the practice of using fraudulent and malicious phone calls to extort money or sensitive information from victims.
A physical Bitcoin is a physical token that usually has an intricate design, as well as a public key and private key.
On CoinMarketCap, platform refers to the parent blockchain of tokens. It may also refer to a cryptocurrency exchange on which you may trade cryptocurrencies.
The play-to-earn business model supports the notion of an open economy and gives financial rewards to players who bring value to its metaverse.
The play-to-earn business model supports the notion of an open economy and gives financial rewards to players who bring value to its metaverse.
Player payouts is a new way of automatically paying online gaming participants immediately after the tournament ends.
A fraudulent investment involving the payment of purported returns to existing investors from funds contributed by new investors.
A collection of cryptocurrencies or crypto assets held by an investment company, hedge fund, financial institution or individual.
The retroactive creation of new coins following a cryptocurrency’s launch, before public mining is possible.
Pre-IDO refers to token offerings before the actual initial DEX offering (IDO) takes place.
When some or all of a coin’s initial supply is generated during or before the public launch.
The sale of a cryptocurrency, ahead of it going public, to specific investors.
Prediction Markets are exchange-traded markets where the future outcomes of events are traded. It indicates the confidence of the crowd in a specific future event.
The difference between market price and estimated price due to trade size.
A private blockchain is a type of blockchain in which only a single organization has authority over the network.
A piece of code generated in asymmetric-key encryption process, paired with a public key, to be used in decrypting information hashed with the public key.
Programmability implies that something is capable of following instructions.
Proof of Attendance Protocol (POAP) refers to a business offering to use the ERC-721 NFT protocol on Ethereum to ascribe individuals a unique, non-fungible blockchain-based identifier that only the person can access