Trang chủ » blog » Crypto Glossary of Terms And Jargon | CoinMarketCap

Crypto Glossary of Terms And Jargon | CoinMarketCap

S&P 500 (Standard and Poor’s 500)

The Standard and Poor ‘s 500, besides known as S & P 500, is a lineage market index that represents a list of 500 populace companies located in the U.S and their performance in the marketplace .

Satoshi (SATS)

The smallest unit of bitcoin with a value of 0.00000001 BTC .

Satoshi Nakamoto

The individual or group of individuals that created Bitcoin .

Scaling Problem

The scale problem is the limitations of a blockchain ‘s transaction throughout and ability to have fast and low cast transactions.

Scaling Solution

A scale solution is a method acting of enable a system to expand .


A scheme that is designed to dupe people out of cash or crypto .


Coins that are created as “ get rich quick schemes ” by their developers are referred to as a scamcoin .


A swindler is person that participates in a deceitful scheme .


A eruditeness is a popular exercise in the Axie Infinity universe where managers lend their free Axies to new players ( scholars ) and earn passively from the struggle rewards .


A calculator script is a list of commands that are executed by a certain course of study or script terminology .


An alternative proof-of-work ( PoW ) algorithm to SHA-256, used in Bitcoin mine. Scrypt mining relies more heavily on memory than on arrant CPU might, aiming to reduce the advantage that ASICs have and hence increasing network engagement and energy efficiency .

Second-Layer Solutions

A fit of solutions built on top of a public blockchain to extend its scalability and efficiency, specially for micro-transactions or actions. Examples include Plasma, TrueBit, Lightning Network and more .

Secondary Market

A secondary market is a place where investors or traders can buy and sell different kinds of assets or securities that they own, with others .

Secure Element

A procure component is a type of hardware chip that runs a pin down issue of applications .

Secure Multi-Party Computation (sMPC)

SMPC is a subfield of cryptography that allows parties to compute a function while keeping the inputs private .

Securities and Exchange Commission (SEC)

An independent means of the United States union government, responsible for enforcing federal securities laws, proposing securities rules, and regulating the securities industry, the nation ‘s stock and options exchanges, and other relate activities and organizations .


The term securities refers to a fungible and tradable fiscal instrument that carries a character of monetary measure .

Security Token

A security token is basically a digital form of traditional securities .

Security Token Offering

A security keepsake offer ( STO ) is a public offer where tokenized digital securities are sold .

Seed Phrase

A single begin point when deriving keys for a deterministic wallet .

Segregated Witness (SegWit)

A Bitcoin Improvement Proposal ( BIP ) that aimed to fix transaction malleability on Bitcoin .

Selfish Mining

A situation in which a miner mines a new block but does not broadcast this raw block to the other miners .

Sell Wall

A position where a large limit order has been placed to sell when a cryptocurrency reaches a certain rate .

Semantic Web

The ambition of the Semantic Web is to enable computers to manipulate information on our behalf .


colony refers to the summons in which a exploiter executes limit or commercialize orders on an order-book-based DEX .

Settlement Layer

A settlement layer is a level that basically provides an anchor for an entire ecosystem .


A cryptanalytic hash function that generates a 256-bit signature for a text, used in Bitcoin proof-of-work ( PoW ) .


basically, a shard is a fortune of a blockchain network that has been split into multiple shards, which has its own data .

Shard Chain

In the worldly concern of cryptocurrencies, sharding can reduce the net congestion a well as increase transactions per second through the creation of new chains


Sharding is a scale approach that enables separate of blockchain states into partitions containing states and transaction history, so that each shard can be processed in parallel .

Shelley Phase

The second era of Cardano – Shelley Phase is named after Percy Shelley, an english Poet .

Shiba Inu Token (SHIB)

The Shiba Inu token ( SHIB ), is a decentralized memecoin based on the Ethereum network .

Shielded Address

A harbor address is generated for a harbor transaction, where a payment is made using the blockchain network by keeping the associate information private .


The act of enthusiastically promoting a cryptocurrency or ICO stick out .


A coin with no obvious potential value or custom .

SHO (Strong Holder Offering)

A potent holder offer ( SHO ) is a fund-raise mechanism where eligible investors are chosen based on their on-chain activities and early proprietorship data sets .


A trade technique in which a trader borrows an asset in order to sell it, with the expectation that the price will continue to decline. In the consequence that the price does decline, the curtly seller will then buy the asset at this lower price in order to return it to the lender of the asset, making the remainder in net income .

Side Chain

A blockchain ledger that runs in parallel to a primary blockchain, where there is a two-way connection between the primary chain and sidechain .

Side Channel Attack

A english duct assail is a hacking method that exploits a computer ’ south implicit in “ tells ” that unintentionally convey information .


Signals are a call to action to either buy or sell an asset .

Silk Road

An on-line black marketplace that existed on the dark web, now shut down by the FBI .


A type of victimize that exploits two-factor authentication measures .

Simplified Payment Verification (SPV)

A lightweight customer to verify blockchain transactions .


A chopine built on Sia blockchain for decentralized message memory .


slippage happens when traders have to settle for a different price than what they initially requested due to a price movement .

Slot (Cardano)

The smallest time period in the Cardano blockchain.

Smart Contract

A smart shrink is a calculator protocol intended to facilitate, verify or enforce a contract on the blockchain without third parties .

Smart Contract Audit

A smart sign audit is a security check done by cybersecurity professionals meant to ensure that the on-chain code behind a smart sign is barren of bugs or security vulnerabilities .

Smart Home

A smart home is a technology that allows to manage and automate family systems, such as lights, doors, thermostats, security alarms, and other connect equipment from a outdistance .

Smart Token

smart tokens are plainly regular tokens that not entirely transmit value they contain but besides all the information needed to execute a transaction simultaneously .


A snapshot in the blockchain earth is the act of documenting the status of a blockchain at a specific block height .

Social Engineering

Social technology is the use of magic trick to manipulate people into performing an carry through or giving away their mystery information .

Soft Cap

The minimum come that an initial coin offer ( ICO ) wants to raise .

Soft Fork (Blockchain)

A protocol upgrade where lone previously valid transactions are made invalid, with most soft forks requiring miners to upgrade their mining software .

Soft Peg

In finance, a soft pin is a method acting of keeping the value of a currency within a certain rate against a substitute currency by using an exchange rate government .

Software Library

A software library is a solicitation of code that can be referenced while developing early feasible programs .

Software Stack

Software smokestack refers to a fix of software products or components that work together to provide a particular serve .

Software Wallet

A software wallet, besides known as a wallet app, is an application that allows users to HODL, send, and get cryptocurrencies .


The program linguistic process used by Ethereum for developing fresh contracts .

Source Code

A collection of lines or computer-executable commands written in a high-level linguistic process is called a source code .


A limited aim acquisition company ( SPAC ) is formed by investors in arrange to publicly list an constitution without going through the troubles that come with the traditional IPO process .

Spear Phishing

spear phishing is a personalized, target cyber attack that uses your sake to trick you into clicking a malicious yoke in an e-mail .

Speculative Investment

notional investment is an investment where the investor expects a high return with a significant gamble of passing .

Spoon (Blockchain)

A hard spoon is a meta-protocol that exists on top of a blockchain .


A contract or transaction buying or selling a cryptocurrency for immediate liquidation, or payment and delivery, of the cryptocurrency on the market .

Spot Market

A public marketplace in which cryptocurrencies are traded for immediate settlement. It contrasts with a futures market, in which settlement is due at a late go steady .

Spot Trading

spot deal involves the contiguous exchange of a fiscal legal document at the current price .


Spyware is a malware that records all of the activities on an electronic device .


A cryptocurrency with highly humble volatility, sometimes used as a mean of portfolio diversification. Examples include gold-backed cryptocurrency or fiat-pegged cryptocurrency .


engagement in a proof-of-stake ( PoS ) system to put your tokens in to serve as a validator to the blockchain and receive rewards .

Staking Pool

Staking Pools allows users to combine their resources in order to increase their chances of earning rewards. This mechanism offers more staking world power to the net to verify and validate new blocks .

Stale Block

A block which was successfully mined but not included on the current longest blockchain, normally because another auction block at the like stature was added to the chain first .

State Channel

A second-layer scale solution that reduces the total on-chain transactions necessary, moving the transactions off-chain and letting participants sign to the main chain after multiple off-chain transactions .

Stochastic Oscillator

A stochastic oscillator is a popular technical indicator used for identifying overbought and oversold stock/asset/cryptocurrency levels that rely on an asset ‘s price history, as it tend to fluctuate within a specific price range..

Stop-Loss Order

A stop-loss regulate in trade allows investors to determine the lowest price at which they are will to sell an asset and gun trigger an automatic pistol betray regulate when and if this price is reached .

Storage (Decentralized)

Decentralized storage refers to the concept of storing files online by splitting them into encrypted fragments and delegating these fragments to multiple nodes on a circulate network, e.g. a blockchain .

Storage Miners

storage miners are cryptocurrency miners who rely on offering sufficient memory space for nodes to reach consensus and validate transactions .

Store of Value

A store of respect is an asset, commodity or currency that can be saved, retrieved a well as exchanged in the future without it losing any respect .

Subgraph Manifest

A part of Subgraph that entails information pertaining to subgraph ’ s data sources, templates, and more .


Substrate is a web app development model developed by Parity Technologies .


A supercomputer is a superior version of a general-purpose computer, which has a significantly increased capacitance and processing exponent .

Supply and Demand

supply and demand are the levels in an economy that determine the market ‘s willingness to buy or sell assets or services, respectively .

Supply Chain

A supply chain is the collection of steps that a merchandise or service needs to go through ahead reaching the final customer .

Supply Chain Attack

A issue chain attack is a tactic used by hackers to compromise third-party suppliers to major corporations, governments and organizations to gain valuable information .


A drove is a group of peers that are sharing the lapp flood .

Swing Failure Pattern (SFP)

A swing failure convention ( SFP ) is a tendency reversal indicator that can be used to discover a helplessness in the current tendency and identify early reversal signs .

Swing Trading

Swing trade is a commercialize trading proficiency that aims to profit from short to medium-term price changes in stocks, commodities, and/or currencies over a menstruation of days or weeks.

Sybil Attack

Sybil attacks undermine an on-line network by creating many IDs, accounts or nodes to upset the libra of power .


The heart of a cryptocurrency ; for example, Bitcoin ‘s symbol is BTC .

Synthetic Asset

synthetic assets, sometimes referred to as synths, are a combination of cryptocurrencies and traditional derivative instrument assets. In other words, synths are tokenized derivatives .

reservoir :
Category : Economy

Post navigation

Leave a Comment

Trả lời

Email của bạn sẽ không được hiển thị công khai. Các trường bắt buộc được đánh dấu *