Position: Home page » Equipment » What does it mean to dig a miner

What does it mean to dig a miner

Publish: 2021-05-08 09:37:40
1.

mining: that is, bitcoin mining, is a process of using computer hardware to calculate the location of bitcoin and obtain it

2.

mining refers to the use of bitcoin mining machine to obtain bitcoin, that is, the computer used to earn bitcoin. If you can get bitcoin, you can make money this kind of computer generally has professional mining chips and works by installing a large number of graphics cards, which consumes a lot of power. The computer downloads the mining software and then runs a specific algorithm to get the corresponding bitcoin after communicating with the remote server

precautions:

1. It's better to use DIY mining machine, from purchasing accessories to assembly, and then to mining software, to learn, focus, practice and graally understand the blockchain

Mining is actually a fixed investment process: regardless of the currency price, a certain amount of positions will be increased every day

3. The bitcoin wallet used to store bitcoin uses military level encryption, which makes it impossible for hackers to steal easily. Bitcoin wallet also allows users to set two passwords, a public account password and a private password. The user of public account password is to let the user receive bitcoin. If users want to withdraw or transfer bitcoin from their accounts, they need to use a private password



3.

Bitcoin is actually a virtual currency. When bitcoin first appeared, if you want to get bitcoin, you have to get bitcoin through mining. Therefore, bitcoin mining appeared. But bitcoin mining is more and more difficult, so it is very difficult to get bitcoin now

so now many people use Haru miner digs Ethereum, Monroe and other virtual coins. Most importantly, BTC can be directly equivalent in the end

4.

Mining is the use of bitcoin mining machine, which is used to earn bitcoin

one of the ways to get bitcoin is that users download software from personal computer and then run specific algorithm to get corresponding bitcoin after communicating with remote server

bitcoin is a kind of virtual currency. Bitcoin mining system is the process of carrying out mathematical operation for bitcoin network through computer hardware. Miners who provide services can get a reward, because the network reward is calculated according to the tasks completed by miners, so the competition for mining is very fierce

mining is actually a competition of performance and equipment. The mining machine composed of many graphics cards, even if it's only hd6770, can surpass the single graphics card of most users

and this is not the most terrible. Some mining machines are made up of more such graphics card arrays. When dozens or even hundreds of graphics cards come together, the graphics card itself costs money. Considering the hardware price and other costs, there is a considerable expenditure in mining

< H2 > extended data:

bitcoin mining process:

1. To find the ore pool

to start mining, there must be a ore pool with convenient operation and stable output. Its function is to subdivide the data packets for each terminal, and pay the corresponding amount of bitcoin according to the proportion of the data packets calculated by the terminal through precise algorithm

2. Download bitcoin miner (software)

in fact, there are many kinds of this miner, you can go to the official website to download

3. Setting mining software is a green software. After installation, we can set the language first to facilitate further setting. Next, you need to set the server, user name, password, equipment and so on. Generally, the server chooses a better network from BTC guide series, and the user name and password are set by ourselves before

4, bitcoin mining start

when we confirm that all settings are correct, click the "start mining" button to start bitcoin mining, and then the graphics card will soon enter the full speed running state, the temperature and fan speed will increase, you can monitor the state through gpu-z or graphics card driver

5.

Mining: that is, bitcoin mining, is a process of using computer hardware to calculate the location of bitcoin and obtain it

3, users use personal computer to download software, and then run specific algorithms. After communicating with remote server, they can get corresponding bitcoin, which is one of the ways to get bitcoin. Ordinary graphics cards don't need to try, and electricity charges are not enough. Master Lu has bitcoin test, which can see how long it takes for your computer to dig a bitcoin

6. Bitcoin Mining: using computer hardware to calculate the location of bitcoin and get the process is called mining. The concept of bitcoin was first put forward by Nakamoto in 2009. According to Nakamoto's idea, open source software was designed and released, and p-2p China network was built on it. Bitcoin is a kind of digital currency in the form of p-2-p. Point to point transmission means a decentralized payment system. Unlike most currencies, bitcoin does not rely on a specific monetary institution to issue. It is generated by a large number of calculations based on a specific algorithm. Bitcoin economy uses a distributed database composed of many nodes in the whole p-2p network to confirm and record all transactions, and uses the design of cryptography to ensure the security of all aspects of currency circulation. The decentralized characteristics and algorithm of p-2p can ensure that it is impossible to artificially control the value of bitcoin by mass manufacturing. The design based on cryptography can make bitcoin only be transferred or paid by the real owner. This also ensures the anonymity of money ownership and circulation transactions. The biggest difference between bitcoin and other virtual currencies is that the total amount of bitcoin is very limited and it has a strong scarcity. The monetary system had no more than 5.5 million in four years, after which the total number would be permanently limited to 2 million
7. Mining is a process to increase the supply of bitcoin money, while protecting the security of the bitcoin system and preventing fraulent transactions. Miners provide computing power for the bitcoin network in exchange for the opportunity to obtain bitcoin rewards
bitcoin system is composed of users (users control the wallet through the key), transactions (transactions will be broadcast to the whole bitcoin network) and miners (a blockchain is generated by competitive computing to reach a consensus at each node, and the blockchain is a distributed public authoritative account book, including all transactions in the bitcoin network)
mining is a process of increasing bitcoin money supply. Mining also protects the security of the bitcoin system, prevents fraulent transactions, and avoids "double payment", which means spending the same bitcoin multiple times. Miners offer algorithms for bitcoin networks in exchange for the opportunity to get bitcoin rewards. The miners verify each new transaction and record it in the general ledger. Every 10 minutes, a new block will be "mined", and each block contains all the transactions from the generation of the previous block to the present, which are added to the blockchain in turn. We call the transactions included in the block and added to the blockchain "confirmed" transactions. After the transaction is "confirmed", the new owner can spend the bitcoin he gets in the transaction
there are two types of rewards for miners in the process of Mining: the new currency reward for creating a new block, and the transaction fee for the transaction contained in the block. In order to get these rewards, miners compete to complete a mathematical problem based on encrypted hash algorithm, that is, to use bitcoin mining machine to calculate the hash algorithm. This requires strong computing power, how much the calculation process is, and whether the calculation results are good or bad. As the proof of miners' calculation workload, it is called "workload proof". The competition mechanism of the algorithm and the mechanism that the winner has the right to record transactions on the blockchain ensure the security of bitcoin
miners also get transaction fees. Each transaction may contain a transaction fee, which is the difference between the input and output of each transaction. A miner who successfully "digs" a new block in the process of mining can get all the transaction "tips" contained in the block. With the decrease of mining reward and the increase of the number of transactions in each block, the proportion of transaction fee in miners' income will graally increase. After 2140, all miners' earnings will be made up of transaction fees
mining is a process of decentralizing settlement, in which each settlement verifies and settles the processed transaction. Mining protects the security of bitcoin system, and achieves the consensus of the whole bitcoin network without a central organization. The invention of mining makes bitcoin very special. This decentralized security mechanism is the basis of point-to-point e-money. The reward and transaction fee for casting new coins are a kind of incentive mechanism, which can regulate miners' behavior and network security, and at the same time complete the currency issuance of bitcoin.
8.

Computer Mining: when users "mine" bitcoin, they need to use the computer to search for 64 bit numbers, and then compete with other gold miners by repeatedly solving puzzles to provide the required numbers for the bitcoin network. If the user's computer successfully creates a set of numbers, then they will get 25 bitcoins. In short, it's about looking for bitcoin

e to the decentralized programming adopted by the bitcoin system, only 25 bitcoins can be obtained every 10 minutes, and by 2140, the maximum number of bitcoins in circulation will reach 21 million. In other words, bitcoin system is able to achieve self-sufficiency, resist inflation through coding, and prevent others from destroying these codes

extended data:

the corresponding laws and regulations of computer mining in China:

in China, the regulations on the administration of RMB prohibit the proction and sale of token tickets. Because there is no clear judicial interpretation of the definition of token ticket, if bitcoin is included in the "token ticket", the legal prospect of bitcoin in China will face uncertainty

the notice of the Ministry of culture and the Ministry of Commerce on strengthening the management of virtual currency of online games (Wen Shi Fa [2009] No. 20) on June 4, 2009 stated that the application scope of virtual currency of online games was defined for the first time, and the distinction between the current virtual currency of online games and the virtual props in the game was made; At the same time, the notice said that the "notice" stipulates that enterprises engaged in related services must be approved before they can operate

in China, some Taobao stores also began to accept the use of bitcoin, and the number of businesses will graally increase

in October 2013, the first bitcoin quarterly, one bit, was released

on October 15, 2013, the network accelerator service of the network announced its support for bitcoin

on October 26, 2013, btcmini reported that GBL was hacked

on October 31, 2013, Lei Teng, a famous Internet lawyer, proposed the event of "filing a case to investigate the closure of GBL bitcoin trading platform as soon as possible", analyzed the "value function" and "use function" of bitcoin, and bitcoin should be governed by relevant laws

9. A

absolute positioning
Abstract windows toolkit Abstract window tool library
accumulator
active multi-media dynamic multimedia
address, [station] address
adware advertising software
AI searching intelligent search engine
alphabetic graphics letter mosaic graphics
alphabetic alphanumeric, American Standard Code for information interchange, analog, and gate, application programming interface, application programming interface, application programming interface, application programming interface, application programming interface, and application programming interface, Application oriented language, application oriented language, application programming interface, application programming interface, [Hong Kong] application programming interface
application service provider [Hong Kong] application service provider
AR (augmented reality), augmented reality, [Taiwan / Hong Kong] augmented reality, [Taiwan] extended reality
ASCII (American Standard Code for information interchange)
ASP (application service provider)
assembler, assembler, assembler,
asynchronous transfer mode, Asynchronous transfer mode, asynchronous transfer mode, audio card, augmented reality, augmented reality, [Taiwan] augmented reality
AWT (Abstract windows Toolkit) Abstract window tool library

b

B2B (business to business) business to business, business to business, business to customer
B2C (business to consumer, business to customer) business to consumer (or customer, indivial)
background, [Taiwan] background, suboptimal
bandwidth, communication frequency band, [Taiwan / Hong Kong] bandwidth
baseband, [Taiwan / Hong Kong] fundamental frequency
defense host, fortress host
BBS (bulletin board system) bulletin board system, electronic announcement system, electronic bulletin board, electronic announcement system, [Taiwan] electronic bulletin board
BFT (binary file transfer) binary file transfer
Bi (Business Intelligence) business intelligence
Big-5, Big-5, Big-5
binary file transfer
Binary Runtime Environment for wireless binary code, [Hong Kong] wireless binary runtime environment software
bit, bit, Bit slice, bit slice, bit slice partition
blog, blog, blog service provider, blog service provider, blog service provider, blog service provider, blog service provider, [Hong Kong] Bluetooth
boot
bootstrap, bootstrap, bootstrap, bootstrap,
brew (Binary Runtime Environment for wireless) wireless binary code, [Hong Kong] wireless binary running environment software,
broadband, [Taiwan / Hong Kong] broadband
broken link, BSP (blog service provider), blog service provider, blog service provider, [Hong Kong] blog service provider, [Taiwan] blog service provider,
browser,
buffer,
buffer board system, bulletin board system, electronic bulletin board system, electronic bulletin board system, electronic bulletin board system,
bus main line, bus network, [Hong Kong] trunk network
business intelligence
business to business business, business to business, business to customer
business to customer Enterprise to customer (or indivial)
byte, byte, byte code

C

C2C (consumer to consumer, customer to customer) consumer to consumer, customer to customer, Personal to personal
c-marc format (Chinese machine readable cataloging format) [Taiwan] Chinese machine readable cataloging format
cable modem,
CAD (Computer Aided Design), [Hong Kong] computer aided design
calendar server
call on motion dynamic monitoring
cam (Computer Aided Manufacturing) computer aided proction
cascading style sheets, cascading style sheets, cascading style sheets
case (Computer Aided Software Engineering) computer aided software engineering, Case sensitive case sensitive case sensitive CCCII (Chinese character code for information interchange), Chinese character code, Chinese character code, CD-E (compact disc erasable) erasable CD-R, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM, CD-ROM drive, CD-ROM, CD-RW (compact disc rewritable) erasable recorder, [Hong Kong] rewritable CD-ROM burner
CDMA (code division multiple access) code division multiple access
certificate server authentication server
CGI (Common Gateway Interface) general gateway interface, public gateway interface
channel definition format, channel definition format
character, [Taiwan] character
China machine readable cataloging format
China MARC format (China machine readable cataloging format)
Chinanet
Chinese character code for information exchange, Chinese machine readable cataloging format Chinese MARC format Chinese machine readable cataloging format CIMS bill image/ Closure system
click, [port] button
client, client, client, client, Client
CMOS RAM (complementary metal oxide semiconctor random access memory)
code division multiple access
code snippet code fragment
cold link
collabra news reader
collabra server Newsgroup server
com (component object model) component Object mode, component object model
common gateway interface, common gateway interface, common gateway interface
compact disc erasable CD-R, compact disc rewritable CD-R, compact disc rewritable CD-R, Compatibility, compatibility, interchangeability
complementary metal oxide semiconctor random access memory
complex programmable logic devices
component object model, Component object model
computer aided design,
computer aided manufacturing,
Computer Aided Software Engineering, [Hong Kong] computer aided engineering
Computer Integrated Manufacturing System
computer supported cooperative work, computer assisted group cooperation
computer to plate technology
computing
consumer to consumer, Personal to personal
corporate user [Hong Kong] company user
CPLD (complex programmable logic devices)
cracker intruder,
crackware scrap, [Hong Kong] waste software
cross platform
cross platform extension
CSCW (Computer Supported Cooperative Work) computer supported cooperative work, [Taiwan] computer assisted group cooperation
CSS (cascading style sheets) cascading style sheets, cascading style sheets, cascading style sheets, Cascading style form
customer to customer, person to person
cyber cash
cyberspace, cyberspace, cyberspace
cybersquatter, domain blocker, domain robber, domain cockroach, Network cockroaches

d

DAB (digital audio broadcasting), [Hong Kong] digital audio broadcasting, digital audio broadcasting, digital voice broadcasting
DAS (Direct Attached Storage) direct attached storage, [Taiwan] direct attached storage, [Hong Kong] Direct Attached Storage
data, [Taiwan] data
data exchange interface data exchange interface
data mining data development, data acquisition, data mining, data exploration, data sharing, data warehouse, data warehousing, data storage, database, database, Data base
daughtercard
DDoS (distributed denial of service)
distributed denial of service
deadlock, deadlock, stagnation
debug, debug, debug, debug, debug, debug, [station] demand calling
den (directory enabled network) directory driven network
denial of service, [station / port] denial of service
dense wavelength division multiplexing, dense wavelength division multiplexing, [station] high density wavelength division multiplexing, [port] high density wavelength division multiplexing, DWDM
destination document
DHCP (Dynamic Host Configuration Protocol)
DHTML (dynamic hypertext markup language)
di (Digital Intermediate), digital media, digital fine tuning, [Hong Kong] digital media
digerati [Hong Kong] digital elite
digital audio broadcasting
10. Sikuai technology has been founded for many years. Its founder is Feng Guodong, an investment enterprise of xiongan fund. At the same time, he is also an engineer of the whole stack, and a technology bull. Blockchain technology plays an increasingly important role in life and work.
Hot content
Inn digger Publish: 2021-05-29 20:04:36 Views: 341
Purchase of virtual currency in trust contract dispute Publish: 2021-05-29 20:04:33 Views: 942
Blockchain trust machine Publish: 2021-05-29 20:04:26 Views: 720
Brief introduction of ant mine Publish: 2021-05-29 20:04:25 Views: 848
Will digital currency open in November Publish: 2021-05-29 19:56:16 Views: 861
Global digital currency asset exchange Publish: 2021-05-29 19:54:29 Views: 603
Mining chip machine S11 Publish: 2021-05-29 19:54:26 Views: 945
Ethereum algorithm Sha3 Publish: 2021-05-29 19:52:40 Views: 643
Talking about blockchain is not reliable Publish: 2021-05-29 19:52:26 Views: 754
Mining machine node query Publish: 2021-05-29 19:36:37 Views: 750