Bitcoin faucets have been around since at least 2011. It is believed that Gavin Andresen owned the first one. They come and go and often enough are just advertising scams – the owners want users on their site so they tempt them with free Bitcoin that never actually materializes because before the users have made enough to “cash out” the site has disappeared.

Governmental Services: National identity management systems, taxes/internal revenue monitoring, voting, and land management are just a few examples in which a blockchain ecosystem could be leveraged by public authorities. The State of Illinois, for example, recently launched a birth registry and identification system trial.6 The African nation of Ghana has also enabled land registration based on blockchain technology.7
Many blockchain primers and infographics dive into the cryptography, trying to explain to lay people how "consensus algorithms", "hash functions" and digital signatures all work. In their enthusiasm, they can speed past the fundamental question of what blockchain was really designed to do. I've long been worried about a lack of critical thinking around blockchain and the activity it's inspired. If you want to develop blockchain applications you only need to know what blockchain does, and not how it does it.
When mining began, regular off-the-shelf PCs were fast enough to generate bitcoins. That's the way the system was set up—easier to mine in the beginning, harder to mine as more bitcoins are generated. Over the last few years, miners have had to move on to faster hardware in order to keep generating new bitcoins. Today, application-specific integrated circuits (ASIC) are being used. Programmer language aside, all this means is that the hardware is designed for one specific task—in this case mining.
“The traditional way of sharing documents with collaboration is to send a Microsoft Word document to another recipient, and ask them to make revisions to it. The problem with that scenario is that you need to wait until receiving a return copy before you can see or make other changes because you are locked out of editing it until the other person is done with it. That’s how databases work today. Two owners can’t be messing with the same record at once.That’s how banks maintain money balances and transfers; they briefly lock access (or decrease the balance) while they make a transfer, then update the other side, then re-open access (or update again).With Google Docs (or Google Sheets), both parties have access to the same document at the same time, and the single version of that document is always visible to both of them. It is like a shared ledger, but it is a shared document. The distributed part comes into play when sharing involves a number of people.
^ Beikverdi, A.; Song, J. (June 2015). Trend of centralization in Bitcoin's distributed network. 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD). pp. 1–6. doi:10.1109/SNPD.2015.7176229. ISBN 978-1-4799-8676-7. Archived from the original on 26 January 2018.

Newer cryptocurrencies and blockchain networks are susceptible to 51% attacks. These attacks are extremely difficult to execute due to the computational power required to gain majority control of a blockchain network, but NYU computer science researcher Joseph Bonneau said that might change. Bonneau released a report last year estimating that 51% attacks were likely to increase, as hackers can now simply rent computational power, rather than buying all of the equipment.
Blockchain can also, depending on the circumstance, be very energy dependent, and therefore costly. When transactions are being verified (which we're going to talk about in the next section), it's possible that a lot of electricity can be used. This is the case in point with bitcoin, which is why so few cryptocurrency miners actually find that validating transactions on bitcoin's blockchain is worthwhile (and profitable). 
Whenever referring to the price of Bitcoin as it relates to fiat currency, the price being discussed is almost certainly an aggregate average of the price across various exchanges’ order books. Because bids and asks are instructions executed at a certain price, a large market buy would fill through several orders at incremental price levels and subsequently move the price of bitcoin up or down.
Bitcoin paints a future that is drastically different from the fiat-based world today. This is either exciting or unsettling for the vast majority. Equip yourself with the best possible resources. Become active in communities that further explore not only the technical applications of Bitcoin and other cryptos but with their overall potential to disrupt virtually every market. Brace yourselves. Cryptos are coming.

Even if a user receives a payment in Bitcoins to their public key, they will not be able to withdraw them with the private counterpart. A user’s public key is a shortened version of their private key, created through a complicated mathematical algorithm. However, due to the complexity of this equation, it is almost impossible to reverse the process and generate a private key from a public key. For this reason, blockchain technology is considered confidential.
Think of a railway company. We buy tickets on an app or the web. The credit card company takes a cut for processing the transaction. With blockchain, not only can the railway operator save on credit card processing fees, it can move the entire ticketing process to the blockchain. The two parties in the transaction are the railway company and the passenger. The ticket is a block, which will be added to a ticket blockchain. Just as a monetary transaction on blockchain is a unique, independently verifiable and unfalsifiable record (like Bitcoin), so can your ticket be. Incidentally, the final ticket blockchain is also a record of all transactions for, say, a certain train route, or even the entire train network, comprising every ticket ever sold, every journey ever taken.
What is the IoT? The network-controlled management of certain types of electronic devices — for instance, the monitoring of air temperature in a storage facility. Smart contracts make the automation of remote systems management possible. A combination of software, sensors, and the network facilitates an exchange of data between objects and mechanisms. The result increases system efficiency and improves cost monitoring.
Then cryptocurrencies came along and turned this traditional source of wealth creation on its head. When 2017 began, the aggregate value of all digital currencies combined equaled just $17.7 billion. However, as recently as this past weekend, the combined market cap of the nearly 1,400 investable cryptocurrencies was almost $836 billion. That better than 4,500% increase in value is something that the stock market would take multiple decades to accomplish.
Derivatives are used in stock exchanges and are concerned with the values of assets. Smart contracts in the trading of stocks and shares could revolutionize current practices by streamlining, automating and reducing the costs of derivatives trading across the industry. Settlements could be completed in seconds rather than the three days that are needed at present. Using smart contracts, peer-to-peer trading will become a usual operation, resulting in a complete revolution in stock trading. Barclays and several other companies has already trialed a way of trading derivatives using smart contracts, but they came to the conclusion that the technology won’t work unless banks collaborate to implement it.
The technological complexity is explained nicely to a degree which is necessary for the user to understand roughly the whole block chain as a system. Explaining a car and its advantages for humans would start also by describing wheels, motor and steering by hand. A car user does not need to know the details of a motor , electricity etc. He looks at how to move, security, velocity etc.
Peer to peer (P2P) electronic cash is simply described as online money sent from one person to another without the need for a trusted third-party. As described in the original Bitcoin whitepaper by Satoshi Nakamoto, P2P cash makes use of digital signatures as part of the solution, but the main benefits are lost if a trusted third party is still required to prevent fraud. This makes P2P cash a trustless and safe way to transact without the need of intermediaries.
Imagine this for a second, a hacker attacks block 3 and tries to change the data. Because of the properties of hash functions, a slight change in data will change the hash drastically. This means that any slight changes made in block 3, will change the hash which is stored in block 2, now that in turn will change the data and the hash of block 2 which will result in changes in block 1 and so on and so forth. This will completely change the chain, which is impossible. This is exactly how blockchains attain immutability.

At its simplest, Bitcoin is either virtual currency or reference to the technology. You can make transactions by check, wiring, or cash. You can also use Bitcoin (or BTC), where you refer the purchaser to your signature, which is a long line of security code encrypted with 16 distinct symbols. The purchaser decodes the code with his smartphone to get your cryptocurrency. Put another way; cryptocurrency is an exchange of digital information that allows you to buy or sell goods and services.The transaction gains its security and trust by running on a peer-to-peer computer network that is similar to Skype, or BitTorrent, a file-sharing system.

Blockchain technology doesn't have to exist publicly. It can also exist privately - where nodes are simply points in a private network and the Blockchain acts similarly to a distributed ledger. Financial institutions specifically are under tremendous pressure to demonstrate regulatory compliance and many are now moving ahead with Blockchain implementations. Secure solutions like Blockchain can be a crucial building block to reduce compliance costs.

Blockchain technology accounts for the issues of security and trust in several ways. First, new blocks are always stored linearly and chronologically. That is, they are always added to the “end” of the blockchain. If you take a look at Bitcoin’s blockchain, you’ll see that each block has a position on the chain, called a “height.” As of February 2019, the block’s height had topped 562,000.
When you have your wallet, go to a section that says 'Receive Money' or 'Add funds' or something similar. There will usually be a QR-code that has your Bitcoin address encoded in it. Print out the image with the QR-code and place it next to your cash register. Your customers will typically have a Bitcoin app installed on their smartphone where they can enter the value of the purchase in USD or EUR. Their app calculates the corresponding Bitcoin value. It automatically takes the current exchange rate to get the right amount. On your wallet account you can check the confirmation of your incoming payment.

The overwhelming majority of bitcoin transactions take place on a cryptocurrency exchange, rather than being used in transactions with merchants.[133] Delays processing payments through the blockchain of about ten minutes make bitcoin use very difficult in a retail setting. Prices are not usually quoted in units of bitcoin and many trades involve one, or sometimes two, conversions into conventional currencies.[31] Merchants that do accept bitcoin payments may use payment service providers to perform the conversions.[134]
Blockchain may also offer the ability to replace state ID's that we carry in our wallets, or perhaps help tech companies such as Cisco Systems (NASDAQ:CSCO) manage their Internet of Things network. Right now, Cisco is working on its own proprietary blockchain technology that can identify different connected devices, monitor the activity of those devices, and determine how trustworthy those devices are. It has the potential to continually "learn" and assess which devices are trustworthy, and if they should be added to a network. 
Here’s why that’s important to security. Let’s say a hacker attempts to edit your transaction from Amazon so that you actually have to pay for your purchase twice. As soon as they edit the dollar amount of your transaction, the block’s hash will change. The next block in the chain will still contain the old hash, and the hacker would need to update that block in order to cover their tracks. However, doing so would change that block’s hash. And the next, and so on.
Every 2,016 blocks (approximately 14 days at roughly 10 min per block), the difficulty target is adjusted based on the network's recent performance, with the aim of keeping the average time between new blocks at ten minutes. In this way the system automatically adapts to the total amount of mining power on the network.[3]:ch. 8 Between 1 March 2014 and 1 March 2015, the average number of nonces miners had to try before creating a new block increased from 16.4 quintillion to 200.5 quintillion.[84]