🚨 Get Your Free NFT Certificate Mint by Completing the Web3 Exam! START NOW
Learn to gain real rewards

Learn to gain real rewards

Collect Bits, boost your Degree and gain actual rewards!

New
Video Courses
Video Courses
Deprecated
Scale your career with online video courses. Dive into your learning adventure!
Crypto Terms:  Letter T

What is Type Checking?

Meaning:
Type Checking - is a verification process in programming languages.
medium
2 minutes

Let's find out Type Checking meaning, definition in crypto, what is Type Checking, and all other detailed facts.

Type Checking is a process that establishes whether a program operation is compliant with the type declaration rules of the programming language

In most cases, type checking is done by a compiler. This compiler is able to check and verify whether all operations hold the pre-defined number of arguments and data types.

Type checking is categorized into two systems: static and dynamic.

Static Type Checking

Static type checking offers reliability, security, and saving time since it removes the need to run your program when type checking.

The main advantage of this category includes preliminary error detection. This means that you don’t have to run your program in order to detect said errors. Everything is done beforehand.

A compiler starts the type checking process which is done at compile time

Let’s take the C programming language as an example. In this case, you can run your program without declaring the variables within it. However, since you don’t have to declare the variables, the compiler won’t be able to complete its process and will display an error message. In turn, your program will remain static.

Dynamic Type Checking

Dynamic type checking only starts at either runtime or execution time. Therefore, it’s different from the static type checking which occurs at compile time. 

You can write programs without having to worry about having any crucial knowledge about types.

Let's have a look at one of the forms of type checking process:

  • Each variable, parameter, and function is assigned a data type;
  • Data types determine what kind of operations can be executed;
  • Type checking whether the operations are correct.

Unlike the static type checking, where type checking is always performed by the compiler, the dynamic type checking process varies by the programming language. For instance, PHP programming language doesn’t require a compiler while C programming language does.

Additionally, there are such programming languages where programmers are given the ability to take values at run time and associate them with arbitrary properties. Or, if the programming language allows, programmers can define new types to be used within their program algorithms. 

open-source programming language that has been developed to improve upon the functionality of <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-javascript/">JavaScript, one of the most commonly used programming languages for web development. TypeScript is <strong>easy to learn<\/strong> and follows a straightforward structure, making it a convenient option for app developers.<\/p>\n<p>TypeScript is a multi-paradigm language, meaning that it supports several different paradigms, such as functional, <strong>generic<\/strong>, and imperative. It allows for object-oriented programming (OOP) and provides support for features such as \u200b\u200bclasses, inheritance, and interfaces.<\/p>\n<p>Since TypeScript was developed to function as a more advanced version of JavaScript, it can be used to work on large-scale applications. Programmers can use TypeScript as JavaScript&rsquo;s transpiler. Furthermore, TypeScript shares syntactic similarities with JScript .NET.<\/p>\n<p>TypeScript is easier to master for those programmers who already have a good understanding of JavaScript. However, JavaScript itself is considered to be an easy programming language to learn which reduces the learning curve of switching between the two.<\/p>\n<p>JavaScript is used to develop numerous web-based applications. Front-end developers may use CSS and HTML alongside JavaScript to create the user interface of web programs. Compared to JavaScript and TypeScript, HTML is a relatively difficult programming language to learn.<\/p>\n<p>One of the biggest improvements of TypeScript over JavaScript is the improved development time, particularly for large-scale projects. TypeScript helps <strong>increase productivity<\/strong> and can handle a larger workload. Before it can be used for a particular app, the TypeScript code is compiled into JavaScript.<\/p>\n<p>JavaScript is a relatively old programming language, having been developed in 1995. While it&rsquo;s quite universally applicable it lacks some functionalities. TypeScript was developed to fill in these gaps and <strong>offers functions such as variables declaration and a functional paradigm<\/strong>.<\/p>\n<p>JavaScript conforms to the ECMAScript standard and offers dynamic typing, first-class functions, and prototype-based object orientation. It relies heavily on structured programming terminology that originated in C, including switch statements and if statements. However, TypeScript also offers static typing support.<\/p>\n<p>TypeScript was developed and maintained by Microsoft which provides the language with a number of high-quality frameworks. The editors allow programmers to catch any errors during the compilation process. This helps avoid any possible code issues during runtime.<\/p>\n<p>Some of the TypeScript frameworks were built on the tools used by JavaScript developers. Over the years, there have been countless JavaScript frameworks established, including Angular, ReactJS, and <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-node-js/">Node.js./n

Although TypeScript is considerably younger than JavaScript, only entering its second decade of existence, it has gathered a sizable online community. Those interested in learning TypeScript can find online tutorials and guides that build the foundation of the language.<\/p>","definition":"a programming language that builds on JavaScript.","status":"published","meta_title":"What is TypeScript Programming Language? Definition & Meaning | Crypto Wiki","meta_description":"TypeScript Programming Language meaning: TypeScript Programming Language - a programming language that builds on JavaScript.","meta_keywords":null}" :prev-section="{"id":806,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Multi-factor_authentication","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:00.000000Z","updated_at":"2023-12-14T17:14:03.000000Z","slug":"what-is-two-factor-authentication-2fa","title":"What is Two-Factor Authentication (2FA)?","section":"T","keyword":"Two-Factor Authentication (2FA)","content":"<p><strong>Two-Factor Authentication (2FA) is a method of granting access to an online or offline system or account that adds an extra layer of security<\/strong>. The users are required to provide two unique pieces of information. The first factor is the traditionally used password while the second factor is a code sent through a secure platform or even biometric authentication.<\/p>\n<p>You can see this feature being implemented in many various platforms, including <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-exchange/">cryptocurrency exchanges<\/strong><\/a>. Users within those platforms must set a password that complies with the secure password requirements, however, if they want an enhanced layer of security and protection added to their account or <a href=https://www.bitdegree.org/"//crypto//learn//crypto-terms//what-is-wallet/">wallet, they can easily set up two-factor authentication.<\/p>\n<p>Two-factor authentication works like this - when the user wants to connect to his account they enter the password into the login screen which triggers the requirement for a second piece of information. <strong>This secondary information could be a security code, a link sent to your email address, a call to action button on an app, and many other 2FA options<\/strong>. It&rsquo;s important to note that it&rsquo;s not another password.<\/p>\n<p>As mentioned above, it&rsquo;s possible to employ biometrics as a second piece of information for authentication. There are three most widely used options:<\/p>\n<ol>\n<li><strong>Fingerprint scan<\/strong>. Apple popularized this method with their iPhone 5s which was the first smartphone that scanned fingerprints in order to grant access. It doesn&rsquo;t remove the need for passwords, but it speeds up the process. Fingerprint scans are still integrated within a lot of smartphones;<\/li>\n<li><strong>Face recognition<\/strong>. Another method that&rsquo;s widely used on smartphones. Their 3D cameras are able to effectively scan the face thus only granting access to the owner;<\/li>\n<li><strong>Retina scan<\/strong>. This complex authentication method is generally utilized within systems that require an extremely high level of security such as the military or government. It involves scanning the blood vessels of the person's retina since each person has a unique retinal blood vessel pattern. It's considered to be one of the most reliable biometric authentication methods.<\/li>\n<\/ol>","definition":"grants access only to those users who pass two different authentication forms.","status":"published","meta_title":"What is Two-Factor Authentication (2FA)? Definition & Meaning | Crypto Wiki","meta_description":"Two-Factor Authentication (2FA) meaning: Two-Factor Authentication (2FA) - grants access only to those users who pass two different authentication forms.","meta_keywords":null}" :model="{"id":928,"wikipedia_url":"https:\/\/en.wikipedia.org\/wiki\/Type_system","level":"medium","author_id":1,"created_at":"2023-06-19T06:59:01.000000Z","updated_at":"2023-12-14T17:18:09.000000Z","slug":"what-is-type-checking","title":"What is Type Checking?","section":"T","keyword":"Type Checking","content":"<p><strong>Type Checking<\/strong> is a process that <strong>establishes whether a program operation is compliant with the type declaration rules of the programming language<\/strong>.&nbsp;<\/p>\n<p>In most cases, type checking is done by a compiler. This compiler is able to check and verify whether all operations hold the pre-defined number of arguments and data types.<\/p>\n<p>Type checking is categorized into two systems: static and dynamic.<\/p>\n<p><strong>Static Type Checking<\/strong><\/p>\n<p>Static type checking offers reliability, security, and saving time since it removes the need to run your program when type checking.<\/p>\n<p>The main advantage of this category includes preliminary error detection. This means that you don&rsquo;t have to run your program in order to detect said errors. Everything is done beforehand.<\/p>\n<p><strong>A compiler starts the type checking process which is done at compile time<\/strong>.&nbsp;<\/p>\n<p>Let&rsquo;s take the C programming language as an example. In this case, you can run your program without declaring the variables within it. However, since you don&rsquo;t have to declare the variables, the compiler won&rsquo;t be able to complete its process and will display an error message. In turn, your program will remain static.<\/p>\n<p><strong>Dynamic Type Checking<\/strong><\/p>\n<p>Dynamic type checking only <strong>starts at either runtime or execution time<\/strong>. Therefore, it&rsquo;s different from the static type checking which occurs at compile time.&nbsp;<\/p>\n<p>You can write programs without having to worry about having any crucial knowledge about types.<\/p>\n<p>Let's have a look at <strong>one of the forms of type checking process:<\/strong><\/p>\n<ul>\n<li>Each variable, parameter, and function is assigned a data type;<\/li>\n<li>Data types determine what kind of operations can be executed;<\/li>\n<li>Type checking whether the operations are correct.<\/li>\n<\/ul>\n<p>Unlike the static type checking, where type checking is always performed by the compiler, the <strong>dynamic type checking process varies by the programming language<\/strong>. For instance, PHP programming language doesn&rsquo;t require a compiler while C programming language does.<\/p>\n<p>Additionally, there are such programming languages where programmers are given the ability to take values at run time and associate them with arbitrary properties. Or, if the programming language allows, programmers can define new types to be used within their program algorithms.&nbsp;<\/p>","definition":"is a verification process in programming languages.","status":"published","meta_title":"What is Type Checking? Definition & Meaning | Crypto Wiki","meta_description":"Type Checking meaning: Type Checking - is a verification process in programming languages.","meta_keywords":null,"author":{"id":1,"user_id":1,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2023-05-11T07:18:20.000000Z","title":"Editor-In-Chief","slug":"aaron-s-editor-in-chief","description":"<p>Having completed a Master&rsquo;s degree on Economics, Politics &amp; Culture for the East Asia region, Aaron has written scientific papers with a comparative analysis of the differences between US&rsquo; Western and Japan&rsquo;s Collective forms of capitalism, 1945-2020.<\/p>\n<p>With close to a decade of experience in the FinTech industry, Aaron understands all of the biggest issues and struggles that crypto enthusiasts face. He&rsquo;s a passionate analyst who is concerned with data-driven and fact-based content, as well as that which speaks to both Web3 natives and industry newcomers.<\/p>\n<p>Aaron is the go-to person for everything and anything related to digital currencies. With a huge passion for blockchain &amp; Web3 education, Aaron strives to transform the space as we know it, and make it more approachable to complete beginners.<\/p>\n<p>Aaron has been quoted by multiple established outlets, and is a published author himself. Even during his free time, he enjoys researching the market trends, and looking for the next supernova.<\/p>","user":{"id":1,"first_name":"Aaron","last_name":"S.","email":"aaron@bitdegree.org","email_sanitized":"aaron@bitdegree.org","email_verified_at":"2023-12-01T09:40:20.000000Z","must_verify_email":false,"is_registered_with_wallet":false,"status":"active","country":"LT","last_connected_ip":"88.119.132.125","image_id":2641,"referral_token":"05TMu2NysXOCn525","referred_by":null,"created_at":"2023-05-03T14:30:55.000000Z","updated_at":"2024-01-09T15:22:21.000000Z","full_name":"Aaron S."}}}" :chapter-list="[{"id":1,"title":"Blockchain","slug":"blockchain","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-blockchain.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/blockchain-101.jpg","rating":100,"sections":[{"chapter_id":1,"order":1,"slug":"what-is-blockchain","title":"What is the Blockchain?","status":"published","modified_content":null},{"chapter_id":1,"order":2,"slug":"decentralized-blockchain","title":"Anonymous & Decentralized Blockchains: The Cornerstone of Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":3,"slug":"blockchain-transaction","title":"What is a Blockchain Transaction in Crypto?","status":"published","modified_content":null},{"chapter_id":1,"order":4,"slug":"crypto-fees","title":"The Different Types of Crypto Fees Explained","status":"published","modified_content":null},{"chapter_id":1,"order":5,"slug":"what-is-bridging-in-crypto","title":"The Key Notion Behind the Concept of Bridging in Crypto","status":"published","modified_content":null},{"chapter_id":1,"order":6,"slug":"types-of-blockchains","title":"Different Types of Blockchains: What to Look Out For?","status":"published","modified_content":null}]},{"id":2,"title":"Cryptocurrencies","slug":"cryptocurrencies","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-cryptocurrencies.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/cryptocurrencies-101.jpg","rating":100,"sections":[{"chapter_id":2,"order":1,"slug":"what-is-a-cryptocurrency","title":"What is a Cryptocurrency?","status":"published","modified_content":null},{"chapter_id":2,"order":2,"slug":"how-does-cryptocurrency-work","title":"How Does Cryptocurrency Work?","status":"published","modified_content":null},{"chapter_id":2,"order":3,"slug":"is-cryptocurrency-a-good-investment","title":"Is Cryptocurrency a Good Investment? The Pros & Cons","status":"published","modified_content":null},{"chapter_id":2,"order":4,"slug":"coin-vs-token","title":"Coin VS Token: How Do They Differ?","status":"published","modified_content":null},{"chapter_id":2,"order":5,"slug":"what-are-stablecoins","title":"What are Stablecoins, Altcoins & Wrapped Coins?","status":"published","modified_content":null},{"chapter_id":2,"order":6,"slug":"what-is-a-bitcoin","title":"Bitcoin: the Pioneer of the Crypto World","status":"published","modified_content":null},{"chapter_id":2,"order":7,"slug":"what-is-ethereum","title":"The Ultimate Blockchain for dApp Creation: Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":8,"slug":"what-is-cardano-in-crypto","title":"What is Cardano and What is It Used For?","status":"published","modified_content":null},{"chapter_id":2,"order":9,"slug":"what-is-shiba-inu-coin","title":"Shiba Inu: the Dogecoin Killer","status":"published","modified_content":null},{"chapter_id":2,"order":10,"slug":"what-is-solana-in-crypto","title":"Is Solana an Improved Version of Ethereum?","status":"published","modified_content":null},{"chapter_id":2,"order":11,"slug":"what-is-polkadot-in-crypto","title":"The Bridge Between Blockchains: Polkadot","status":"published","modified_content":null},{"chapter_id":2,"order":12,"slug":"what-is-polygon-in-crypto","title":"Polygon: the Essential Scaling Solution for Ethereum","status":"published","modified_content":null},{"chapter_id":2,"order":13,"slug":"what-is-luna-crypto","title":"The Bumpy Road of Terra (LUNA)","status":"published","modified_content":null},{"chapter_id":2,"order":14,"slug":"what-is-fantom-crypto","title":"Is Fantom (FTM) Yet Another Ethereum Killer?","status":"published","modified_content":null},{"chapter_id":2,"order":15,"slug":"what-is-aave-crypto","title":"Aave: Crypto Lending Trailblazer","status":"published","modified_content":null},{"chapter_id":2,"order":16,"slug":"what-is-algorand-crypto","title":"Did Algorand Truly Solve the Blockchain Trilemma?","status":"published","modified_content":null},{"chapter_id":2,"order":17,"slug":"what-is-olympus-dao","title":"Does Olympus DAO Have Anything to Do With Mythology?","status":"published","modified_content":null},{"chapter_id":2,"order":18,"slug":"what-is-avax","title":"Is Avalanche Network (AVAX) Rightfully Called the Future of DeFi?","status":"published","modified_content":null},{"chapter_id":2,"order":19,"slug":"what-is-monero-coin","title":"Monero: Where Cryptocurrency Meets Cryptography","status":"published","modified_content":null},{"chapter_id":2,"order":20,"slug":"what-is-ripple-xrp","title":"Is Ripple \"it\" When it Comes to Cross-Border Transactions?","status":"published","modified_content":null},{"chapter_id":2,"order":21,"slug":"practical-use-of-cryptocurrencies","title":"The Practical Use of Crypto","status":"published","modified_content":null}]},{"id":3,"title":"Crypto Exchanges","slug":"crypto-exchanges","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-exchanges.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-exchanges-101.jpg","rating":80,"sections":[{"chapter_id":3,"order":1,"slug":"how-do-cryptocurrency-exchanges-work","title":"How do Cryptocurrency Exchanges Work?","status":"published","modified_content":null},{"chapter_id":3,"order":2,"slug":"dex-vs-cex","title":"DEX VS CEX: Two Sides of the Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":3,"order":3,"slug":"crypto-day-trading","title":"Crypto Day Trading: The Difference Between Buying, Trading, and Swapping","status":"published","modified_content":null},{"chapter_id":3,"order":4,"slug":"kyc-crypto","title":"KYC & AML: The Key to Complying With Legal Industry Standards","status":"published","modified_content":null},{"chapter_id":3,"order":5,"slug":"how-to-buy-crypto","title":"From Fiat to Crypto: How to Buy Crypto for the First Time","status":"published","modified_content":null},{"chapter_id":3,"order":6,"slug":"fiat-to-crypto","title":"Taking Profits: Turning Crypto Into Fiat","status":"published","modified_content":null},{"chapter_id":3,"order":7,"slug":"how-to-use-crypto","title":"You\u2019ve Got Crypto: What Can You Do With It?","status":"published","modified_content":null}]},{"id":4,"title":"Crypto Wallets","slug":"crypto-wallets","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-wallets.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-wallets-101.jpg","rating":80,"sections":[{"chapter_id":4,"order":1,"slug":"what-is-a-crypto-wallet","title":"What is a Crypto Wallet?","status":"published","modified_content":null},{"chapter_id":4,"order":2,"slug":"hot-wallet-vs-cold-wallet","title":"Hot Wallet VS Cold Wallet: Which One to Pick?","status":"published","modified_content":null},{"chapter_id":4,"order":3,"slug":"non-custodial-wallet","title":"What are Non-Custodial Crypto Wallets?","status":"published","modified_content":null},{"chapter_id":4,"order":4,"slug":"what-is-metamask","title":"Metamask: The Leading Non-Custodial Wallet","status":"published","modified_content":null},{"chapter_id":4,"order":37,"slug":"how-safe-is-cryptocurrency","title":"The Key Crypto Wallet Safety Practices: How Safe Can Crypto Be?","status":"published","modified_content":null}]},{"id":5,"title":"NFTs","slug":"nfts","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-nfts.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/nfts-101.jpg","rating":100,"sections":[{"chapter_id":5,"order":2,"slug":"how-to-trade-nfts","title":"NFT Trading: The Ins and Outs","status":"published","modified_content":null},{"chapter_id":5,"order":3,"slug":"buying-nft","title":"Tips and Tricks of Choosing the Right NFTs","status":"published","modified_content":null},{"chapter_id":5,"order":4,"slug":"how-to-store-nft","title":"How to Store NFTs: Best Practices","status":"published","modified_content":null},{"chapter_id":5,"order":5,"slug":"how-to-create-an-nft","title":"How to Create Your Own NFTs?","status":"published","modified_content":null},{"chapter_id":5,"order":6,"slug":"how-to-make-passive-money-with-nft","title":"Making Passive Money with NFTs","status":"published","modified_content":null}]},{"id":6,"title":"dApps & Defi","slug":"dapps-and-defi","updated":true,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-dapps.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/dapps-defi-101.jpg","rating":80,"sections":[{"chapter_id":6,"order":1,"slug":"what-are-nfts","title":"What are Non-Fungible Tokens (NFTs)?","status":"published","modified_content":null},{"chapter_id":6,"order":1,"slug":"what-is-defi","title":"What is Decentralized Finance (DeFi)?","status":"published","modified_content":null},{"chapter_id":6,"order":2,"slug":"what-is-defi-2-0","title":"DeFi 2.0: The New Version of Decentralized Finance","status":"published","modified_content":null},{"chapter_id":6,"order":3,"slug":"what-are-dapps-in-crypto","title":"What Are dApps and How Do They Work?","status":"published","modified_content":null},{"chapter_id":6,"order":4,"slug":"defi-dapps","title":"Picking the Right dApps: Dos and Don'ts","status":"published","modified_content":null},{"chapter_id":6,"order":5,"slug":"what-is-web-3-0","title":"Web 3.0: The Future of the Internet","status":"published","modified_content":null},{"chapter_id":6,"order":6,"slug":"what-are-smart-contracts","title":"What is the Core Purpose of Smart Contracts?","status":"published","modified_content":null},{"chapter_id":6,"order":7,"slug":"what-is-a-dao-in-crypto","title":"The Notion of a Decentralized Autonomous Ogranization (DAO)","status":"published","modified_content":null},{"chapter_id":6,"order":8,"slug":"what-is-staking-in-crypto","title":"What is the Goal of Staking Crypto Assets?","status":"published","modified_content":null},{"chapter_id":6,"order":9,"slug":"what-is-liquidity-pool-in-crypto","title":"What is a Liquidity Pool and How Does It Work?","status":"published","modified_content":null},{"chapter_id":6,"order":10,"slug":"what-is-automated-market-maker","title":"Automated Market Maker: the Cornerstone of the Decentralized Crypto Exchange Industry","status":"published","modified_content":null},{"chapter_id":6,"order":11,"slug":"what-is-yield-farming-in-crypto","title":"The Main Yield Farming Techniques","status":"published","modified_content":null},{"chapter_id":6,"order":12,"slug":"what-is-an-oracle-in-crypto","title":"Crypto Oracles: The Link Between Blockchain and Outside World Data","status":"published","modified_content":null},{"chapter_id":6,"order":13,"slug":"crypto-gambling","title":"The Peculiarities of Decentralized Crypto Gambling","status":"published","modified_content":null},{"chapter_id":6,"order":14,"slug":"what-is-the-metaverse","title":"Metaverse: A New Perception of Reality","status":"published","modified_content":null}]},{"id":7,"title":"Trading & Investing","slug":"trading-and-investing","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-trading.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-trading-101.jpg","rating":80,"sections":[{"chapter_id":7,"order":1,"slug":"where-to-trade-crypto","title":"Where Can You Trade Cryptocurrencies?","status":"published","modified_content":null},{"chapter_id":7,"order":2,"slug":"how-to-invest-in-crypto","title":"Investing in Crypto: What Investing Options Do You Have?","status":"published","modified_content":null},{"chapter_id":7,"order":3,"slug":"ico-vs-ido","title":"ICO vs IDO vs IEO: Which One is the One?","status":"published","modified_content":null},{"chapter_id":7,"order":4,"slug":"what-is-an-airdrop","title":"What are Crypto Airdrops and How to Get Them?","status":"published","modified_content":null},{"chapter_id":7,"order":5,"slug":"how-to-get-free-crypto","title":"How to Get Free Crypto Assets?","status":"published","modified_content":null},{"chapter_id":7,"order":6,"slug":"how-to-arbitrage-crypto","title":"What is Crypto Arbitrage: The Main Principles","status":"published","modified_content":null},{"chapter_id":7,"order":7,"slug":"what-is-a-perpetual-contract","title":"Perpetual Contracts: Futures Contracts Without an Expiration Date","status":"published","modified_content":null},{"chapter_id":7,"order":8,"slug":"what-is-fud","title":"What is FUD: How to Use It to Your Advantage While Investing in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":9,"slug":"investing-in-cryptocurrency","title":"Investing in Cryptocurrency: How to Manage Your Risks?","status":"published","modified_content":null},{"chapter_id":7,"order":10,"slug":"what-is-a-rug-pull-in-crypto","title":"What is a Rug Pull in Crypto?","status":"published","modified_content":null},{"chapter_id":7,"order":11,"slug":"how-to-avoid-rug-pulls-in-crypto","title":"How to Spot and Avoid Rug Pulls?","status":"published","modified_content":null},{"chapter_id":7,"order":12,"slug":"how-to-avoid-crypto-taxes","title":"The Key Legal Techniques of Avoiding Crypto Taxes","status":"published","modified_content":null}]},{"id":8,"title":"Crypto Analysis","slug":"crypto-analysis","updated":null,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-analysis.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-analysis-101.jpg","rating":100,"sections":[{"chapter_id":8,"order":1,"slug":"what-is-bullish-and-bearish","title":"Bearish and Bullish Markets: Do They Matter?","status":"published","modified_content":null},{"chapter_id":8,"order":2,"slug":"best-technical-analysis-indicators-for-crypto","title":"5 Best Crypto Technical Analysis Indicators You Must Know About","status":"published","modified_content":null},{"chapter_id":8,"order":3,"slug":"what-is-candlesticks","title":"Technical Analysis: What are Candlesticks, Trendlines, and Patterns?","status":"published","modified_content":null},{"chapter_id":8,"order":4,"slug":"how-to-track-new-crypto-coins","title":"Crypto Tracking: How to Track Your Favorite Coins & Tokens?","status":"published","modified_content":null},{"chapter_id":8,"order":5,"slug":"how-to-research-crypto","title":"Crypto Research Fundamentals & Social Signals: Your Daily Trading Strategy","status":"published","modified_content":null},{"chapter_id":8,"order":46,"slug":"portfolio-diversification-definition","title":"Portfolio Diversification: The Whats, the Whys, and the Hows","status":"published","modified_content":null}]},{"id":9,"title":"Mining","slug":"mining","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/learn-crypto-mining.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-mining-101.jpg","rating":80,"sections":[{"chapter_id":9,"order":1,"slug":"what-is-crypto-mining","title":"Crypto Mining: What It is and How Does It Work?","status":"published","modified_content":null},{"chapter_id":9,"order":2,"slug":"what-is-a-mining-pool","title":"Mining Pools: Is Collective Mining Better Than Solo Mining?","status":"published","modified_content":null},{"chapter_id":9,"order":3,"slug":"what-is-staking-crypto","title":"An Advanced Look into What is Staking Crypto","status":"published","modified_content":null},{"chapter_id":9,"order":4,"slug":"what-is-proof-of-stake-vs-proof-of-work","title":"Proof-of-Work VS Proof-of-Stake: The Differences That Matter","status":"published","modified_content":null},{"chapter_id":9,"order":5,"slug":"what-is-crypto-mining-rig","title":"Crypto Mining Rig: What It is and How to Build One?","status":"published","modified_content":null}]},{"id":10,"title":"Crypto Terms","updated":false,"chapter":"crypto\/assets\/crypto-book\/chapters\/crypto-101-glossary.jpg","chapter_simple":"crypto\/assets\/crypto-book\/chapters-simple\/crypto-glossary-101.jpg","rating":100,"sections":["A","B","C","D","E","F","G","H","I","J","K","L","M","N","O","P","Q","R","S","T","U","V","W","X","Y","Z"]}]" current-chapter="T" current-section="what-is-type-checking">