wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Reclaim Your Bite and Beauty: All About Dental Restorative Treatments

Blog banner

Revolutionary AI Tool: ChatGPT

Blog banner

CYBER SECURITY CHALLENGES

Blog banner

Data Science in Predictive Analytics: Transforming Business Decision-Making

Blog banner

The Future of Patola Weaving in a Sustainable Fashion World

Blog banner

What's Better : Supervised or Unsupervised Learning

Blog banner

Self-love: Being the reason of your own smile

Blog banner

The Importance of Financial Literacy for College Students

Blog banner

Is it important to follow all the trends that come up on social media?

Blog banner

Software

Blog banner

10 Things To Do On Valentine's Day If You're Single

Blog banner

MODERN OPERATING SYSTEM

Blog banner

IOT Hacking Techniques

Blog banner

security controls

Blog banner

Blog name

Blog banner

virtual machines and virtualization

Blog banner

HACKING MOBILE PLATFORM

Blog banner

Concurrency and Deadlocks

Blog banner

OS Assignment 3

Blog banner

Incident management in ITSM

Blog banner

File management

Blog banner

Supervised and Unsupervised Learning

Blog banner

TAILS OS

Blog banner

Data Mining

Blog banner

Fashion design

Blog banner

Virtual Machine

Blog banner

ODOO

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Modern Operating System - Khush Bagaria

Blog banner

A Survey of Anti-Forensic Techniques: Methods, Challenges, and Countermeasures

Blog banner

Loneliness

Blog banner

Cyber Security in Data Breaching

Blog banner

Disk scheduling

Blog banner

Access management

Blog banner

OPERATING SYSTEM

Blog banner

Beauty of indian railway

Blog banner

Self managing devices

Blog banner

Education: Key to your Prosperity

Blog banner

Operating system and overviews

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

Guidelines for a low sodium diet.

Blog banner

Threat management

Blog banner