wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Dos (Denial of service) Attack

Blog banner

How social media affect

Blog banner

Virtual Machine

Blog banner

Stay Close To Adventure In Arcadia, Florida At Oak Tree Hotel

Blog banner

Gamer life

Blog banner

This is my first blog.

Blog banner

I Personally

Blog banner

Computer Security

Blog banner

Having passion in life

Blog banner

Denial-of-Service and Distributed Denial-of-Service Attack Techniques

Blog banner

5 Things I As A Dentist Would Never Do (And What You Can Learn From It)

Blog banner

Flipkart

Blog banner

KPMG (Klynveld Peat Marwick Goerdeler)

Blog banner

CONCURRENCY

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner

I/O Management and Disk Scheduling

Blog banner

Four Stalls Every Vegetarian Needs To Eat At Outside Vile Parle Station

Blog banner

Evolution of Operating System

Blog banner

First-Order Logic (FOL): The Foundation of Modern Logic

Blog banner

Building Confidence in Children Through Daily Routines and Play

Blog banner

5 Common Faults In Construction Tenders

Blog banner

Security Issues

Blog banner

All you need to know about Cassandra

Blog banner

Building a Simple Doctor Appointment System in Common Lisp

Blog banner

Random Forests

Blog banner

GIS REMOTE SENSING

Blog banner

SQL Injection

Blog banner

Service Transition Process in ITSM

Blog banner

Explain DBMS in Brief

Blog banner

Platonic Solids

Blog banner

Sweet Mango Murabba

Blog banner

Geographic Information Systems(By aditi Unnikrishnan)

Blog banner

MEMORY HIERARCHY

Blog banner

Paginng In OS

Blog banner

Password Generator - Lisp

Blog banner

Beautiful and stunning natural phenomena worth to see

Blog banner

Sniffing: A Cyber Security Threat

Blog banner

"Can Lisp do Machine Learning?"

Blog banner

Multiprocessor and Multicore Organization

Blog banner

How Preschool Annual Day Shapes Confidence, Emotions, and Growth

Blog banner

WHAT IS SNAPCHAT AND HOW DOES IT WORK?

Blog banner

A Tourist’s Guide To Florida’s Rodeo Culture: What To Expect At The Arcadia Championship Rodeo

Blog banner