wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Modern Operating System - Suren Kotian

Blog banner

Electronic data interchange

Blog banner

Deadlock

Blog banner

ITIL Version 3 and 4 differenciation?

Blog banner

Memory Management of Operating System(OS)

Blog banner

What is Minting & Mining

Blog banner

Top 10 Logos and their meanings

Blog banner

Password Generator - Lisp

Blog banner

Virtual memory

Blog banner

(Input/Output) in os

Blog banner

PHISHING

Blog banner

Cyber Crime Investigation In The Era Of Big Data

Blog banner

What is Email? Uses of Emails

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Maharashtrian culture: Tradition, Art, Food

Blog banner

Solving Problems with AI: The Power of Search Algorithms

Blog banner

Security and E-mail

Blog banner

Service Transition Process in ITSM

Blog banner

RAID

Blog banner

City of Mumbai (Bombay):

Blog banner

Web browser forensics:Tools,Evidence collection and analysis

Blog banner

Privacy in Social Media and Online Services

Blog banner

What is time ? The term which has astonished Scientists

Blog banner

Blockchain uses and use cases

Blog banner

Exploring Human Factors in Cyber Forensics Investigations.

Blog banner

Senseless Teeths

Blog banner

All you need to know about “Off-page SEO”

Blog banner

Utilizing Data-Hiding and Retrieval Techniques in Cyber Forensics

Blog banner

LiquidPlanner

Blog banner

PODIO

Blog banner

Starvation and Deadlock.

Blog banner

Raid and levels of raid.

Blog banner

BEAUTY IS IN THE EYE OF THE BEHOLDER

Blog banner

Creating Digitally Signed Document

Blog banner

ACHIEVEMENTS IN OPERATING SYSTEMS

Blog banner

Crypto tax evasion

Blog banner

Old age lifestyle

Blog banner

Buffers in Operating Systems

Blog banner

The Sunny Side of Instagram

Blog banner

"Mahakali cave"

Blog banner

Types of Hackers

Blog banner

Operating system

Blog banner