wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Go Daddy

Blog banner

Why Skipping Afternoon Meals Affects More Than Just Your Hunger?

Blog banner

Deadlock in Operating System

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Gamer life

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 2

Blog banner

Banaras

Blog banner

Deadlocks in Operating System

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Processing Crime and Incident Scenes

Blog banner

AI and cyber Security

Blog banner

CONCURRENCY: MUTUAL EXCLUSION AND SYNCHRONIZATION-het karia

Blog banner

5 ways to save money on catering services in Mumbai

Blog banner

VIRTUAL MACHINES

Blog banner

IoT Architecture Based Security

Blog banner

Service design process in ITSM

Blog banner

IO Buffers

Blog banner

Cycling

Blog banner

Multicore and Multithreading

Blog banner

10 Interesting facts you should know!!!

Blog banner

What is a Dumpster Diving Attack?

Blog banner

Virtual Memory

Blog banner

Spyware

Blog banner

Business-to-Business

Blog banner

TOP 5 GAMING GADGETS (2024)

Blog banner

Operating system

Blog banner

Memory management

Blog banner

Life

Blog banner

Theads

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Processes : Process description and control

Blog banner

Principles of Concurrency

Blog banner

Security in Operating Systems

Blog banner

History of ITIL

Blog banner

Cache memory

Blog banner

DATA VAULT

Blog banner

Asana

Blog banner

Microsoft Windows Overview

Blog banner

Virtual Memory

Blog banner

Threads

Blog banner

Tableau

Blog banner

What is service level Agreement?

Blog banner