wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Security in Cloud Computing Environment using cryptography - Rushabh Modi

Blog banner

Malware

Blog banner

Evolution of the Microprocessor ~ Aditya Pai

Blog banner

Know your Processors!

Blog banner

Introduction to Data Science: Life Cycle & Applications

Blog banner

Process in OS

Blog banner

1.1 basic elements

Blog banner

Fun Christmas Activities For Toddlers & Kids

Blog banner

Memory Management

Blog banner

Partnership in Learning: How Parent Involvement Shapes a Child’s Early Education

Blog banner

ADD A SPICE TO YOUR LIFE.

Blog banner

Fitness

Blog banner

Goa Trip With Friends

Blog banner

INDIAN CHEAPEST COSMETICS BRAND

Blog banner

Mumbai local ......

Blog banner

Traditional UNIX Scheduling

Blog banner

10 Reasons to date your best friend

Blog banner

(Input/Output) in os

Blog banner

Threats To Computer System

Blog banner

Buffers in Operating Systems

Blog banner

Autonomy Vehicles: Future Ki Gadiya

Blog banner

Hacking

Blog banner

Service Transition Process in ITSM

Blog banner

10 Signs your Computer has Virus

Blog banner

Constrains in service design

Blog banner

Process Description

Blog banner

File management In Operating System

Blog banner

Electronic Funds Transfer

Blog banner

Puri Jagannath temple

Blog banner

Subnet Masking

Blog banner

Short note on expert system

Blog banner

Study on cyber and network forensic in computer security management

Blog banner

Deadlocks in Operating System

Blog banner

Game Theory in Blockchain

Blog banner

Uniprocessor scheduling

Blog banner

Scala - a programming tool

Blog banner

MORDERN UNIX SYSTEM

Blog banner

Cyber Security Standards

Blog banner

**THE MUJAWARR: Transforming the Logistics Industry**

Blog banner

Memory Management in Operating System

Blog banner

Multiprocessor and Multicore Organization

Blog banner

Uniprocessor and Types

Blog banner