wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Modern Operating System

Blog banner

Social engineering in cyber security

Blog banner

Fault tolerance

Blog banner

Evolution of operating systems

Blog banner

Blockchain in IoT Applications

Blog banner

Man In The Middle Attack

Blog banner

Smart Homes | Zigbee Alliance

Blog banner

Dudhasagar waterfall ?

Blog banner

Secure Hypertext transfer protocol

Blog banner

Types of OS

Blog banner

ADIDAS

Blog banner

New Ransomware Encrypts Your Android And Then Changes PIN Lock

Blog banner

Cryptanalysis tool

Blog banner

What makes Nugget RC Racing Florida’s Most Exciting Racing Events?

Blog banner

Data Storytelling: Turning Analysis into Business Action

Blog banner

RAID

Blog banner

Balance

Blog banner

objectives and function of operating system

Blog banner

Memory Management of Operating System(OS)

Blog banner

LIMITED EDITION

Blog banner

ARTICLE ON WRIKE CORPORATION

Blog banner

Network Forensics Tools and Techniques

Blog banner

Process State

Blog banner

Memory Management in Operating System

Blog banner

HTML vs HTML5

Blog banner

Review on Recovering Deleted Files

Blog banner

Phishing

Blog banner

Deadlock and Starvation

Blog banner

Importance Of Time

Blog banner

Animal’s have my heart

Blog banner

Flipkart

Blog banner

Beauty of indian railway

Blog banner

THE ACTORS LIFE

Blog banner

Title: Network Sniffing Techniques: Uncovering the Secrets of Data Transfer

Blog banner

Python as a tool for data analysis

Blog banner

objectives and functions of operating system

Blog banner

Data is an asset and it is your responsibility!

Blog banner

1.1 basic elements

Blog banner

INTRODUCTION TO C#

Blog banner

Design Considerations for Disk Cache Management

Blog banner

Process in OS

Blog banner

Cyber Forensics in Healthcare: Protecting Patient Data and Preventing Breaches

Blog banner