wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

Deadlock

Blog banner

Pipedrive

Blog banner

Virtual Memory

Blog banner

Interrupts in OS

Blog banner

Virtual machine

Blog banner

Importance of education

Blog banner

Scala - a programming tool

Blog banner

Sensory Play for Toddlers: Boosting Curiosity Through Touch, Sound, and Colour

Blog banner

Philadelphia Experiment : Was it real?

Blog banner

INSTAGRAM

Blog banner

Functions of operating system

Blog banner

How Puppet Shows and Role Play Teach Empathy to Preschoolers

Blog banner

Full Disk Encryption

Blog banner

It's all about our Brain.- The Brain Metaphor

Blog banner

Art and Culture of Rajasthan

Blog banner

MEMORY MANAGEMENT

Blog banner

MD5 Collisions and the impact on computer forensics

Blog banner

Proof-of-Stake (PoS)

Blog banner

Cyber Forensics

Blog banner

Segmentation and paging concept

Blog banner

Deadlock in operating system

Blog banner

Google classroom

Blog banner

Artical on FreshBooks

Blog banner

Virtual Machine

Blog banner

GUIDE TO GIS

Blog banner

memory managment

Blog banner

Deadlock and Starvation

Blog banner

What is Spyware?

Blog banner

MEMORY MANAGEMENT (techniques)

Blog banner

The Five Steps of Data Science

Blog banner

The role of artificial intelligence in automating digital forensic analysis.

Blog banner

The Role of Cyber Forensics in Criminology

Blog banner

Caching windows

Blog banner

Major achievement

Blog banner

Benefits of yoga and meditation

Blog banner

Some web vulnerabilities

Blog banner

How India made the GIS its Own, and its Use in Infrastructural Developments

Blog banner

Memory Management in Operating System

Blog banner

Survey of Which Movies Types people are Prefer to Watch in India.

Blog banner

IT service level agreement

Blog banner

How to Prepare Your Child for Their First Day of School?

Blog banner

SQL Injection practice on DVWA

Blog banner