wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

E-Cash (Electronic Cash)

profile
Gowrish Gowda
Aug 24, 2022
0 Likes
0 Discussions
36 Reads

1. The name "EC" originally comes from the unified European checking system Eurocheque

2. E-Cash means electronic cash. E-cash is not physically present it is logically present over the internet.

3. E-Cash can be used over the internet, electronic mail or personal computer to workstation in the form of protected payment of cash that is practically undetectable to user.

4.  The electronic cash can work in the same way as electronic fund transfer made among the banks.

5. The user must have E-Cash software with him and an e-cash bank account from which electronic cash can be withdrawn or deposited.

6. The recipients of the electronic cash send the money to their corresponding bank account as like depositing real cash.

7 . Users can transfer funds, purchase stock,and offerna wide range of other services without requiring to carry physical cash, because of this users does not need to wait in queue which save times.

8.  The transfer of funds can be immediately carried out by using debit cards and online bill payment.

9. Users will have high privacy while doing online shopping.

10. Use of debit cards by unauthorised person will lead to loss of many. Do privacy becomes critical issue.

11. An electronic card payment was generally made by the card owner entering their PIN (Personal Identification Number) 

12. This type of currency may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game.


Comments ()


Sign in

Read Next

I Personally

Blog banner

Human Error: The weakest link in Cybersecurity

Blog banner

STUDY OF SYSTEM HACKING TOOLS

Blog banner

Europe Through My Lens

Blog banner

Are Social Media Paid Campaigns Worth It?

Blog banner

LEMON PICKLE (NIMBU KA ACHAR)

Blog banner

Festive Ethnic Wear Guide: Patola-Inspired Looks for Every Celebration

Blog banner

10 Interesting facts you should know!!!

Blog banner

Article on IT development trends

Blog banner

IS CONVERTING AMBITION INTO PROFESSION?

Blog banner

Phishing

Blog banner

DIGITAL ECONOMY

Blog banner

Deadlock in Operating systems

Blog banner

Embedded Operating System

Blog banner

Rules and Regulations of Networking: "Standards and Protocols" - Part 1

Blog banner

Digital Forensics Challenges and Tools

Blog banner

Memory management

Blog banner

Danger assessment in GIS

Blog banner

VIRTUAL MACHINES

Blog banner

Information Technology In E- Commerce

Blog banner

How GIS in Agriculture Eliminates Guesswork

Blog banner

URL vs Domain

Blog banner

The Impact of Tolerances and Wall Thickness on Pipeline Integrity

Blog banner

Policies for Service Transition

Blog banner

How to insert contacts in zoho crm using php

Blog banner

MYNTRA

Blog banner

Consumer to consumer business mode

Blog banner

Linux -V Server Virtual Machine

Blog banner

Twisted world

Blog banner

Evolution of Operating Sytems

Blog banner

USPS mail

Blog banner

Fault Tolerance

Blog banner

Embaded operating system

Blog banner

ASANA- A Management System.

Blog banner

Microsoft powerpoint presentation

Blog banner

KEAP MANAGEMENT SYSTEM

Blog banner

Concurrency and Deadlocks

Blog banner

On-Page SEO

Blog banner

Virtual machine.

Blog banner

Image Steganalysis in Digital Forensics

Blog banner

Koinex is shutting down and here is how you can withdraw...

Blog banner

Classification Algorithms (Decision trees, SVM, Logistic regreession)

Blog banner