Browse Definitions :
Definition

euro

The euro (pronounced YUR-oh ) is now the official monetary unit of 12 member nations of the European Union. First introduced on January 1, 1999, and phased in over a three-year period, the euro was seen as a necessary step toward a European common market. It is intended to make trade more efficient, make price comparisons easier, and stabilize interest rates overall. Austria, Belgium, Finland, France, Germany, Greece, Ireland, Italy, Luxembourg, the Netherlands, Portugal, and Spain are European Union member nations that have accepted the euro as their official currency. Britain, Denmark, and Sweden are not using the euro but may decide to join later.

For tourists, the euro provides a common, transportable and minimally confusing currency in traveling from country to country. The euro now exists not only in bank account form but in paper and coin currency as well. Traveller's checks for euros can be purchased. Meanwhile, many computer business applications involving accounting or sums of money have been updated. The total cost to business is said to have been considerable, perhaps a third of the cost of the 2000 problem.

In terms of trading, the euro is expected to help stabilize the European economy as a whole. The 12 countries using the euro represent over 290 million people. European financial markets now quote stocks, bonds, and mutual funds in euros. Public debts are also expressed in euros. Euros are now the only currency traded against other world currencies, such as the dollar and the Japanese yen. Many stock market and finance Web sites post the latest exchange rates.

This was last updated in September 2005
SearchNetworking
  • network packet

    A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a ...

  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

SearchSecurity
  • MICR (magnetic ink character recognition)

    MICR (magnetic ink character recognition) is a technology invented in the 1950s that's used to verify the legitimacy or ...

  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • Android System WebView

    Android System WebView is a system component for the Android operating system (OS) that allows Android apps to display web ...

SearchCIO
  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • contingent workforce

    A contingent workforce is a labor pool whose members are hired by an organization on an on-demand basis.

  • product development (new product development -- NPD)

    Product development, also called new product management, is a series of steps that includes the conceptualization, design, ...

SearchHRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

SearchCustomerExperience
  • Salesforce Trailhead

    Salesforce Trailhead is a series of online tutorials that coach beginner and intermediate developers who need to learn how to ...

  • Salesforce

    Salesforce, Inc. is a cloud computing and social enterprise software-as-a-service (SaaS) provider based in San Francisco.

  • data clean room

    A data clean room is a technology service that helps content platforms keep first person user data private when interacting with ...

Close