Exam 11: Payment Systems for Electronic Commerce

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Most stored-value cards incorporate__________ technology which allows for contactless data transmission over short distances so the computer processor in the microchip con interact with readers and other devices.

(Short Answer)
4.8/5
(29)

A (n)_____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.

(Short Answer)
4.9/5
(31)

Prepaid cards sold with the intention that they be given as presents are called _____.

(Short Answer)
4.9/5
(33)

Using digital cash provides an audit trail.

(True/False)
4.9/5
(33)

To process payment cards for Internet transactions, an online merchant must set up a(n) _____ with an acquiring bank.

(Short Answer)
4.7/5
(38)

The Check Clearing for the 21st Century Act permits banks to eliminate the movement of physical checks entirely.

(True/False)
4.7/5
(36)

Digital wallet is similar to physical money that kept in a wallet.

(True/False)
4.9/5
(32)

A(n) _____, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.

(Short Answer)
4.7/5
(37)

Processing a payment card transaction online involves two general processes.Describe these processes.

(Essay)
4.8/5
(34)

In phishing, _____ use the collected information.

(Short Answer)
4.8/5
(23)

Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.

(Short Answer)
4.9/5
(35)

When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account in a process called a _____.

(Multiple Choice)
4.8/5
(39)

A _____ stores information on a customer's computer.

(Multiple Choice)
4.8/5
(30)

Charge cards involve lines of credit and accumulate interest charges.

(True/False)
4.7/5
(37)

Whenever additional parties are included in payment card transaction processing, the system is called a(n) _____system.

(Multiple Choice)
4.8/5
(38)

How are phishing attacks used for identity theft?

(Essay)
4.9/5
(34)

In the context of payment acceptance and processing, closed loop systems:

(Multiple Choice)
4.9/5
(33)

Near field communication chips embedded in mobile phones are called Osaifu-Keitai in Japan, which translates approximately to _____.

(Short Answer)
4.8/5
(37)

A _____ obtains authorization for a payment card transaction by sending the transaction's details to the interchange network and storing a record of the approval or denial.

(Multiple Choice)
4.7/5
(34)

The basic structure of a _____ involves a perpetrator who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site.

(Multiple Choice)
4.8/5
(39)
Showing 61 - 80 of 81
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)