Deck 11: Payment Systems for Electronic Commerce

Full screen (f)
exit full mode
Question
American Express and Discover Card are examples of open loop systems.
Use Space or
up arrow
down arrow
to flip the card.
Question
Credit cards provide assurances for both the consumer and the merchant.
Question
Credit card issuers charge interest on any unpaid balance.
Question
In an online storage system, the merchant must contact the consumer's bank to receive payment for a purchase.
Question
Charge cards involve lines of credit and accumulate interest charges.
Question
A front-end processor handles chargebacks and any other reconciliation items through the interchange network and the acquiring and issuing banks.
Question
Store-value cards are safer than magnetic strip credit cards because the information stored on a Store-value card can be encrypted.
Question
Online and telephone purchases include a minimal degree of risk for merchants and banks.
Question
For merchants, payment cards provide fraud protection.
Question
Magnetic strip cards can send and receive information.
Question
Digital cash can be easily traced back to its origin.
Question
Concerns about digital cash methods include privacy and security, independence, portability, and convenience.
Question
More than 80% of B2C online payments in the United State are made using credit or debit cards.
Question
Digital cash ought to be anonymous, just as currency is.
Question
Payment card service companies charge merchants per-transaction fees and monthly processing fees for processing payments.
Question
In an online cash storage system, a trusted third party, such as an online bank, coordinates all transfers of digital cash and holds the consumers' cash accounts.
Question
The use of mobile telephone carriers as a micropayment system has been held back by the mobile carriers' substantial charges for providing the service.
Question
The level of fraud in online transactions is much lower than either in-person or telephone transactions of the same nature.
Question
In an offline cash storage system, a consumer does not personally possess digital cash, instead a trusted party holds the consumers' cash accounts.
Question
A debit card removes the amount of the sale from the cardholder's bank account and transfers it to the seller's bank account.
Question
A disadvantage of using paper checks is the delay that occurs between the time that a person writes a check and the time that check clears the person's bank.
Question
Using digital cash provides an audit trail.
Question
The Check Clearing for the 21st Century Act permits banks to eliminate the movement of physical checks entirely.
Question
Whenever additional parties are included in payment card transaction processing, the system is called a(n) _____system.

A) open loop
B) offline transaction
C) point of purchase
D) direct payment
Question
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount billed to the card is due at the end of the billing period.

A) credit card
B) charge card
C) debit card
D) smart card
Question
The term _____ refers to all payments less than $10.

A) mini payments
B) small payments
C) minitransactions
D) microtransactions
Question
Typically, server-side digital wallets store a customer's information on the customer's computer.
Question
Payment cards with disposable numbers are known as _____.

A) charge cards
B) single-use cards
C) credit cards
D) store-branded cards
Question
In the context of payment acceptance and processing, closed loop systems:

A) include additional payment processing units.
B) involve paying the merchants directly.
C) work similar to an open loop system.
D) make use of an intermediary, such as a bank.
Question
When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account in a process called a _____.

A) click-through
B) chargeback
C) dispute
D) recharge
Question
Internet payments for items costing from a few cents to approximately a dollar are called _____.

A) double spending
B) micropayments
C) money laundering
D) chargebacks
Question
A two-part lock provides anonymous security but signals when someone is attempting to double spend cash.
Question
Some online merchants accept direct deductions from customers' checking accounts which are done through a network of banks called the _____.

A) Automated Cash Holding
B) acquiring banks
C) Automated Clearing House
D) issuing banks
Question
_____ are also called "electronic funds transfer at point of sale cards," especially outside the United States.

A) Debit cards
B) Credit cards
C) Gift cards
D) Prepaid cards
Question
A(n) _____ is a bank that does business with sellers that want to accept payment cards.

A) issuing bank
B) acquiring bank
C) mortgage bank
D) advising bank
Question
A credit card____________.

A) has no spending limit.
B) has no interest charged on unpaid balances.
C) is the same as a debit card.
D) protects the consumer with an automatic 30-day dispute period.
Question
In the context of fees deducted by acquiring banks, _____ are charged at rates which depend on the merchant's industry.

A) acquirer fees
B) interchange fees
C) chargeback fees
D) interest fees
Question
Digital wallet is similar to physical money that kept in a wallet.
Question
A set of connections between banks that issue credit cards, the associations that own the credit cards, and merchants' banks is called a(n) _____.

A) check processing system
B) zombie farm
C) interchange network
D) near field communication system
Question
A _____ obtains authorization for a payment card transaction by sending the transaction's details to the interchange network and storing a record of the approval or denial.

A) back-end processor
B) front-end processor
C) server-side digital wallet
D) client-side digital wallet
Question
Prepaid cards sold with the intention that they be given as presents are called _____.
Question
A _________ is a stored-value card with an embedded microchip that can store information.

A) credit card
B) debit card
C) charge card
D) smart card
Question
The delay that occurs between the time that a person writes a check and the time that check clears the person's bank is known as _____.

A) load
B) payback
C) prepayment
D) float
Question
_____ are fees charged by banks for providing payment card processing services to merchants.
Question
With a(n) _____, a user can pay off the entire card balance or pay a minimum amount each billing period.
Question
A _____ stores information on a customer's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
Question
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

A) Pharming
B) Identity theft
C) Due diligence
D) Money laundering
Question
Visa and MasterCard are _____ that are operated by the banks which issue credit cards to individual customers.
Question
_____ are responsible for evaluating their customers' credit standings and establishing appropriate individual credit limits.
Question
A _____ requires no download time or installation on a user's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
Question
A _____ can be used as a hardware-based digital wallet.

A) database
B) personal computer
C) server
D) smartphone
Question
A _____ handles chargebacks and any other reconciliation items.

A) front-end processor
B) back-end processor
C) clearing house
D) payment gateway
Question
_____ is spending a particular piece of digital cash twice by submitting the same electronic currency to two different vendors.

A) Double spending
B) Blind signing
C) Money laundering
D) Spear phishing
Question
Anonymous digital cash is digital cash that cannot be:

A) handled by a trusted third party.
B) held in online storage systems.
C) traced back to the person who spent it.
D) served as a substitute for government-issued physical currency.
Question
To process payment cards for Internet transactions, an online merchant must set up a(n) _____ with an acquiring bank.
Question
With a(n) _____, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.

A) float
B) store charge cards
C) cryptocurrency
D) fintech
Question
The basic structure of a _____ involves a perpetrator who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site.

A) due diligence process
B) money laundering process
C) phishing attack
D) chargeback scheme
Question
_________ EBPP systems are used by large companies who want to manage the system themselves
Question
A (n)_____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.
Question
Businesspeople often use the term _____ as a general term to describe all types of plastic cards that consumers use to make purchases.
Question
What are the disadvantages of using paper checks?
Question
_____ is a general term that describes any value storage and exchange system created by a private entity that does not use paper documents or coins and that can serve as a substitute for government-issued physical currency.
Question
A(n) _____, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.
Question
What are the advantages and disadvantages of payment cards?
Question
Google Wallet, which uses the _____ technology that MasterCard developed for its credit cards, is available for mobile devices.
Question
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.
Question
_____ are created when a hacker plants zombie programs on a large number of computers.
Question
_____ can be accomplished by purchasing goods or services with ill-gotten electronic cash and selling them for physical cash on the open market.
Question
Most stored-value cards incorporate__________ technology which allows for contactless data transmission over short distances so the computer processor in the microchip con interact with readers and other devices.
Question
When a bank buys accounts from another bank, it performs a series of procedures called _____, which include checking the new customers' credit histories and banking records.
Question
When the right to use a zombie farm is sold to an organized crime association that wants to launch a phishing attack, the attack is called a(n) _____.
Question
Near field communication chips embedded in mobile phones are called Osaifu-Keitai in Japan, which translates approximately to _____.
Question
A(n) _______ stored-value card, can store more than 100 times the amount of information that a magnetic strip plastic card can store.
Question
In phishing, _____ use the collected information.
Question
What is the difference between a credit card and a charge card?
Question
_____ allows for contactless data transmission over short distances and can also be used if a smartphone is equipped with a chip similar to those that have been used on payment cards for a number of years.
Question
Processing a payment card transaction online involves two general processes.Describe these processes.
Question
In phishing, the collection of information is done by _____.
Question
U.S.laws define _____, as unlawful activities conducted by a highly organized, disciplined association for profit.
Question
Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/81
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 11: Payment Systems for Electronic Commerce
1
American Express and Discover Card are examples of open loop systems.
False
2
Credit cards provide assurances for both the consumer and the merchant.
True
3
Credit card issuers charge interest on any unpaid balance.
True
4
In an online storage system, the merchant must contact the consumer's bank to receive payment for a purchase.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
5
Charge cards involve lines of credit and accumulate interest charges.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
6
A front-end processor handles chargebacks and any other reconciliation items through the interchange network and the acquiring and issuing banks.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
7
Store-value cards are safer than magnetic strip credit cards because the information stored on a Store-value card can be encrypted.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
8
Online and telephone purchases include a minimal degree of risk for merchants and banks.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
9
For merchants, payment cards provide fraud protection.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
10
Magnetic strip cards can send and receive information.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
11
Digital cash can be easily traced back to its origin.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
12
Concerns about digital cash methods include privacy and security, independence, portability, and convenience.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
13
More than 80% of B2C online payments in the United State are made using credit or debit cards.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
14
Digital cash ought to be anonymous, just as currency is.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
15
Payment card service companies charge merchants per-transaction fees and monthly processing fees for processing payments.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
16
In an online cash storage system, a trusted third party, such as an online bank, coordinates all transfers of digital cash and holds the consumers' cash accounts.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
17
The use of mobile telephone carriers as a micropayment system has been held back by the mobile carriers' substantial charges for providing the service.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
18
The level of fraud in online transactions is much lower than either in-person or telephone transactions of the same nature.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
19
In an offline cash storage system, a consumer does not personally possess digital cash, instead a trusted party holds the consumers' cash accounts.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
20
A debit card removes the amount of the sale from the cardholder's bank account and transfers it to the seller's bank account.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
21
A disadvantage of using paper checks is the delay that occurs between the time that a person writes a check and the time that check clears the person's bank.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
22
Using digital cash provides an audit trail.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
23
The Check Clearing for the 21st Century Act permits banks to eliminate the movement of physical checks entirely.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
24
Whenever additional parties are included in payment card transaction processing, the system is called a(n) _____system.

A) open loop
B) offline transaction
C) point of purchase
D) direct payment
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
25
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount billed to the card is due at the end of the billing period.

A) credit card
B) charge card
C) debit card
D) smart card
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
26
The term _____ refers to all payments less than $10.

A) mini payments
B) small payments
C) minitransactions
D) microtransactions
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
27
Typically, server-side digital wallets store a customer's information on the customer's computer.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
28
Payment cards with disposable numbers are known as _____.

A) charge cards
B) single-use cards
C) credit cards
D) store-branded cards
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
29
In the context of payment acceptance and processing, closed loop systems:

A) include additional payment processing units.
B) involve paying the merchants directly.
C) work similar to an open loop system.
D) make use of an intermediary, such as a bank.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
30
When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account in a process called a _____.

A) click-through
B) chargeback
C) dispute
D) recharge
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
31
Internet payments for items costing from a few cents to approximately a dollar are called _____.

A) double spending
B) micropayments
C) money laundering
D) chargebacks
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
32
A two-part lock provides anonymous security but signals when someone is attempting to double spend cash.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
33
Some online merchants accept direct deductions from customers' checking accounts which are done through a network of banks called the _____.

A) Automated Cash Holding
B) acquiring banks
C) Automated Clearing House
D) issuing banks
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
34
_____ are also called "electronic funds transfer at point of sale cards," especially outside the United States.

A) Debit cards
B) Credit cards
C) Gift cards
D) Prepaid cards
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
35
A(n) _____ is a bank that does business with sellers that want to accept payment cards.

A) issuing bank
B) acquiring bank
C) mortgage bank
D) advising bank
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
36
A credit card____________.

A) has no spending limit.
B) has no interest charged on unpaid balances.
C) is the same as a debit card.
D) protects the consumer with an automatic 30-day dispute period.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
37
In the context of fees deducted by acquiring banks, _____ are charged at rates which depend on the merchant's industry.

A) acquirer fees
B) interchange fees
C) chargeback fees
D) interest fees
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
38
Digital wallet is similar to physical money that kept in a wallet.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
39
A set of connections between banks that issue credit cards, the associations that own the credit cards, and merchants' banks is called a(n) _____.

A) check processing system
B) zombie farm
C) interchange network
D) near field communication system
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
40
A _____ obtains authorization for a payment card transaction by sending the transaction's details to the interchange network and storing a record of the approval or denial.

A) back-end processor
B) front-end processor
C) server-side digital wallet
D) client-side digital wallet
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
41
Prepaid cards sold with the intention that they be given as presents are called _____.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
42
A _________ is a stored-value card with an embedded microchip that can store information.

A) credit card
B) debit card
C) charge card
D) smart card
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
43
The delay that occurs between the time that a person writes a check and the time that check clears the person's bank is known as _____.

A) load
B) payback
C) prepayment
D) float
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
44
_____ are fees charged by banks for providing payment card processing services to merchants.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
45
With a(n) _____, a user can pay off the entire card balance or pay a minimum amount each billing period.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
46
A _____ stores information on a customer's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
47
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

A) Pharming
B) Identity theft
C) Due diligence
D) Money laundering
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
48
Visa and MasterCard are _____ that are operated by the banks which issue credit cards to individual customers.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
49
_____ are responsible for evaluating their customers' credit standings and establishing appropriate individual credit limits.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
50
A _____ requires no download time or installation on a user's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
51
A _____ can be used as a hardware-based digital wallet.

A) database
B) personal computer
C) server
D) smartphone
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
52
A _____ handles chargebacks and any other reconciliation items.

A) front-end processor
B) back-end processor
C) clearing house
D) payment gateway
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
53
_____ is spending a particular piece of digital cash twice by submitting the same electronic currency to two different vendors.

A) Double spending
B) Blind signing
C) Money laundering
D) Spear phishing
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
54
Anonymous digital cash is digital cash that cannot be:

A) handled by a trusted third party.
B) held in online storage systems.
C) traced back to the person who spent it.
D) served as a substitute for government-issued physical currency.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
55
To process payment cards for Internet transactions, an online merchant must set up a(n) _____ with an acquiring bank.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
56
With a(n) _____, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.

A) float
B) store charge cards
C) cryptocurrency
D) fintech
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
57
The basic structure of a _____ involves a perpetrator who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site.

A) due diligence process
B) money laundering process
C) phishing attack
D) chargeback scheme
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
58
_________ EBPP systems are used by large companies who want to manage the system themselves
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
59
A (n)_____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
60
Businesspeople often use the term _____ as a general term to describe all types of plastic cards that consumers use to make purchases.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
61
What are the disadvantages of using paper checks?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
62
_____ is a general term that describes any value storage and exchange system created by a private entity that does not use paper documents or coins and that can serve as a substitute for government-issued physical currency.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
63
A(n) _____, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
64
What are the advantages and disadvantages of payment cards?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
65
Google Wallet, which uses the _____ technology that MasterCard developed for its credit cards, is available for mobile devices.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
66
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
67
_____ are created when a hacker plants zombie programs on a large number of computers.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
68
_____ can be accomplished by purchasing goods or services with ill-gotten electronic cash and selling them for physical cash on the open market.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
69
Most stored-value cards incorporate__________ technology which allows for contactless data transmission over short distances so the computer processor in the microchip con interact with readers and other devices.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
70
When a bank buys accounts from another bank, it performs a series of procedures called _____, which include checking the new customers' credit histories and banking records.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
71
When the right to use a zombie farm is sold to an organized crime association that wants to launch a phishing attack, the attack is called a(n) _____.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
72
Near field communication chips embedded in mobile phones are called Osaifu-Keitai in Japan, which translates approximately to _____.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
73
A(n) _______ stored-value card, can store more than 100 times the amount of information that a magnetic strip plastic card can store.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
74
In phishing, _____ use the collected information.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
75
What is the difference between a credit card and a charge card?
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
76
_____ allows for contactless data transmission over short distances and can also be used if a smartphone is equipped with a chip similar to those that have been used on payment cards for a number of years.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
77
Processing a payment card transaction online involves two general processes.Describe these processes.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
78
In phishing, the collection of information is done by _____.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
79
U.S.laws define _____, as unlawful activities conducted by a highly organized, disciplined association for profit.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
80
Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.
Unlock Deck
Unlock for access to all 81 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 81 flashcards in this deck.