Deck 11: Payment Systems for Electronic Commerce

ملء الشاشة (f)
exit full mode
سؤال
American Express and Discover Card are examples of open loop systems.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Credit cards provide assurances for both the consumer and the merchant.
سؤال
Credit card issuers charge interest on any unpaid balance.
سؤال
In an online storage system, the merchant must contact the consumer's bank to receive payment for a purchase.
سؤال
Charge cards involve lines of credit and accumulate interest charges.
سؤال
A front-end processor handles chargebacks and any other reconciliation items through the interchange network and the acquiring and issuing banks.
سؤال
Store-value cards are safer than magnetic strip credit cards because the information stored on a Store-value card can be encrypted.
سؤال
Online and telephone purchases include a minimal degree of risk for merchants and banks.
سؤال
For merchants, payment cards provide fraud protection.
سؤال
Magnetic strip cards can send and receive information.
سؤال
Digital cash can be easily traced back to its origin.
سؤال
Concerns about digital cash methods include privacy and security, independence, portability, and convenience.
سؤال
More than 80% of B2C online payments in the United State are made using credit or debit cards.
سؤال
Digital cash ought to be anonymous, just as currency is.
سؤال
Payment card service companies charge merchants per-transaction fees and monthly processing fees for processing payments.
سؤال
In an online cash storage system, a trusted third party, such as an online bank, coordinates all transfers of digital cash and holds the consumers' cash accounts.
سؤال
The use of mobile telephone carriers as a micropayment system has been held back by the mobile carriers' substantial charges for providing the service.
سؤال
The level of fraud in online transactions is much lower than either in-person or telephone transactions of the same nature.
سؤال
In an offline cash storage system, a consumer does not personally possess digital cash, instead a trusted party holds the consumers' cash accounts.
سؤال
A debit card removes the amount of the sale from the cardholder's bank account and transfers it to the seller's bank account.
سؤال
A disadvantage of using paper checks is the delay that occurs between the time that a person writes a check and the time that check clears the person's bank.
سؤال
Using digital cash provides an audit trail.
سؤال
The Check Clearing for the 21st Century Act permits banks to eliminate the movement of physical checks entirely.
سؤال
Whenever additional parties are included in payment card transaction processing, the system is called a(n) _____system.

A) open loop
B) offline transaction
C) point of purchase
D) direct payment
سؤال
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount billed to the card is due at the end of the billing period.

A) credit card
B) charge card
C) debit card
D) smart card
سؤال
The term _____ refers to all payments less than $10.

A) mini payments
B) small payments
C) minitransactions
D) microtransactions
سؤال
Typically, server-side digital wallets store a customer's information on the customer's computer.
سؤال
Payment cards with disposable numbers are known as _____.

A) charge cards
B) single-use cards
C) credit cards
D) store-branded cards
سؤال
In the context of payment acceptance and processing, closed loop systems:

A) include additional payment processing units.
B) involve paying the merchants directly.
C) work similar to an open loop system.
D) make use of an intermediary, such as a bank.
سؤال
When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account in a process called a _____.

A) click-through
B) chargeback
C) dispute
D) recharge
سؤال
Internet payments for items costing from a few cents to approximately a dollar are called _____.

A) double spending
B) micropayments
C) money laundering
D) chargebacks
سؤال
A two-part lock provides anonymous security but signals when someone is attempting to double spend cash.
سؤال
Some online merchants accept direct deductions from customers' checking accounts which are done through a network of banks called the _____.

A) Automated Cash Holding
B) acquiring banks
C) Automated Clearing House
D) issuing banks
سؤال
_____ are also called "electronic funds transfer at point of sale cards," especially outside the United States.

A) Debit cards
B) Credit cards
C) Gift cards
D) Prepaid cards
سؤال
A(n) _____ is a bank that does business with sellers that want to accept payment cards.

A) issuing bank
B) acquiring bank
C) mortgage bank
D) advising bank
سؤال
A credit card____________.

A) has no spending limit.
B) has no interest charged on unpaid balances.
C) is the same as a debit card.
D) protects the consumer with an automatic 30-day dispute period.
سؤال
In the context of fees deducted by acquiring banks, _____ are charged at rates which depend on the merchant's industry.

A) acquirer fees
B) interchange fees
C) chargeback fees
D) interest fees
سؤال
Digital wallet is similar to physical money that kept in a wallet.
سؤال
A set of connections between banks that issue credit cards, the associations that own the credit cards, and merchants' banks is called a(n) _____.

A) check processing system
B) zombie farm
C) interchange network
D) near field communication system
سؤال
A _____ obtains authorization for a payment card transaction by sending the transaction's details to the interchange network and storing a record of the approval or denial.

A) back-end processor
B) front-end processor
C) server-side digital wallet
D) client-side digital wallet
سؤال
Prepaid cards sold with the intention that they be given as presents are called _____.
سؤال
A _________ is a stored-value card with an embedded microchip that can store information.

A) credit card
B) debit card
C) charge card
D) smart card
سؤال
The delay that occurs between the time that a person writes a check and the time that check clears the person's bank is known as _____.

A) load
B) payback
C) prepayment
D) float
سؤال
_____ are fees charged by banks for providing payment card processing services to merchants.
سؤال
With a(n) _____, a user can pay off the entire card balance or pay a minimum amount each billing period.
سؤال
A _____ stores information on a customer's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
سؤال
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

A) Pharming
B) Identity theft
C) Due diligence
D) Money laundering
سؤال
Visa and MasterCard are _____ that are operated by the banks which issue credit cards to individual customers.
سؤال
_____ are responsible for evaluating their customers' credit standings and establishing appropriate individual credit limits.
سؤال
A _____ requires no download time or installation on a user's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
سؤال
A _____ can be used as a hardware-based digital wallet.

A) database
B) personal computer
C) server
D) smartphone
سؤال
A _____ handles chargebacks and any other reconciliation items.

A) front-end processor
B) back-end processor
C) clearing house
D) payment gateway
سؤال
_____ is spending a particular piece of digital cash twice by submitting the same electronic currency to two different vendors.

A) Double spending
B) Blind signing
C) Money laundering
D) Spear phishing
سؤال
Anonymous digital cash is digital cash that cannot be:

A) handled by a trusted third party.
B) held in online storage systems.
C) traced back to the person who spent it.
D) served as a substitute for government-issued physical currency.
سؤال
To process payment cards for Internet transactions, an online merchant must set up a(n) _____ with an acquiring bank.
سؤال
With a(n) _____, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.

A) float
B) store charge cards
C) cryptocurrency
D) fintech
سؤال
The basic structure of a _____ involves a perpetrator who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site.

A) due diligence process
B) money laundering process
C) phishing attack
D) chargeback scheme
سؤال
_________ EBPP systems are used by large companies who want to manage the system themselves
سؤال
A (n)_____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.
سؤال
Businesspeople often use the term _____ as a general term to describe all types of plastic cards that consumers use to make purchases.
سؤال
What are the disadvantages of using paper checks?
سؤال
_____ is a general term that describes any value storage and exchange system created by a private entity that does not use paper documents or coins and that can serve as a substitute for government-issued physical currency.
سؤال
A(n) _____, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.
سؤال
What are the advantages and disadvantages of payment cards?
سؤال
Google Wallet, which uses the _____ technology that MasterCard developed for its credit cards, is available for mobile devices.
سؤال
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.
سؤال
_____ are created when a hacker plants zombie programs on a large number of computers.
سؤال
_____ can be accomplished by purchasing goods or services with ill-gotten electronic cash and selling them for physical cash on the open market.
سؤال
Most stored-value cards incorporate__________ technology which allows for contactless data transmission over short distances so the computer processor in the microchip con interact with readers and other devices.
سؤال
When a bank buys accounts from another bank, it performs a series of procedures called _____, which include checking the new customers' credit histories and banking records.
سؤال
When the right to use a zombie farm is sold to an organized crime association that wants to launch a phishing attack, the attack is called a(n) _____.
سؤال
Near field communication chips embedded in mobile phones are called Osaifu-Keitai in Japan, which translates approximately to _____.
سؤال
A(n) _______ stored-value card, can store more than 100 times the amount of information that a magnetic strip plastic card can store.
سؤال
In phishing, _____ use the collected information.
سؤال
What is the difference between a credit card and a charge card?
سؤال
_____ allows for contactless data transmission over short distances and can also be used if a smartphone is equipped with a chip similar to those that have been used on payment cards for a number of years.
سؤال
Processing a payment card transaction online involves two general processes.Describe these processes.
سؤال
In phishing, the collection of information is done by _____.
سؤال
U.S.laws define _____, as unlawful activities conducted by a highly organized, disciplined association for profit.
سؤال
Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/81
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 11: Payment Systems for Electronic Commerce
1
American Express and Discover Card are examples of open loop systems.
False
2
Credit cards provide assurances for both the consumer and the merchant.
True
3
Credit card issuers charge interest on any unpaid balance.
True
4
In an online storage system, the merchant must contact the consumer's bank to receive payment for a purchase.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
5
Charge cards involve lines of credit and accumulate interest charges.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
6
A front-end processor handles chargebacks and any other reconciliation items through the interchange network and the acquiring and issuing banks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
7
Store-value cards are safer than magnetic strip credit cards because the information stored on a Store-value card can be encrypted.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
8
Online and telephone purchases include a minimal degree of risk for merchants and banks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
9
For merchants, payment cards provide fraud protection.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
10
Magnetic strip cards can send and receive information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
11
Digital cash can be easily traced back to its origin.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
12
Concerns about digital cash methods include privacy and security, independence, portability, and convenience.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
13
More than 80% of B2C online payments in the United State are made using credit or debit cards.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
14
Digital cash ought to be anonymous, just as currency is.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
15
Payment card service companies charge merchants per-transaction fees and monthly processing fees for processing payments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
16
In an online cash storage system, a trusted third party, such as an online bank, coordinates all transfers of digital cash and holds the consumers' cash accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
17
The use of mobile telephone carriers as a micropayment system has been held back by the mobile carriers' substantial charges for providing the service.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
18
The level of fraud in online transactions is much lower than either in-person or telephone transactions of the same nature.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
19
In an offline cash storage system, a consumer does not personally possess digital cash, instead a trusted party holds the consumers' cash accounts.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
20
A debit card removes the amount of the sale from the cardholder's bank account and transfers it to the seller's bank account.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
21
A disadvantage of using paper checks is the delay that occurs between the time that a person writes a check and the time that check clears the person's bank.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
22
Using digital cash provides an audit trail.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
23
The Check Clearing for the 21st Century Act permits banks to eliminate the movement of physical checks entirely.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
24
Whenever additional parties are included in payment card transaction processing, the system is called a(n) _____system.

A) open loop
B) offline transaction
C) point of purchase
D) direct payment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
25
A _____, offered by companies such as American Express, carries no spending limit, and the entire amount billed to the card is due at the end of the billing period.

A) credit card
B) charge card
C) debit card
D) smart card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
26
The term _____ refers to all payments less than $10.

A) mini payments
B) small payments
C) minitransactions
D) microtransactions
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
27
Typically, server-side digital wallets store a customer's information on the customer's computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
28
Payment cards with disposable numbers are known as _____.

A) charge cards
B) single-use cards
C) credit cards
D) store-branded cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
29
In the context of payment acceptance and processing, closed loop systems:

A) include additional payment processing units.
B) involve paying the merchants directly.
C) work similar to an open loop system.
D) make use of an intermediary, such as a bank.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
30
When a cardholder successfully contests a charge, the acquiring bank must retrieve the money it placed in the merchant account in a process called a _____.

A) click-through
B) chargeback
C) dispute
D) recharge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
31
Internet payments for items costing from a few cents to approximately a dollar are called _____.

A) double spending
B) micropayments
C) money laundering
D) chargebacks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
32
A two-part lock provides anonymous security but signals when someone is attempting to double spend cash.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
33
Some online merchants accept direct deductions from customers' checking accounts which are done through a network of banks called the _____.

A) Automated Cash Holding
B) acquiring banks
C) Automated Clearing House
D) issuing banks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
34
_____ are also called "electronic funds transfer at point of sale cards," especially outside the United States.

A) Debit cards
B) Credit cards
C) Gift cards
D) Prepaid cards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
35
A(n) _____ is a bank that does business with sellers that want to accept payment cards.

A) issuing bank
B) acquiring bank
C) mortgage bank
D) advising bank
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
36
A credit card____________.

A) has no spending limit.
B) has no interest charged on unpaid balances.
C) is the same as a debit card.
D) protects the consumer with an automatic 30-day dispute period.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
37
In the context of fees deducted by acquiring banks, _____ are charged at rates which depend on the merchant's industry.

A) acquirer fees
B) interchange fees
C) chargeback fees
D) interest fees
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
38
Digital wallet is similar to physical money that kept in a wallet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
39
A set of connections between banks that issue credit cards, the associations that own the credit cards, and merchants' banks is called a(n) _____.

A) check processing system
B) zombie farm
C) interchange network
D) near field communication system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
40
A _____ obtains authorization for a payment card transaction by sending the transaction's details to the interchange network and storing a record of the approval or denial.

A) back-end processor
B) front-end processor
C) server-side digital wallet
D) client-side digital wallet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
41
Prepaid cards sold with the intention that they be given as presents are called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
42
A _________ is a stored-value card with an embedded microchip that can store information.

A) credit card
B) debit card
C) charge card
D) smart card
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
43
The delay that occurs between the time that a person writes a check and the time that check clears the person's bank is known as _____.

A) load
B) payback
C) prepayment
D) float
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
44
_____ are fees charged by banks for providing payment card processing services to merchants.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
45
With a(n) _____, a user can pay off the entire card balance or pay a minimum amount each billing period.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
46
A _____ stores information on a customer's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
47
_____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.

A) Pharming
B) Identity theft
C) Due diligence
D) Money laundering
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
48
Visa and MasterCard are _____ that are operated by the banks which issue credit cards to individual customers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
49
_____ are responsible for evaluating their customers' credit standings and establishing appropriate individual credit limits.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
50
A _____ requires no download time or installation on a user's computer.

A) server-side digital wallet
B) client-side digital wallet
C) hardware-based digital wallet
D) mobile-based digital wallet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
51
A _____ can be used as a hardware-based digital wallet.

A) database
B) personal computer
C) server
D) smartphone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
52
A _____ handles chargebacks and any other reconciliation items.

A) front-end processor
B) back-end processor
C) clearing house
D) payment gateway
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
53
_____ is spending a particular piece of digital cash twice by submitting the same electronic currency to two different vendors.

A) Double spending
B) Blind signing
C) Money laundering
D) Spear phishing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
54
Anonymous digital cash is digital cash that cannot be:

A) handled by a trusted third party.
B) held in online storage systems.
C) traced back to the person who spent it.
D) served as a substitute for government-issued physical currency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
55
To process payment cards for Internet transactions, an online merchant must set up a(n) _____ with an acquiring bank.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
56
With a(n) _____, credit theft is much more difficult because the key to unlock the encrypted information is a PIN.

A) float
B) store charge cards
C) cryptocurrency
D) fintech
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
57
The basic structure of a _____ involves a perpetrator who sends e-mail messages to a large number of recipients who might have an account at a targeted Web site.

A) due diligence process
B) money laundering process
C) phishing attack
D) chargeback scheme
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
58
_________ EBPP systems are used by large companies who want to manage the system themselves
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
59
A (n)_____ is a three- or four-digit number printed on a credit card, and is required for card not present transactions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
60
Businesspeople often use the term _____ as a general term to describe all types of plastic cards that consumers use to make purchases.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
61
What are the disadvantages of using paper checks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
62
_____ is a general term that describes any value storage and exchange system created by a private entity that does not use paper documents or coins and that can serve as a substitute for government-issued physical currency.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
63
A(n) _____, serving a function similar to a physical wallet, holds credit card numbers, electronic cash, owner identification, and other owner contact information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
64
What are the advantages and disadvantages of payment cards?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
65
Google Wallet, which uses the _____ technology that MasterCard developed for its credit cards, is available for mobile devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
66
When the e-mails used in a phishing expedition are carefully designed to target a particular person or organization, the exploit is called _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
67
_____ are created when a hacker plants zombie programs on a large number of computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
68
_____ can be accomplished by purchasing goods or services with ill-gotten electronic cash and selling them for physical cash on the open market.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
69
Most stored-value cards incorporate__________ technology which allows for contactless data transmission over short distances so the computer processor in the microchip con interact with readers and other devices.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
70
When a bank buys accounts from another bank, it performs a series of procedures called _____, which include checking the new customers' credit histories and banking records.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
71
When the right to use a zombie farm is sold to an organized crime association that wants to launch a phishing attack, the attack is called a(n) _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
72
Near field communication chips embedded in mobile phones are called Osaifu-Keitai in Japan, which translates approximately to _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
73
A(n) _______ stored-value card, can store more than 100 times the amount of information that a magnetic strip plastic card can store.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
74
In phishing, _____ use the collected information.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
75
What is the difference between a credit card and a charge card?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
76
_____ allows for contactless data transmission over short distances and can also be used if a smartphone is equipped with a chip similar to those that have been used on payment cards for a number of years.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
77
Processing a payment card transaction online involves two general processes.Describe these processes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
78
In phishing, the collection of information is done by _____.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
79
U.S.laws define _____, as unlawful activities conducted by a highly organized, disciplined association for profit.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
80
Google Wallet, Microsoft Windows Live ID, and Yahoo! Wallet are examples of _____ digital wallets.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 81 في هذه المجموعة.