The additional security option, used for credit card transactions, that keeps track of a customer’s historical shopping patterns and notes deviations from the norm is _____.

a. transaction incognito mode
b.transaction identification code
c.transaction-spam control software
d. transaction-risk scoring software


d. transaction-risk scoring software
Card verification value is a three-digit number above the signature panel on the back of a credit card. This technique makes it impossible to make purchases with a credit card number stolen online. An additional security option is transaction-risk scoring software, which keeps track of a customer’s historical shopping patterns and notes deviations from the norm.

Computer Science & Information Technology

You might also like to view...

If a bubble sort is used to arrange the numbers 7 5 3 9 2 6 in ascending order, what order will the data be in after the first pass?

A) 2 5 3 9 7 6 B) 5 7 3 9 2 6 C) 5 3 7 2 6 9 D) 2 3 5 6 7 9 E) none of the above

Computer Science & Information Technology

The majority of network traffic on the Web is encrypted.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

When removing an old video card from the system, which of the following does not need to be removed?

a. PCIe power cable b. ATX power cable c. Video cable d. SLI or CrossFire cable

Computer Science & Information Technology

What creates an animation by performing a series of transformations on a single image?

A. Tween animation B. Projected animations C. Frame animation D. Animated gifs

Computer Science & Information Technology