Does looping exist in security applications? For example, can you use a loop in an application where once an entry has been made to a system the looping process begins to continually loop data until a condition has been verified for access, such as maybe using Pay Pal to make online purchases, where the customers/merchant information is looped until a condition is verified to grant purchase(s)
Get Free Quote!
438 Experts Online