ICT Revision

?
VOIP
Voice over internet protocol
1 of 8
Covert
Sercretly installing software
2 of 8
Overt
Online Forms
3 of 8
Phishing
is an attempt to obtain sensitib
4 of 8
3rd party processor
a company appointed by a merchant to handle transactions
5 of 8
E-commerce
is a transaction of buying or selling online
6 of 8
Verification
the process of establishing the validity of something
7 of 8
Viral Marketing
is a marketing technique that uses pre-existing social network
8 of 8

Other cards in this set

Card 2

Front

Sercretly installing software

Back

Covert

Card 3

Front

Online Forms

Back

Preview of the back of card 3

Card 4

Front

is an attempt to obtain sensitib

Back

Preview of the back of card 4

Card 5

Front

a company appointed by a merchant to handle transactions

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Operating online resources »