a way to create a temporary list of items by adding them to your basket, which will keep track of the items until you leave our website
a way to create a temporary list of items by adding them to your cart, which will keep track of the items until you leave our website
software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online
advocates adaptive planning, evolutionary development, early delivery, and continual improvement, and it encourages flexible responses to change
the analysis of data, typically large sets of business data, by the use of mathematics, statistics, and computer software
a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more
someone who is assertive behaves confidently and is not frightened to say what they want or believe
the process of considering all the information about a situation or a person and making a judgement
a public sale of goods or property, where people make higher and higher bids for each thing, until the thing is sold to the person who will pay most
a series of vertical bars of varying widths, in which each of the digits zero through nine are represented by a different pattern of bars that can be read by a laser scanner
to offer a particular amount of money for something that is for sale and compete against other people to buy it, especially at a public sale of goods or property
very large sets of data that are produced by people using the internet, and that can only be stored, understood, and used with the help of special tools and methods
an arrangement you make to have a hotel room, tickets, etc. at a particular time in the future
an autonomous program on a network (especially the Internet) which can interact with systems or users, especially one designed to behave like a player in some video games
a network of computers created by malware and controlled remotely, without the knowledge of the users of those computers
to suggest a lot of ideas for a future activity very quickly before considering some of them more carefully
the promotion of a particular product or company by means of advertising and distinctive design
existing as a physical building, especially a shop, rather than doing business only on the internet
an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways
a word or phrase, often an item of jargon, that is fashionable at a particular time or in a particular context
a large office in which a company’s employees provide information to its customers, or sell or advertise its goods or services, by phone
to show your ticket at an airport so that you can be told where you will be sitting and so that your bags can be put on the aircraft
a payment to someone who sells goods that is directly related to the amount sold, or a system that uses such payments
a cybercrime and the act of using a computer to take or alter electronic data, or to gain unlawful use of a computer or system
a flight taken from an airport other than that from which the journey began, and which is taken in a different plane from that used for the previous stage of the journey
an alternative proposal made in response to a previous proposal that is regarded as unacceptable or unsatisfactory
a short written description of your education, qualifications, previous jobs, and sometimes also your personal interests, that you send to an employer when you are trying to get a job:
an interaction between an external consumer/customer and an organization through various online or offline channels
a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, troubleshooting, maintenance, upgrading,...
the act of cyber-criminals demanding payment through the use of or threat of some form of malicious activity against a victim, such as data compromise or denial of service attack
the politically motivated use of computers and information technology to cause severe disruption or widespread fear in society
information, especially facts or numbers, collected to be examined and considered and used to help decision-making, or information in an electronic form that can be stored and used by a computer
the process of using special software to look at large amounts of computer data in order to find out useful information, for example what types of product a company’s customers buy
a distributed denial-of-service attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood...
a situation in which agreement in an argument cannot be reached because neither side will change its demands or accept any of the demands of the other side
he conversion of text, pictures, or sound into a digital form that can be processed by a computer
a chain of businesses or intermediaries through which a good or service passes until it reaches the final buyer or the end consumer
a distinct subset of the Internet with addresses sharing a common suffix or under the control of a particular organization or individual
a large, flat table, often with a top that can be moved into different positions, used as a desk for drawing or designing things
a public offering auction structure in which the price of the offering is set after taking in all bids to determine the highest price at which the total offering can be sold
a software application that allows online businesses to manage their website, marketing, sales, and operations
a remote computing device that communicates back and forth with a network to which it is connected
a system of computers that makes it possible for particular organizations to communicate with each other and share information
a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules
a promise that something will be done or will happen, especially a written promise by a company to repair or change a product that develops a fault within a particular period of time
to gain unauthorized entry to a computer system, particularly by exploiting little-known weaknesses
the collective skills, knowledge, or other intangible assets of individuals that can be used to create economic value for the individuals, their employers, or their community
the fraudulent practice of using another person’s name and personal information in order to obtain credit, loans, etc.
the monetary payment received for goods or services, or from other sources, as rents or investments
the development, implementation, and maintenance of computer hardware and software systems to organize and communicate information electronically. Abbreviation: IT
a person or organization that makes business or financial arrangements between companies or organizations that do not deal with each other directly
a meeting in which someone asks you questions to see if you are suitable for a job or course
a system of connected computers that works like the internet and allows people within an organization to communicate with each other and share information
he feeling of tiredness and confusion that people experience after making a long journey by plane to a place where the time is different from the place they left
a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information
any attribute of a product that proves so useful as to become the main attraction of the product
Key Performance Indicators refer to a set of quantifiable measurements used to gauge a company’s overall long-term performance.
the time between the design of a product and its production, or between ordering a product and receiving it
a computer network that links devices within a building or group of adjacent buildings, especially one with a radius of less than 1 km
the careful organization of a complicated activity so that it happens in a successful and effective way
software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system
to make goods available to buyers in a planned way that encourages people to buy more of them, for example by advertising
a period in which a woman is legally allowed to be absent from work in the weeks before and after she gives birth
an occasion when two or more companies or organizations join together to make one larger company
a set of arrangements or equipment to make the effects of something less bad, for example the effects of an accident
the practice of interacting with customers using a combination of indirect and direct communication channels – websites, retail stores, mail order catalogs, etc.
the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network
the practice of leveraging web-based channels to spread a message about a company’s brand, products, or services to its potential customers
a shop that is one of many owned by a particular company and that sells the goods that the company has produced
the principle or practice of paying for goods and services at the time of purchase, rather than relying on credit
colloquially known as a pen test, pentest or ethical hacking, is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system
the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers
to offer a particular amount of money for something that is for sale and compete against other people to buy it, especially at a public sale of goods or property
a new window that opens quickly on a computer screen in front of what you are working on
a website that compares the price of a particular product or service in different stores or from different companies
the first example of something, such as a machine or other industrial product, from which all later forms are developed
a type of malicious software designed to block access to a computer system until a sum of money is paid
money, or any property that can be converted into money, assets, an available means afforded by the mind or one’s personal capabilities
a short written description of your education, qualifications, previous jobs, and sometimes also your personal interests, that you send to an employer when you are trying to get a job
a type of auction in which the traditional roles of buyer and seller are reversed – there is one buyer and many potential sellers
a way of bringing products or services to market so that they can be purchased by consumers
someone whose job is to sell a company’s products, often by traveling to different places
the practice of marketing a business using paid advertisements that appear on search engine results pages
a person who owns shares in a company and therefore gets part of the company’s profits and the right to vote on how the company is controlled
a list of people who have been judged the most suitable for a job or prize, made from a longer list of people originally considered, and from which one person will be chosen
the use of marketing methods to change people’s behaviour in areas such as health, education, etc.
websites and applications that enable users to create and share content or to participate in social networking
a detailed blueprint that answers the what, when, how, and why for all the content you post on your business’s social pages
a program that automatically retrieves webpages and follows the links on them to retrieve more webpages
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive
software that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive
Secure Sockets Layer is a secure protocol developed for sending information securely over the Internet
an arrangement to receive something, typically a publication or access to a service, regularly by paying in advance
a software suite or application suite is a collection of computer programs — usually application software or programming software — of related functionality, often sharing a similar user interface...
particular group of people, identified as the intended recipient of an advertisement or message
general and special arrangements, provisions, requirements, rules, specifications, and standards that form an integral part of an agreement or contract
a third person or organization less directly involved in a matter than the main people or organizations that are involved
the practice of determining the credibility and seriousness of a potential threat, as well as the probability that the threat will become a reality
a name or symbol on a product that shows it was made by a particular company, and that it cannot be used by other companies without permission
a program designed to breach the security of a computer system while ostensibly performing some innocuous function
a threat in which a person or group of people are warned that if they do not do a particular thing, something unpleasant will happen to them. It is usually the last and most extreme in a series of actions...
a type of computer program that, when executed, replicates itself by modifying other computer programs and inserting its own code
computer analysis of the human voice, especially for the purposes of interpreting words and phrases or identifying an individual voice
linear project management approach, where stakeholder and customer requirements are gathered at the beginning of the project, and then a sequential project plan is created to accommodate those requirements
the process of telling people you know about a particular product or service, usually because you think it is good and want to encourage them to try it
a computer connected to the Internet that has been compromised by a hacker, computer virus or trojan horse program and can be used to perform malicious tasks of one sort or another under remote direction