Q - T
Return Authorization number required by merchant to return product.
Request for Proposal used to secure products or services from a third party.
Real Time Credit Card Processing
On-line authorization of a credit card number in real time informing the merchant that the card has been approved.
Real Time Inventory
Ability to check inventory when a customer adds a selection to an order.
Allows users to view areas on a web page that extend beyond the computer screen page.
A Search Engine is an Internet portal or site that allows the registration of a domain name along with keywords that describe the site and its function. The keywords come in the form of meta tags.
An organization's security policy governs the use of encryption tools in the organization to achieve objectives.
Secure Environment for Transactions is the standard for secure transaction processing adopted by VISA and Mastercard International.
Once the goods have been shipped to the customer, the merchant can key a transaction for settlement, at which time the customer's credit card is charged for the transaction and the proceeds are deposited into the merchant account.
Signing Key Pair
Consists of a privately held key for signing data and a key distributed publicly so others can verify the signature.
A place on the Internet. Every web page has a location where is resides which is called a site. And, very site had an address usually beginning with http://. (see definition of location)
Creation of site from a visual and functional point of view.
Stock keeping units that a company offers, including type, style, color and size of product.
The act of unauthorized contact and solicitation using e-mail.
Secure Socket Layer is an encryption technology on the server that scrambles important data such as credit card numbers and order information when it is being stored or passed from one computer to another.
An e-mail message that notifies a customer that an order has been shipped.
Simple Public Key Mechanism (SPKM)
A secure session protocol specified by IETF RFC 2025.
The process of “looking around” the Internet.
T-1 is a leased line traditionally used for twenty-four telephone lines but now also used to move data. Federal Government sets price.
T-3 is a leased line. The speed at which data can be transmitted is forty-five megabits per second. Federal Government sets price. It is faster and has more capacity that a T-1.
Third Party Customer Service Center
Outsourcing of customer service including telephone center for handling orders and related customer service questions.
A trustworthy statement of time associated with a file or transaction. Notarization requires a trustworthy timestamp on a digitally signed transaction.
The toolbar sits across the top or along the side of a window or desktop. The toolbar is a menu of tasks such as opening a file or printing a document.
Like the Trojan horse of mythology, a Trojan horse virus pretends to be one thing when in fact it is something else.
Back to Previous Page