This is a auto-generated Article of all your definitions within the glossary.
Glossary
This is a auto-generated Article of all your definitions within the glossary.
-
Abandoned cart
Abandoned cart refers to when a customer adds items to their online shopping cart but leaves before completing the purchase
-
BRANCHING
The ability to create different paths or branches within a process or workflow. It allows you to define conditions or criteria that determine which path the flow should follow based on the input or current state.
-
Business solution provider
BSPs are a global community of third-party solution providers with expertise on the WhatsApp Business Platform.
-
Business verification
This process helps Facebook to confirm that your account belongs to a legitimate business or organization.
-
Canais
A feature that shows social channels that can be integrated to SleekFlow
-
Carrinho abandonado
Carrinho abandonado refere-se a quando um cliente adiciona itens ao seu carrinho de compras on-line, mas sai antes de concluir a compra
-
Click through rate
Click-through rate (CTR) is the percentage of clicks on a link or button in relation to the number of times it is displayed, used to measure engagement and optimize content or design.
-
NODE
Node represents a visual element or block that represents a specific action, decision, or task within the flow, allowing users to design and customize the flow's logic and functionality.
-
PT/BR - Provedor de soluções de negócios (BSP, na sigla em inglês)
Os BSPs são uma comunidade global de provedores de soluções terceirizados com experiência na plataforma WhatsApp Business.
-
PT/BR - Verificação da empresa
Esse processo ajuda o Facebook a confirmar que sua conta pertence a uma empresa ou organização legítima.
-
Taxa de cliques (CTR)
A taxa de cliques (CTR) é a porcentagem de cliques em um link ou botão em relação ao número de vezes que ele é exibido, usada para medir o envolvimento e otimizar o conteúdo ou o design.
-
Testing
testing testing
-
Two-factor authentication (2FA)
A security measure that requires users to provide two different authentication factors to verify their identity. Typically, this involves combining something the user knows (like a password) with something the user has (like a temporary code sent to their mobile device). 2FA enhances security by adding an extra layer of protection, reducing the risk of unauthorized access even if one factor is compromised.