To protect your personal information online, don't shop on this type of wifi.
What is Public?
Uh Oh, you just got tricked into clicking on a malicious download from an email.
What is Phishing?
G2G
What is Got To Go
This type of automation helps to manage data and execute "office" admin tasks.
What is Office Automation?
Unit of computer information and an apple indent
What is a byte?
The padded lock symbol on a trusted url means the same thing as this letter.
What is s in https?
Your computer just got malware infected and now payment is demanded.
What is Ransomware?
IMO
What is In My Opinion?
This type of automation improves the reliability of "IT" Systems and Applications by reducing human error.
What is IT Process Automation?
Potato and Computer part
What is a chip?
You're shopping online and that annoying pop up ad for a too good to be true star wars saber catches your attention that you can't resist. This potential fraud just got your credit card information.
What is Adware?
Looking for Love in all the wrong places, internet dating online woes is known as this scam.
What is Romance Scam?
BWL
What is Bursting with Laughter?
This type of automation has all data, independent machines and processes "work together" under a single command system.
What is Integrated Automation?
Programming language and coffee
What is Java?
Long lost Uncle Bob calls out of the blue and wants to send you an amazon gift card! You gave him all your personal information over the phone cause you're so excited. What are you a victim of?
What is Vishing?
A pop up alerts you of a virus that infected your device. It then offers to fix it with free antivirus software.
What is Scareware?
TTYL
What is Talk to you Later?
This type of automation uses software technology to do rule-based task structured inputs and logic. Think of Rosie from the Jetsons.
What is Robotic Automation?
Hawaii favorite and unwanted emails
What is spam?
You're visiting several websites to get that winning ugly xmas sweater. Unbeknownst to you, your activity is being tracked and now can be sold or shared with 3rd parties or be compromised as part of a data breach. What is this called?
What is a Digital Footprint?
You want to help! Fake emails posing as legitimate charities or govt organizations are asking for donations.
What are Disaster Relief scams?
CWOT
What is Complete Waste of Time, just like this category?
This type of system automation is capable of processing multiple product types at the same time "easily adapting to changes."
What is Flexible Automation?
Corned Beef and Keyboard Symbol
What is Hash?