A | B |
Job-Specific | -pertaining to the profession and position you are in |
Compatibility | -of devices and especially computers: able to be used together |
Implementation | -to begin to do or use; to make active or effective |
Information Technology (IT) | -the application of computers and telecommunications equipment to store, retrieve, transmit, and manipulate data; often in the context of a business or other enterprise |
Automation | -to run or operate by using machines, computers, etc., instead of people to do the work |
Technologies | -a machine, piece of equipment, method, etc., that is created by technology; a manner of accomplishing a task especially using technical processes, methods, or knowledge |
Productivity | -the rate at which goods are produced or work is completed |
Malware | -short for malicious software; is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems |
Security | -the degree of resistance to, or protection from, harm |
Telecommunications | -communication at a distance by technological means, particularly through electrical signals or electromagnetic waves |
Trojan Horse | -a piece of malware that pretends to be something benign; users are deceived into opening the file, which in most cases installs malware |
Cyber Stalker | -the use of the internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization |