1/11 | 14 | 16 | |||||||||||||||||||||||
17 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3/12 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A licensing system that allows creators to give permission for others to use their work under certain conditions, promoting collaboration, sharing, and building upon existing intellectual creations.
2. A software licensing agreement that allows an organization to use a software product on an unlimited number of computers or for any number of users within a single physical location.
3. The act of establishing and maintaining relationships with other professionals in order to exchange knowledge and resources.
4. The presence of individuals from different backgrounds and identities, including but not limited to gender, race, ethnicity, and socioeconomic status, in computing fields.
5. Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction.
6. Software that converts text displayed on a computer screen into synthesized speech or Braille output.
7. The preservation and withholding of sensitive and confidential information entrusted to IT professionals within the realm of IT.
8. The process of encoding information in a manner that permits access and comprehension solely by authorized parties.
9. The applications of scientific knowledge for practical purposes, often involving the creation or modification of machinery or processes.
10. Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose.
11. The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats.
12. The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data.
13. The fraudulent acquisition and use of another person's personal information, typically for financial gain.
14. Protecting computer systems, networks, and data from unauthorized access, attacks, and breaches is the practice of safeguarding digital assets.
15. The act of seeking revenge, punishment, or retribution against a person who reported harassment or misconduct.
16. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
17. The use of technology to collect and analyze data on the environment, such as water quality, and biodiversity, to facilitate decision-making and conservation.