1 | 13 | 15 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7/12 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. The ability to navigate, evaluate, and create information using digital technologies.
2. The complete disappearance of a species from the entire planet.
3. A community of living organisms and their environment, interacting as a system.
4. Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction.
5. The practice of working a second job, typically after normal working hours.
6. In the realm of IT, the characteristic of being able to tailor, alter, and effectively react to evolving technologies, trends, and business needs.
7. Educational courses and programs that are delivered over the internet, allowing individuals to learn at their own pace.
8. The act of seeking revenge, punishment, or retribution against a person who reported harassment or misconduct.
9. A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access.
10. Software that is developed and sold for profit.
11. The release of harmful substances or energy into the environment, resulting in negative impacts on living organisms and ecosystems.
12. An individual's entitlement to govern and safeguard their personal information as well as monitor their activities carried out on the internet.
13. The unequal distribution of access to digital technologies and resources.
14. Software that can be used and distributed for free.
15. The body of law that governs agreements and enforceable promises between parties.
16. The process of encoding information in a manner that permits access and comprehension solely by authorized parties.