1/11 | 12 | ||||||||||||||||||||||||
2 | 16 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
4 | 13 | ||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
5 | 15 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A software license that grants users the right to use the software, without access to the source code.
2. The use of technology to reduce the amount of energy required to perform a certain task, resulting in less waste and lower environmental impact.
3. A deceitful online method that dupes individuals into divulging their personal or sensitive information is known as a fraudulent activity.
4. The exhaustion or reduction of natural resources, such as minerals, water, or fossil fuels, due to human activities.
5. The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data.
6. A relationship where an experienced individual guides and advises a less experienced individual in their professional development.
7. The use of technology to minimize waste generation and promote recycling, composting, and responsible disposal practices.
8. Continuous improvement of skills, knowledge, and expertise in the world of IT to remain well-informed and progress in the IT industry.
9. Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities.
10. The practice of working a second job, typically after normal working hours.
11. In the realm of IT, the conduct, mindset, and commitment demonstrated by IT professionals in the execution of their job duties is referred to as the standard expected.
12. The process of encoding information in a manner that permits access and comprehension solely by authorized parties.
13. Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose.
14. Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud.
15. The version of software that has been transformed from source code into machine code that can be executed by a computer.
16. A license that allows the buyer to use the software for commercial purposes, typically requiring a fee to be paid.
17. A formal request submitted to a patent office, containing all necessary details about the invention, including claims and specifications.