1/12 | 16 | ||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
2 | 17 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
3 | 19 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | 14 | ||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 |
1. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
2. The effect of technology on the natural world, including ecosystems, resources, and climate.
3. The branch of law that deals with civil wrongdoings and provides remedies for damages caused by someone's negligence, intentional actions, or strict liability.
4. An individual who exposes wrongdoing, illegal activities, or unethical behavior within an organization to the public or the authorities.
5. Reducing the amount of personal data collected and processed to only what is necessary for a specific purpose.
6. Providing the same chances for advancement, growth, and success to both men and women in the tech industry.
7. Provides a temporary monopoly on an invention, enabling the owner to regulate market entry and enhance financial returns.
8. The interconnected nature of social categorizations, such as gender, race, ethnicity, and socioeconomic status, that creates overlapping systems of discrimination or disadvantage.
9. The ongoing process of learning and acquiring new knowledge and skills to maintain technical competence in a specific field.
10. The set of laws and regulations that protect individuals' right to privacy, including personal information, communications, and data.
11. A type of software license that allows only one user to access and use the software.
12. The quality of being independent and unbiased, making decisions based on facts and evidence rather than personal feelings or opinions.
13. A statement or document that illustrates the methods by which an organization gathers, utilizes, and safeguards the personal information of its users or customers.
14. Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions.
15. A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access.
16. A situation in which a person or organization is involved in multiple interests, one of which could possibly corrupt the motivation or decision-making of the individual or organization.
17. The condition of being anonymous is characterized by the absence or concealment of a person's identity or personal information.
18. A widely-held but oversimplified and generalized belief or idea about women in the tech industry.
19. The use of electronic communication to harass, intimidate, or harm individuals through the spread of derogatory messages, rumors, or threats.