1 | 15 | 2 | 18 | 19 | |||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5/6 | |||||||||||||||||||||||||
7/14 | 16 | ||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. Software that is not protected by copyright and can be freely used and distributed.
2. Online platforms and websites that enable users to create and share content, interact with others, and participate in online communities.
3. Software that is provided for free for a limited time or with limited functionality, with the option to purchase a full version.
4. A distinctive sign, symbol, or logo used to identify and distinguish goods or services from those of others, granting legal protection against unauthorized use or imitation.
5. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
6. A type of software license that allows users to access, modify, and distribute the source code of the software.
7. The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches.
8. The state of being unknown or unidentifiable online, often used to protect privacy or facilitate malicious activities.
9. A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification.
10. Software that is developed and sold for profit.
11. Using someone else's identity or pretending to be someone else online to deceive or harm others.
12. The practice of protecting computer systems, networks, and data from digital attacks and unauthorized access.
13. The malicious act of redirecting internet traffic from its intended destination to a different IP address, usually for fraudulent purposes.
14. A type of software license that is sold for profit, usually with additional features or support.
15. The practice of collecting, analyzing, and preserving electronic evidence in a way that is legally admissible in court.
16. Confidential or proprietary information that provides a competitive advantage to a company and is kept secret from the public, such as a software algorithm.
17. The act of registering or using a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.
18. A license that allows multiple individuals to access and use a software or a website concurrently.
19. Refers to the practice of safeguarding information from corruption, loss, unauthorized access, or destruction.