1 | 14 | 16 | |||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
13 | 15 | 5 | |||||||||||||||||||||||
18 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals.
2. The version of software that has been transformed from source code into machine code that can be executed by a computer.
3. The gap in access to and availability of information due to limited digital access.
4. The skills to effectively navigate, search, and critically evaluate information on the internet.
5. A type of PDF document that includes structural tags, allowing screen readers and other assistive technologies to accurately interpret the content and provide accessible reading experiences.
6. The belief that abilities and intelligence can be developed through dedication, hard work, and a willingness to learn, fostering inclusivity in computing education and careers.
7. Small, subtle, and often unintentional acts of discrimination or bias that marginalize or belittle individuals.
8. Treating all individuals impartially and without favoritism or discrimination, ensuring equal opportunities and just outcomes.
9. A situation in which a person or organization is involved in multiple interests, one of which could possibly corrupt the motivation or decision-making of the individual or organization.
10. A community of living organisms and their environment, interacting as a system.
11. A legal protection that grants exclusive rights to inventors for their innovative software solutions.
12. An individual who can be identified by their personal data and has certain rights over its processing and protection.
13. Achieving a balance between professional work and personal life, which is important for women's inclusion in the tech industry.
14. In the world of IT, effective collaboration and coordinated efforts among IT professionals are pursued to attain shared objectives and accomplish successful IT projects.
15. The protection of personal information and sensitive data from unauthorized access, use, or disclosure.
16. The fraudulent acquisition and use of an individual's personal information, usually for financial gain, without their consent.
17. An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations.
18. The obligation to pay fees at regular intervals to keep a granted patent in force and enforceable.