1 | 14 | ||||||||||||||||||||||||
18 | |||||||||||||||||||||||||
19 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | 17 | ||||||||||||||||||||||||
5 | 4 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8/15 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 |
1. The unequal distribution of access to digital technologies and resources.
2. Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud.
3. The skills to effectively navigate, search, and critically evaluate information on the internet.
4. Software that is freely available, allowing users to access, use, modify, and distribute it without restrictions.
5. Posting inflammatory, irrelevant, or offensive comments or messages online with the aim of provoking emotional responses and disrupting discussions.
6. The laws and regulations that aim to safeguard consumers from unfair business practices, such as false advertising, defective products, and deceptive trade practices.
7. The process of removing personally identifiable information from data, making it impossible to associate with a specific individual.
8. A type of software license that allows users to use the software for free, but may have restrictions on distribution or modification.
9. The difference in technology availability, infrastructure, and knowledge.
10. The gap in access to and availability of information due to limited digital access.
11. In the realm of IT, adeptness involves examining intricate problems, pinpointing suitable resolutions, and executing strategies to overcome challenges related to information technology.
12. Unwanted or intimidating behavior, often repetitive, which creates a hostile or offensive work environment.
13. The protection of personal information and sensitive data from unauthorized access, use, or disclosure.
14. A legal framework that grants exclusive rights to creators and authors for their original works, preventing others from reproducing or distributing them without permission.
15. Software that can be used and distributed for free.
16. A licensing method that allows software to be freely used, modified, and shared, but requires that all derivative works also be distributed under the same license.
17. The process of ensuring that individuals and organizations adhere to laws, regulations, and industry standards applicable to their activities.
18. The requirement to inform individuals and authorities of a security breach that involves their personal data.
19. The preservation and withholding of sensitive and confidential information entrusted to IT professionals within the realm of IT.