1 | 14 | ||||||||||||||||||||||||
2/3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
15 | 16 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
1. The act of engaging in abusive, threatening, or distressing behavior towards others through online platforms or communication channels.
2. Unauthorized individuals gain access to and exploit sensitive or confidential data when they gain entry to information intended to be kept private or classified.
3. Incidents where unauthorized individuals gain access to data, often resulting in potential harm or privacy violations.
4. A software licensing model that restricts access to the source code and limits how the software can be used.
5. The use of technology to work remotely and reduce the need for commuting, resulting in decreased air pollution, traffic congestion, and energy consumption.
6. Works that are free for use by anyone, which have expired copyrights or were never copyrighted.
7. Referring to individuals or groups who are not adequately represented or present in computing fields, typically based on factors such as gender, race, ethnicity, or socioeconomic status.
8. A type of PDF document that includes structural tags, allowing screen readers and other assistive technologies to accurately interpret the content and provide accessible reading experiences.
9. The ability to analyze and evaluate various forms of media, including digital media.
10. Using someone else's identity or pretending to be someone else online to deceive or harm others.
11. A person or organization that collects, determines the purposes of, and is responsible for the processing of personal data.
12. The act of making false statements about a person or organization through the internet with the intent to harm their reputation.
13. A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals.
14. The skills to effectively navigate, search, and critically evaluate information on the internet.
15. the practice of keeping and storing data for a specific period of time, as legally required or for business purposes
16. Unwelcome sexual advances, requests for sexual favors, or other verbal/physical conduct of a sexual nature.