1 | 17 | |||||||||||||||||||||||
2 | ||||||||||||||||||||||||
3 | ||||||||||||||||||||||||
15 | 4 | 18 | ||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
7 | ||||||||||||||||||||||||
8 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
19 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
16 | ||||||||||||||||||||||||
11 | ||||||||||||||||||||||||
12 | ||||||||||||||||||||||||
13 | ||||||||||||||||||||||||
14 | ||||||||||||||||||||||||
1. A relationship where an experienced individual guides and advises a less experienced individual in their professional development.
2. The release of harmful substances or energy into the environment, resulting in negative impacts on living organisms and ecosystems.
3. The infringement of individuals' privacy rights as a result of data loss incidents, leading to concerns about data misuse or identity theft.
4. Where a customer is dependent on a particular vendor for products and services, making it difficult or costly to switch to another vendor.
5. The voluntary granting of permission by an individual for the collection, use, and sharing of their personal data.
6. A software development model in which progress is seen as flowing steadily downwards through the phases of conception, initiation, analysis, design, construction, testing, production/implementation, and maintenance.
7. An online seminar or training session conducted over the internet.
8. The ease with which a system can be maintained or repaired by replacing or updating individual modules or components.
9. Programs and applications that run on ICT systems, such as operating systems, databases, or productivity tools.
10. Systems that automatically switch to a redundant or backup system in case of a primary system failure.
11. A step-by-step guide that teaches users how to perform specific tasks or operations.
12. A legal doctrine that allows limited use of copyrighted material without permission from the owner for purposes such as criticism, commentary, or education.
13. The ability of a system to perform consistently and accurately over a period of time.
14. A type of malicious software that encrypts a victim's data and demands a ransom payment in exchange for decrypting and restoring access.
15. The regularity of performing backups is determined by factors such as the quantity and importance of the data being backed up.
16. A tool used to collect feedback and preferences from a large group of stakeholders to understand their needs and expectations.
17. The process of gathering and documenting requirements from stakeholders through various techniques such as interviews, surveys, and workshops.
18. The obligation to fulfill duties, obligations, and commitments in a reliable and dependable manner.
19. A relationship in which a more experienced or knowledgeable person helps to guide a less experienced or knowledgeable person.