1/13 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
17 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. A cost that has already been incurred and cannot be recovered, regardless of future actions or decisions.
2. The ability to contain and isolate faults or bugs within a specific module or component, minimizing the impact on the overall system.
3. The inclusive practice of designing and developing websites and web content that can be accessed and used by individuals with disabilities.
4. The entry point or destination in a communication link.
5. The requirement to inform individuals and authorities of a security breach that involves their personal data.
6. The potential for legacy systems to fail to meet modern regulatory requirements
7. Point of interaction between users and an ICT system for input and output of information.
8. The body of law that governs agreements and enforceable promises between parties.
9. The use of technology to minimize waste generation and promote recycling, composting, and responsible disposal practices.
10. A type of testing where test data is intentionally selected to trigger error conditions or invalid inputs.
11. Uncontrolled fire that can engulf data centers and destroy data stored within them.
12. The extent to which a user is pleased or dissatisfied with a system.
13. A software distribution model in which applications are hosted by a third-party provider and made available to customers over the internet.
14. A previously unknown software vulnerability that is exploited by cybercriminals before the software developer releases a patch or fix for it.
15. The knowledge and ability to use computers and related technology efficiently.
16. A technique that involves directly observing stakeholders in their natural environment to understand their behaviors and interactions.
17. A system that uses continuous signals or physical quantities to represent and process data, as opposed to digital systems that use discrete values.