1 | 14 | ||||||||||||||||||||||||
2 | 15 | ||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5/12 | |||||||||||||||||||||||||
13 | 6 | ||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. An incident where unauthorized individuals gain access to confidential or sensitive data, potentially leading to privacy violations.
2. The ability to locate, evaluate, and use information effectively to solve problems and make decisions.
3. The obligation to fulfill duties, obligations, and commitments in a reliable and dependable manner.
4. A software licensing model that restricts access to the source code and limits how the software can be used.
5. The set of laws and regulations that govern activities related to protecting computer systems and networks from unauthorized access, hacking, and data breaches.
6. The act of making false statements about a person or organization through the internet with the intent to harm their reputation.
7. A set of regulations and guidelines that govern the handling and safeguarding of personal data to ensure the privacy and security of individuals.
8. Continuous improvement of skills, knowledge, and expertise in the world of IT to remain well-informed and progress in the IT industry.
9. In the realm of IT, adeptness involves examining intricate problems, pinpointing suitable resolutions, and executing strategies to overcome challenges related to information technology.
10. Provides a temporary monopoly on an invention, enabling the owner to regulate market entry and enhance financial returns.
11. The ongoing process of learning and acquiring new knowledge and skills to maintain technical competence in a specific field.
12. Official documents or credentials that certify an individual's expertise and competence in a specific area or field.
13. Laws that deal with offenses committed using computers or the internet, such as hacking, identity theft, and online fraud.
14. The process of removing personally identifiable information from data, making it impossible to associate with a specific individual.
15. The use of technology to collect and analyze data on the environment, such as water quality, and biodiversity, to facilitate decision-making and conservation.