Learning Unit 1 Puzzle
Across
- 3. Adhering to privacy laws and regulations (e.g., GDPR, HIPAA) is crucial to avoid legal consequences and financial penalties.
- 6. also known as green IT or sustainable computing, is an approach to designing, manufacturing, using, and disposing of computing devices and systems in an environmentally responsible manner.
- 7. is a critical aspect of data management, encompassing the protection of personal and sensitive information from unauthorized access, use, or disclosure. In today's digital age, where vast amounts of data are collected and processed, maintaining information privacy is paramount. Here, we'll discuss the importance of information privacy and methods for improving it
- 9. Collect only the necessary data for specific purposes to reduce the risk associated with potential data breaches.
- 10. Provides creators exclusive rights to their original works of authorship, such as literature, music, and art, for a limited duration.
- 11. By optimizing energy usage and employing energy-efficient technologies, green computing helps conserve energy resources and reduces the environmental impact of IT operations.
- 12. refers to creations of the mind, such as inventions, literary and artistic works, designs, symbols, names, and images used in commerce. Protecting intellectual property is crucial for fostering innovation, creativity, and fair competition. The principles of intellectual property revolve around providing legal rights to creators and inventors while balancing the interests of the public. The major types of intellectual property include patents, copyrights, trademarks, and trade secrets.
Down
- 1. refers to the gap between those who have access to modern information and communication technology (ICT) and those who do not.
- 2. Encourages innovation by providing inventors with the incentive to invest time and resources in developing new technologies
- 4. Protecting individuals' privacy builds trust with customers, clients, and stakeholders, enhancing the organization's reputation.
- 5. are susceptible to interception and surveillance, raising concerns about unauthorized access to sensitive information
- 8. involves the creation, distribution, and consumption of content in digital formats, such as e-books, online articles, and digital magazines.
- 11. communication channels can help individuals bypass surveillance and censorship attempts