1/14 | ||||||||||||||||||||||||
2 | ||||||||||||||||||||||||
19 | ||||||||||||||||||||||||
17 | 3 | |||||||||||||||||||||||
16 | ||||||||||||||||||||||||
4 | ||||||||||||||||||||||||
5 | ||||||||||||||||||||||||
6 | ||||||||||||||||||||||||
18 | 7 | |||||||||||||||||||||||
8 | ||||||||||||||||||||||||
9 | ||||||||||||||||||||||||
10 | ||||||||||||||||||||||||
11/15 | ||||||||||||||||||||||||
12 | ||||||||||||||||||||||||
13 | ||||||||||||||||||||||||
1. An intermediary device between a client and a server, forwarding requests from the client to the server and returning responses back to the client.
2. Delivery of computing services over the internet on a pay-as-you-go basis in an ICT system.
3. Physical components of an ICT system, such as computer parts and devices.
4. Software that manages hardware and software resources in an ICT system.
5. A device that allows a user to communicate with a computer and execute commands.
6. The ability of modules or components to be reused in different systems or applications, reducing development time and effort.
7. The ease with which a system can be modified or customized by changing or extending its modules or components.
8. Computer or software that provides services or resources to other devices in an ICT system.
9. Point of interaction between users and an ICT system for input and output of information.
10. A server is a computer or software program that provides services or resources to clients.
11. The ability to contain and isolate faults or bugs within a specific module or component, minimizing the impact on the overall system.
12. The entry point or destination in a communication link.
13. The ability of a system to easily adapt and change by adding, removing, or modifying its components or modules without affecting other parts of the system.
14. A firewall technique that inspects incoming and outgoing packets and determines whether to allow or block them based on predefined criteria.
15. A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
16. The documented guidelines and steps that govern the use, management, and maintenance of the ICT system.
17. A client is a computer or software program that requests services or resources from a server.
18. The measures and protocols implemented to protect the ICT system, its data, and its users from unauthorized access, data breaches, and cyber threats.
19. The ease with which a system can be maintained or repaired by replacing or updating individual modules or components.