1 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
3/4 | 18 | ||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | 17 | ||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 |
1. Storage device that uses NAND-based flash memory chips to store data, offering faster access and higher durability than traditional hard disk drives.
2. A backup process that records the entire state of a virtual machine, including its data, configuration settings, and system state.
3. "A backup method that utilizes storage in the cloud as its location, offering advantages such as adaptability, expandability, and economical efficiency."
4. The process of backing up data to the cloud, providing a secure and cost-effective alternative to traditional backup methods.
5. The complete reinstatement of a system, encompassing the operating system, applications, and user data, starting from the beginning.
6. A cloud infrastructure maintained by a single organization, providing increased security and control over data.
7. Process of restoring lost or damaged data files from a backup or other copies of the data.
8. The process of verifying the integrity and completeness of backup data to ensure its reliability for restoration purposes.
9. The delay that occurs when sending data between two points on a network.
10. Duration for which data has to be preserved and kept accessible.
11. Electronic module that manages the flow of data between the computer and the hard disk drive.
12. Storing backup copies of data and files at the same physical location as the original data source.
13. The process of moving data from one system or storage location to another, typically from on-premises to cloud storage.
14. A backup that is stored in the same location as the original data, allowing for quick access in case of a failure, but lacking protection.
15. The process of backing up data to physical storage devices that are disconnected from the network.
16. The process of converting plain text into a coded language to prevent unauthorized access to sensitive information.
17. Type of data redundancy where two copies of the same data are stored on separate magnetic disks.
18. The storage of data on remote servers accessed through the internet, offering flexible and scalable storage solutions.