1/10 | 14 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3/12 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
15 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
1. The process of copying data to multiple locations to improve data availability and resilience.
2. The duplication of data to ensure its availability in the event of a hardware or software failure.
3. A company that provides cloud computing services to businesses and individuals.
4. The ability of cloud systems to remain accessible and operational in the face of hardware or software failures.
5. A pricing model in which customers pay a recurring fee for access to a product or service.
6. The process of restoring business-critical systems and data after a natural or man-made disaster.
7. The process of moving data from one system or storage location to another, typically from on-premises to cloud storage.
8. The delay that occurs when sending data between two points on a network.
9. A cloud infrastructure maintained by a single organization, providing increased security and control over data.
10. The process of converting plain text into a coded language to prevent unauthorized access to sensitive information.
11. Rules that govern the exchange of data between networks, ensuring that only authorized users have access to sensitive information.
12. A model that describes how cloud infrastructure is deployed, such as public, private, or hybrid.
13. A type of data storage in which data is stored on remote servers accessed through the internet.
14. The ability of cloud systems to grow or shrink in response to changing demand, much like an elastic band.
15. A technology that allows multiple virtual machines to run on a single physical machine.