1 | 9 | 10 | ||||||||||||||||||||
2 | ||||||||||||||||||||||
3 | ||||||||||||||||||||||
4 | ||||||||||||||||||||||
11 | ||||||||||||||||||||||
5 | ||||||||||||||||||||||
6 | ||||||||||||||||||||||
7 | ||||||||||||||||||||||
8 | ||||||||||||||||||||||
1. Delivery of computing services over the internet on a pay-as-you-go basis in an ICT system.
2. The documented guidelines and steps that govern the use, management, and maintenance of the ICT system.
3. Computer or software that provides services or resources to other devices in an ICT system.
4. Interconnected system of devices that communicate with each other in an ICT system.
5. Physical components of an ICT system, such as computer parts and devices.
6. Programs and applications that run on an ICT system to enable it to perform various tasks.
7. Point of interaction between users and an ICT system for input and output of information.
8. The measures and protocols implemented to protect the ICT system, its data, and its users from unauthorized access, data breaches, and cyber threats.
9. Software that manages hardware and software resources in an ICT system.
10. Refers to the individuals who interact with and use the ICT system, including employees, stakeholders, and end-users.
11. Structured collection of data stored in an ICT system for easy retrieval and manipulation.