1 | 13 | ||||||||||||||||||||||||
2/11 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
3 | 15 | ||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. A pricing model in which customers pay a recurring fee for access to a product or service.
2. A model that describes how cloud infrastructure is deployed, such as public, private, or hybrid.
3. The process of converting plain text into a coded language to prevent unauthorized access to sensitive information.
4. A cloud infrastructure maintained by a single organization, providing increased security and control over data.
5. The delay that occurs when sending data between two points on a network.
6. A company that provides cloud computing services to businesses and individuals.
7. The process of moving data from one system or storage location to another, typically from on-premises to cloud storage.
8. Rules that govern the exchange of data between networks, ensuring that only authorized users have access to sensitive information.
9. A technology that allows multiple virtual machines to run on a single physical machine.
10. The ability of cloud systems to remain accessible and operational in the face of hardware or software failures.
11. The ability of cloud systems to grow or shrink in response to changing demand, much like an elastic band.
12. The process of restoring business-critical systems and data after a natural or man-made disaster.
13. The process of copying data to multiple locations to improve data availability and resilience.
14. The duplication of data to ensure its availability in the event of a hardware or software failure.
15. A type of data storage in which data is stored on remote servers accessed through the internet.