1 | 12 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
3 | |||||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
11 | 13 | ||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
1. The process of converting plain text into a coded language to prevent unauthorized access to sensitive information.
2. The delay that occurs when sending data between two points on a network.
3. The ability of cloud systems to remain accessible and operational in the face of hardware or software failures.
4. A company that provides cloud computing services to businesses and individuals.
5. A technology that allows multiple virtual machines to run on a single physical machine.
6. The duplication of data to ensure its availability in the event of a hardware or software failure.
7. The ability of cloud systems to grow or shrink in response to changing demand, much like an elastic band.
8. A pricing model in which customers pay a recurring fee for access to a product or service.
9. The process of restoring business-critical systems and data after a natural or man-made disaster.
10. The process of moving data from one system or storage location to another, typically from on-premises to cloud storage.
11. The process of copying data to multiple locations to improve data availability and resilience.
12. A model that describes how cloud infrastructure is deployed, such as public, private, or hybrid.
13. Rules that govern the exchange of data between networks, ensuring that only authorized users have access to sensitive information.