1/12 | 15 | ||||||||||||||||||||||||
2 | |||||||||||||||||||||||||
14 | 3 | 17 | |||||||||||||||||||||||
4 | |||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
13 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
1. The ability of cloud systems to remain accessible and operational in the face of hardware or software failures.
2. The process of moving data from one system or storage location to another, typically from on-premises to cloud storage.
3. A cloud infrastructure maintained by a single organization, providing increased security and control over data.
4. A company that provides cloud computing services to businesses and individuals.
5. A technology that allows multiple virtual machines to run on a single physical machine.
6. A combination of public and private cloud infrastructures, providing a balance of security and scalability.
7. The ability of cloud systems to grow or shrink in response to changing demand, much like an elastic band.
8. A model that describes how cloud infrastructure is deployed, such as public, private, or hybrid.
9. A pricing model in which customers pay a recurring fee for access to a product or service.
10. The process of copying data to multiple locations to improve data availability and resilience.
11. The delay that occurs when sending data between two points on a network.
12. The process of backing up data to the cloud, providing a secure and cost-effective alternative to traditional backup methods.
13. A type of data storage in which data is stored on remote servers accessed through the internet.
14. Rules that govern the exchange of data between networks, ensuring that only authorized users have access to sensitive information.
15. The process of converting plain text into a coded language to prevent unauthorized access to sensitive information.
16. The duplication of data to ensure its availability in the event of a hardware or software failure.
17. The process of restoring business-critical systems and data after a natural or man-made disaster.