1 | 15 | ||||||||||||||||||||||||
2 | 17 | ||||||||||||||||||||||||
3 | 18 | ||||||||||||||||||||||||
13 | 4 | ||||||||||||||||||||||||
5 | |||||||||||||||||||||||||
14 | |||||||||||||||||||||||||
6 | |||||||||||||||||||||||||
16 | |||||||||||||||||||||||||
7 | |||||||||||||||||||||||||
8 | |||||||||||||||||||||||||
9 | |||||||||||||||||||||||||
10 | |||||||||||||||||||||||||
11 | |||||||||||||||||||||||||
12 | |||||||||||||||||||||||||
1. The ability of cloud systems to remain accessible and operational in the face of hardware or software failures.
2. Software used to simulate real-world scenarios or processes, often for testing or training purposes.
3. A device that reads and writes data to optical storage devices such as CDs, DVDs, and Blu-Ray disks.
4. Long plastic ribbon coated with magnetic material on which data can be magnetically recorded.
5. A GUI tool used to manage system settings and configurations on a computer system
6. The system software that manages hardware and software resources on a device.
7. A setup designed for viewing films at home, often utilizing projectors for a cinematic experience.
8. Process of copying and storing data in a different location for safekeeping in case of data loss or damage to the original data.
9. The practice of ensuring that all individuals have equal access and opportunities to use digital technologies and participate in digital society.
10. The main memory in a computer where data is stored for immediate access by the CPU.
11. Software used to create realistic 2D or 3D images or animations from 3D models.
12. Software used to protect a computer from unauthorized access by limiting the incoming and outgoing network traffic.
13. The frequency at which a computer's memory operates, measured in cycles per second.
14. A portable scanning device that is manually run over the item to be scanned.
15. An immersive computer-generated experience that simulates a realistic environment or situation and can be explored and interacted with.
16. A small text box that appears when a mouse cursor hovers over a graphical element, providing additional information to the user
17. The process of encoding data to make it secure and prevent unauthorized access or modification.
18. The process of restoring business-critical systems and data after a natural or man-made disaster.