Cloud Computing

12345678910
Across
  1. 4. A cryptographic network protocol used to securely operate network services, log into systems, and execute commands remotely over unsecured networks
  2. 5. A highly scalable, flat data architecture designed to manage massive, unstructured data volumes (like videos, images, and backups) by storing data as self-contained "______" rather than in folders or blocks.
  3. 7. A high-performance, low-latency storage technology that divides data into fixed-sized, independently accessible blocks, each with its own address.
  4. 8. An architectural approach that virtualizes networks by separating the control plane (network logic) from the data plane (packet forwarding)
  5. 9. The elimination of duplicate or redundant information, especially in computer data.
  6. 10. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Down
  1. 1. A data storage approach that separates management software from underlying physical hardware, creating a flexible, pooled, and policy-driven storage environment.
  2. 2. Allows users to access online resources using memorable names rather than complex IP addresses.
  3. 3. A hierarchical data storage system that organizes data into _____ and folders, similar to a physical filing cabinet.
  4. 6. The process of reducing the size of data files using algorithms to optimize storage capacity, minimize bandwidth usage, and accelerate data transmission.