Across
- 4. A cryptographic network protocol used to securely operate network services, log into systems, and execute commands remotely over unsecured networks
- 5. A highly scalable, flat data architecture designed to manage massive, unstructured data volumes (like videos, images, and backups) by storing data as self-contained "______" rather than in folders or blocks.
- 7. A high-performance, low-latency storage technology that divides data into fixed-sized, independently accessible blocks, each with its own address.
- 8. An architectural approach that virtualizes networks by separating the control plane (network logic) from the data plane (packet forwarding)
- 9. The elimination of duplicate or redundant information, especially in computer data.
- 10. A part of a computer system or network which is designed to block unauthorized access while permitting outward communication.
Down
- 1. A data storage approach that separates management software from underlying physical hardware, creating a flexible, pooled, and policy-driven storage environment.
- 2. Allows users to access online resources using memorable names rather than complex IP addresses.
- 3. A hierarchical data storage system that organizes data into _____ and folders, similar to a physical filing cabinet.
- 6. The process of reducing the size of data files using algorithms to optimize storage capacity, minimize bandwidth usage, and accelerate data transmission.
