Comparatives
Vendors
Technicals
Security
100

This slows down down service because there is more data than a network node can handle, often happening at the busiest part of the day.

What is "congestion"

100
Google developed this online game streaming service to compete with Sony Playstation Now and Microsoft xCloud

What is Google "Stadia"

100

This protects you from data loss in case you close your file accidentally.

What is "auto-save" or "quick-save"

100

This industry was mentioned as an example of regulatory compliance issues.

What is "medical"

200

This allows multiple users to access and edit a file simultaneously.

What is "co-authoring"

200

These are the three largest cloud storage systems, as described in this presentation.

What are "OneDrive" (by Microsoft), "iCloud" (by Apple), and "Google Drive" (by Google).

200

This feature allows you to access your data from anywhere, at any time, so long as you have an internet connection and capable device.

What is "remote access".

200

When a virus locks out or infects your data until you have paid a fee, it is called this.

What is "Ransomware"

300

These are two of the four listed strengths regarding cloud-based storage.

What are "Accessibility", "File-Sharing", "Disaster Recovery", and "Reduced Hardware"?

300

Allowing a specialist outside your company, reducing overall manpower and costs, is often referred to as this.

What is "Third-Party Handling"

300

Making a positive impact on the environment by reducing the amount of paper needing to be printed is often called this.

What is "ecological footprint"

300

The big “data scrape” affecting Facebook occurred in this year.

When is "2019"

400

These are two of the four listed weaknesses regarding cloud-based storage.

What are "Internet Requirement", "Bandwidth Restrictions", "Added Expense", and "Vendor Lock-In"?

400

When it is difficult, inconvenient, or prohibitive to move from one cloud storage vendor to another.

What is "Vendor Lock-In"?

400

These are two of the three types of cloud storage.

What are "Block", "File", and "Object"?

400

Phishing is a common example of this type of psychological manipulation aimed at accessing your data.

What is "Social Engineering"