ITELEC Flashcards

1
Q

means technology solutions can be built via a service-oriented architecture by connecting up services from different providers
- top of other people other’s platforms.

A

Rise Of The Services Economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • to deal with this ever-increasing complexity of our technology landscape will require a move from the standalone solutions of today.
  • today, into a world of systems of systems, where
    smaller technologies are nested within larger ones which in turn are nested within larger ones in a
    plug and play, flexible, modular, service-oriented architecture.
A

Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

increasingly end-users are becoming
producers and to harness this new source
of innovation means closed systems have to
open up; creating APIs and platforms on
which end-users can alter, adapt and
innovate while being supported by the core
technology.

A

user generated systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a group of technologies that are
used as a base or infrastructure
upon which other applications,
technologies or processes are
developed for the end-user

A

platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

also known as the infrastructure
layer or system software layer, forms
the foundation for running
applications.

A

Platform Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sits on top of the platform layer and
represents the actual software
applications that users interact with
to perform specific tasks

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the quality of dealing with generic
forms rather than specific events,
details or applications.

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is achieved by defining a core
set of building blocks and then
configuring them into different
bundles depending on the context.

A

Bunding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Platforms are open systems, unlike
traditional technologies that are
simply designed as individual
physical objects that perform a
function, platforms are designed to
be interoperable with other systems,
they will likely have external
applications running on top of them
all of which can not be fully foreseen
by the developers of the platform.

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adaptive capacity and agility are,
and will increasingly be seen as a
key requirement, if not the key
requirement, in the coming decades

A

Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a critical aspect of platform
technologies as it serves as a bridge
between different components of a
system, allowing them to
communicate and interact
seamlessly.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are built on top of the
platform layer and leverage the
underlying infrastructure and
services provided by the platform.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a fundamental component of
platform technologies, serving as an
intermediary between hardware and
software.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the underlying hardware
and networking components that
support the platform and
applications.

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The interface facilitates
communication between different
layers of the platform, allowing
applications to interact with the
operating system and infrastructure
through well-defined interfaces.

A

Interrelationship/Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This was from the period of 1940 to
1955.
- This was when machine language
was developed for the use of
computers.
- They used vacuum tubes for the
circuitry

A

1st Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The years 1957-1963 were referred
to as the “second generation of
computers” at the time.
- ____and ______are
employed as assembly languages
and programming languages.
- Here they advanced from vacuum
tubes to transistors.

A

2nd Generation:
Combol & Fortan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The hallmark of this period
(1964-1971) was the development of
the integrated circuit.

A

3rd Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The invention of the
microprocessors brought along the
fourth generation of computers.
- The years 1971-1980 were
dominated by fourth generation
computers. C, C++ and Java were
the programming languages utilized
in this generation of computers.

A

4th Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These computers have been utilized
since 1980 and continue to be used
now.

A

5th Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

These early computers were
designed, built and maintained by a
single group of people.
- Programming languages were
unknown and there were no
operating systems so all the
programming was done in machine
language. All the problems were
simple numerical calculations.
- By the 1950’s punch cards were
introduced and this improved the
computer system.

A

The First Generation ( 1945 - 1955 ):
Vacuum Tubes and Plugboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

These machines were known as
mainframes and were locked in
air-conditioned computer rooms with
staff to operate them.
- The Batch System was introduced to
reduce wasted time in the computer.

A

Transistors and Batch Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The third generation operating
systems also introduced
multiprogramming.
- This meant that the processor was
not idle while a job was completing
its I/O operation. Another job was
scheduled on the processor so that
its time would not be wasted.

A

The Third Generation ( 1965 - 1980 ):
Integrated Circuits and Multiprogramming

24
Q
  • _________ were easy to
    create with the development of
    large-scale integrated circuits.
A

The Fourth Generation ( 1980 - Present ):
Personal Computers

25
Q

Storage Hierarchy Model

A
  • Register
  • Cache
  • Main Memory
  • nonvolatile memory
  • Hard-disk driver
  • Optical Disk
  • Magnetic tapes
26
Q

any mechanism for controlling
access of processes or users to
resources defined by the OS

A

Protection

27
Q

defense of the system against
internal and external attacks.

28
Q

used when source CPU type
different from target type (i.e.
PowerPC to Intel x86)
- Generally slowest method
- When computer language not
compiled to native code –
Interpretation

29
Q

OS natively compiled for CPU,
running guest OSes also natively
compiled
- Consider VMware running WinXP
guests, each running applications,
all on native WinXP host OS
- VMM (virtual machine Manager)
provides virtualization services

A

Virtualization

30
Q

Stand-alone general-purpose
machines

A

Traditional

31
Q

Handheld smartphones, tablets, etc.
Client-Server Computing
- Dumb terminals supplanted by smart
PCs
- Many systems now servers,
responding to requests generated by
clients
- Compute-server system provides an
interface to client to request services
(i.e., database)
- File-server system provides interface
for clients to store and retrieve files.

32
Q

Another model of distributed system
- does not distinguish clients and
servers
Cloud Computing

A

Peer-to-Peer

33
Q

Delivers computing, storage, even
apps as a service across a network

A

Cloud Computing

34
Q

available via Internet to anyone
willing to pay

A

Public cloud

35
Q

run by a company for the company’s
own use

A

Private cloud

36
Q

includes both public and private
cloud components

A

Hybrid cloud

37
Q

one or more applications available
via the Internet (i.e., word processor)

A

Software as a Service (SaaS)

38
Q

software stack ready for application
use via the Internet (i.e., a database
server)
Infrastructure as a Service (IaaS)
- servers or storage available over
Internet (i.e., storage available for
backup use)

A

Platform as a Service (PaaS)

39
Q

most prevalent form of computers

A

Real-time embedded systems

40
Q

The database is on the server

A

The 2-tier architecture

41
Q

The back-end server is usually a
very large database (or databases)
- The middle-tier server usually holds
shared applications
(application/business logic)

A

The 3-tier architecture

42
Q

Three ways of distributing the
- ‘business logic’
- locate it entirely on the client (fat
client)
- locate it entirely on the server (fat
server)
- split it between the client and server

A

Locating the business logic

43
Q

Dividing up the data

A
  1. Locating the data
44
Q

divides an application into logical
layers and physical tiers.

A

N-tier architecture

45
Q

consists of a collection of small,
autonomous services.

A

Microservices architecture

46
Q

A web front end that serves client
requests

A

Web-Queue-Worker architecture

47
Q

For handling the ingestion,
processing, and analysis of data that
is too large or complex for traditional
database systems.
- * For large-scale workloads that
require a large number of cores,
such as image rendering, fluid
dynamics, financial risk modeling, oil
exploration, drug design, and
engineering stress analysis

A

Big data, Big compute architectures

48
Q

if the owner of data decides to make
available only to certain people and
no others, the system should
guarantee that release of the data to
unauthorized people never occurs

A

Confidentiality

49
Q

unauthorized users should not be
able to modify any data (changing
the data, removing data and adding
false data) without the owner’s
permission

50
Q

nobody can disturb the system to
make it unusable, such as in the
form of denial-of-service attacks that
are increasingly common

A

Availability

51
Q

try to steal information passively
- sniff the network traffic and tries to
break the encryption to get to the
data

A

Passive attacks

52
Q

try to make a computer program
misbehave
- take control of a user’s Web browser
to make it execute malicious code

A

Active attacks

53
Q

clutering systems

A

symmetric/hot standby
asymmetric/load balancing

54
Q

archi req

A

reliable, robust communication between client and server
client-server cooperation
servers control data/services that the client accesses
servers handle conflicting requests
application processing is distributed between client and server

55
Q

common network attacks

A

tcp hijacking
dos
ddos
malware
spyware
insider attacks
packet sniffing
exploiting software bugs, buffer overflows
social problem
finding a way into the network

56
Q

principles

A

abstraction - dealing with generic form
bunding - bulding blocks
interoperabilit - platforms are open systems
evolution - tech is not static, changes through time