Operating Platforms Flashcards

1
Q

What is the primary function of application libraries?

A

Manage communication between applications, such as serializing object instances for transmission

Application libraries facilitate data transfer and communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three examples of application libraries.

A
  • Jetty for HTTP communication
  • Jersey for creating RESTful APIs
  • Jackson for JSON object creation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Dropwizard?

A

An open source project that serves as a starter kit for application projects with references to required libraries and starter code

It simplifies the setup process for new applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do architectural patterns do?

A

Take a holistic view of systems and group components for illustrative purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the blackboard pattern.

A

Used for large systems without a definitive solution; it has a memory-residing blackboard with read and write access to knowledge systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the broker pattern used for?

A

Architecting distributed systems with a middleman component for coordination and communication between components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: The broker pattern allows for direct communication between components.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two component types in the client-server pattern?

A
  • Client components
  • Server components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the event-driven pattern used for?

A

Implementing applications that involve transmitting events in a decentralized system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: The _______ pattern is used to extract data from external sources, transform it, and load it into a system-specific repository.

A

extract-transform-load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the layered pattern do?

A

Composes a system into layers with defined responsibilities, specific to implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the ISO Open Systems Interconnection (OSI) model?

A

A seven-layer model widely implemented in modern software architectures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the seven layers of the OSI model in top-to-down order.

A
  • Application
  • Presentation
  • Session
  • Application
  • Network
  • Data Link
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the master-slave pattern used for?

A

Improving system reliability and performance by dividing work between master and slave components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of the master in the master-slave pattern?

A
  • Maintains a list of slaves
  • Divides the work
  • Tasks slaves
  • Accepts completed work from slaves
  • Compiles results
  • Provides feedback to clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the microkernel pattern also referred to as?

A

The plug-in architectural pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the five components involved in the microkernel pattern?

A
  • Microkernel
  • One or more clients
  • Internal plug-ins
  • External plug-ins
  • Adapters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the microservices pattern focus on?

A

Breaking a system into several smaller services with limited interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the benefits of the microservices pattern?

A
  • Efficient processing
  • Easily maintainable code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the model-view-controller (MVC) pattern consist of?

A
  • Model component
  • View component
  • Controller component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the main goal of the naked object pattern?

A

Create behaviorally complete projects with encapsulated attributes and behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe the peer-to-peer (P2P) pattern.

A

Consists of nodes with equal functions, acting as both receivers and distributors of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the advantages of the peer-to-peer pattern?

A
  • Requires only two nodes
  • Additional nodes can join or drop out
  • Great for sharing resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the pipe-filter pattern?

A

Contains filters that take data from multiple sources and pass it through sequential filters for transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What are the benefits of the serverless pattern?
* Cost-effectiveness * High scalability * High flexibility * Faster upgrades and deployments
26
What is the service-oriented pattern also known as?
Service-Oriented Architecture (SOA)
27
What are the characteristics of the service-oriented pattern?
* Establishes interoperable services * Services run independently * Handles specific computational tasks
28
What is the space-based pattern designed to do?
Avoid functional collapse under high load and maximize scaling
29
What does REST stand for?
REpresentational State Transfer
30
What is REST?
An architectural style for distributed hypermedia systems
31
What principles does REST promote?
Simplicity, scalability, and statelessness
32
What is the first constraint of RESTful architecture?
Uniform Interface
33
What does the Uniform Interface constraint achieve?
Simplifies the overall system architecture and improves visibility of interactions
34
List the four constraints that achieve a uniform REST interface.
* Identification of resources * Manipulation of resources through representations * Self-descriptive messages * Hypermedia as the engine of application state
35
What is the second constraint of RESTful architecture?
Client-Server
36
What does the Client-Server constraint enforce?
Separation of concerns
37
What is the benefit of separating user interface concerns from data storage concerns?
Improves portability and scalability
38
What is the third constraint of RESTful architecture?
Statelessness
39
What does statelessness mandate?
Each request must contain all information necessary to complete the request
40
What is the fourth constraint of RESTful architecture?
Cacheable
41
What does the Cacheable constraint require?
Responses must label themselves as cacheable or non-cacheable
42
What is the fifth constraint of RESTful architecture?
Layered System
43
What does the Layered System constraint allow?
Architecture to be composed of hierarchical layers
44
What is an example of a Layered System?
MVC pattern
45
What is the sixth constraint of RESTful architecture?
Code on Demand (optional)
46
What does Code on Demand allow?
Client functionality to extend by downloading and executing code
47
What is a resource in REST?
A representation of state
48
What does the state of a resource consist of?
Resource representation, metadata, and hypermedia links
49
What are resource identifiers used for in REST?
To identify each resource involved in interactions
50
What is hypermedia in the context of REST?
A media type that defines how a representation is to be processed
51
What are resource methods used for in REST?
To perform the desired transition between two states of any resource
52
True or False: REST and HTTP are the same.
False
53
What is the primary goal of protection in a computer system?
To provide a mechanism for the enforcement of the policies governing resource use ## Footnote Policies can be fixed, formulated by management, or defined by individual users.
54
What is the principle of least privilege?
Dictates that programs, users, and systems be given just enough privileges to perform their tasks ## Footnote This includes creating audit trails and role-based access controls (RBAC).
55
What is the Access Matrix?
A mechanism for defining and implementing control between processes and domains.
56
What is the Confinement Problem?
The problem of guaranteeing that no information initially held in an object can migrate outside of its execution environment ## Footnote This problem is generally unsolvable.
57
What does privilege refer to in the context of operating systems?
The right to execute a system call or to use an option within that system call (e.g., read, write, execute) ## Footnote Privileges can be assigned to processes and roles.
58
What are the types of revocation of access rights?
Immediate or delayed, selective or general, partial or total, temporary or permanent.
59
Fill in the blank: A _______ is a unique bit pattern associated with a capability.
key
60
How can capabilities be revoked in a dynamic protection system?
Through reacquisition, back-pointers, indirection, and keys.
61
What is the role of protection mechanisms for application programmers?
To guard resources created and supported by an application subsystem against misuse.
62
True or False: An unprotected resource can defend against misuse by unauthorized users.
False
63
What is the purpose of creating audit trails in a protection-oriented system?
To trace all protection and security activities on the system.
64
What does the term 'access controls' refer to in a file system?
Controls that assign ownership and access-control information to files and directories.
65
What does role-based access control (RBAC) entail?
Creating separate accounts for each user with just the privileges they need.
66
What is the consequence of the failure or compromise of a component in an operating system?
It should do the minimum damage and allow the minimum damage to be done.
67
Fill in the blank: Access-control information is assigned for each _______ and directory.
file
68
What is the significance of 'fine-grained access controls'?
They enable privileges when needed and disable them when not needed.
69
What is the impact of implementing privileges in an operating system?
It decreases the security risk associated with superusers and setuid programs.