Operating Platforms Flashcards

1
Q

What is the primary function of application libraries?

A

Manage communication between applications, such as serializing object instances for transmission

Application libraries facilitate data transfer and communication protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name three examples of application libraries.

A
  • Jetty for HTTP communication
  • Jersey for creating RESTful APIs
  • Jackson for JSON object creation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Dropwizard?

A

An open source project that serves as a starter kit for application projects with references to required libraries and starter code

It simplifies the setup process for new applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What do architectural patterns do?

A

Take a holistic view of systems and group components for illustrative purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the blackboard pattern.

A

Used for large systems without a definitive solution; it has a memory-residing blackboard with read and write access to knowledge systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the broker pattern used for?

A

Architecting distributed systems with a middleman component for coordination and communication between components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: The broker pattern allows for direct communication between components.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two component types in the client-server pattern?

A
  • Client components
  • Server components
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the event-driven pattern used for?

A

Implementing applications that involve transmitting events in a decentralized system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: The _______ pattern is used to extract data from external sources, transform it, and load it into a system-specific repository.

A

extract-transform-load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the layered pattern do?

A

Composes a system into layers with defined responsibilities, specific to implementation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the ISO Open Systems Interconnection (OSI) model?

A

A seven-layer model widely implemented in modern software architectures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the seven layers of the OSI model in top-to-down order.

A
  • Application
  • Presentation
  • Session
  • Application
  • Network
  • Data Link
  • Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the master-slave pattern used for?

A

Improving system reliability and performance by dividing work between master and slave components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the functions of the master in the master-slave pattern?

A
  • Maintains a list of slaves
  • Divides the work
  • Tasks slaves
  • Accepts completed work from slaves
  • Compiles results
  • Provides feedback to clients
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the microkernel pattern also referred to as?

A

The plug-in architectural pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the five components involved in the microkernel pattern?

A
  • Microkernel
  • One or more clients
  • Internal plug-ins
  • External plug-ins
  • Adapters
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the microservices pattern focus on?

A

Breaking a system into several smaller services with limited interdependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the benefits of the microservices pattern?

A
  • Efficient processing
  • Easily maintainable code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does the model-view-controller (MVC) pattern consist of?

A
  • Model component
  • View component
  • Controller component
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the main goal of the naked object pattern?

A

Create behaviorally complete projects with encapsulated attributes and behaviors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Describe the peer-to-peer (P2P) pattern.

A

Consists of nodes with equal functions, acting as both receivers and distributors of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the advantages of the peer-to-peer pattern?

A
  • Requires only two nodes
  • Additional nodes can join or drop out
  • Great for sharing resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the pipe-filter pattern?

A

Contains filters that take data from multiple sources and pass it through sequential filters for transformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the benefits of the serverless pattern?

A
  • Cost-effectiveness
  • High scalability
  • High flexibility
  • Faster upgrades and deployments
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the service-oriented pattern also known as?

A

Service-Oriented Architecture (SOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What are the characteristics of the service-oriented pattern?

A
  • Establishes interoperable services
  • Services run independently
  • Handles specific computational tasks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the space-based pattern designed to do?

A

Avoid functional collapse under high load and maximize scaling

29
Q

What does REST stand for?

A

REpresentational State Transfer

30
Q

What is REST?

A

An architectural style for distributed hypermedia systems

31
Q

What principles does REST promote?

A

Simplicity, scalability, and statelessness

32
Q

What is the first constraint of RESTful architecture?

A

Uniform Interface

33
Q

What does the Uniform Interface constraint achieve?

A

Simplifies the overall system architecture and improves visibility of interactions

34
Q

List the four constraints that achieve a uniform REST interface.

A
  • Identification of resources
  • Manipulation of resources through representations
  • Self-descriptive messages
  • Hypermedia as the engine of application state
35
Q

What is the second constraint of RESTful architecture?

A

Client-Server

36
Q

What does the Client-Server constraint enforce?

A

Separation of concerns

37
Q

What is the benefit of separating user interface concerns from data storage concerns?

A

Improves portability and scalability

38
Q

What is the third constraint of RESTful architecture?

A

Statelessness

39
Q

What does statelessness mandate?

A

Each request must contain all information necessary to complete the request

40
Q

What is the fourth constraint of RESTful architecture?

A

Cacheable

41
Q

What does the Cacheable constraint require?

A

Responses must label themselves as cacheable or non-cacheable

42
Q

What is the fifth constraint of RESTful architecture?

A

Layered System

43
Q

What does the Layered System constraint allow?

A

Architecture to be composed of hierarchical layers

44
Q

What is an example of a Layered System?

A

MVC pattern

45
Q

What is the sixth constraint of RESTful architecture?

A

Code on Demand (optional)

46
Q

What does Code on Demand allow?

A

Client functionality to extend by downloading and executing code

47
Q

What is a resource in REST?

A

A representation of state

48
Q

What does the state of a resource consist of?

A

Resource representation, metadata, and hypermedia links

49
Q

What are resource identifiers used for in REST?

A

To identify each resource involved in interactions

50
Q

What is hypermedia in the context of REST?

A

A media type that defines how a representation is to be processed

51
Q

What are resource methods used for in REST?

A

To perform the desired transition between two states of any resource

52
Q

True or False: REST and HTTP are the same.

A

False

53
Q

What is the primary goal of protection in a computer system?

A

To provide a mechanism for the enforcement of the policies governing resource use

Policies can be fixed, formulated by management, or defined by individual users.

54
Q

What is the principle of least privilege?

A

Dictates that programs, users, and systems be given just enough privileges to perform their tasks

This includes creating audit trails and role-based access controls (RBAC).

55
Q

What is the Access Matrix?

A

A mechanism for defining and implementing control between processes and domains.

56
Q

What is the Confinement Problem?

A

The problem of guaranteeing that no information initially held in an object can migrate outside of its execution environment

This problem is generally unsolvable.

57
Q

What does privilege refer to in the context of operating systems?

A

The right to execute a system call or to use an option within that system call (e.g., read, write, execute)

Privileges can be assigned to processes and roles.

58
Q

What are the types of revocation of access rights?

A

Immediate or delayed, selective or general, partial or total, temporary or permanent.

59
Q

Fill in the blank: A _______ is a unique bit pattern associated with a capability.

A

key

60
Q

How can capabilities be revoked in a dynamic protection system?

A

Through reacquisition, back-pointers, indirection, and keys.

61
Q

What is the role of protection mechanisms for application programmers?

A

To guard resources created and supported by an application subsystem against misuse.

62
Q

True or False: An unprotected resource can defend against misuse by unauthorized users.

A

False

63
Q

What is the purpose of creating audit trails in a protection-oriented system?

A

To trace all protection and security activities on the system.

64
Q

What does the term ‘access controls’ refer to in a file system?

A

Controls that assign ownership and access-control information to files and directories.

65
Q

What does role-based access control (RBAC) entail?

A

Creating separate accounts for each user with just the privileges they need.

66
Q

What is the consequence of the failure or compromise of a component in an operating system?

A

It should do the minimum damage and allow the minimum damage to be done.

67
Q

Fill in the blank: Access-control information is assigned for each _______ and directory.

A

file

68
Q

What is the significance of ‘fine-grained access controls’?

A

They enable privileges when needed and disable them when not needed.

69
Q

What is the impact of implementing privileges in an operating system?

A

It decreases the security risk associated with superusers and setuid programs.