P-Exam Flashcards

1
Q

It refers to techniques for combining existing software components to form a complete system.

A

Integration of Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It deals with an integration approaches and techniques that connect different components of IT infrastructure.

A

Integrative Programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It enable an organization to integrate business processes internally and externally with business partners to create dynamic environments that supports current and evolving business requirements.

A

Integrative Solutions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

It is the process of connecting multiple, independently developed applications using incompatible technologies into a single organization.

A

Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Is the communication between a set of heterogeneous systems that are integrated together.

A

Inter-system connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Need for Integration

A

The architecture of the organization information system depends on constraints related to the technology but also to the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Need for Integration

A

Within an enterprise, each department may have its own IT infrastructure, systems, and databases which are maintained independently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Need for Integration

A

Integration assists in formation of Zero Latency organization, when all functions within the organization work with the same up-to-date information, latency between applications is eliminated/reduced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The Need for Integration

A

Updating and integrating of applications is possible whenever required.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A model that allows the integration of new software through the existing presentations of legacy software.

A

Presentation Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A model that allows the integration of software through access to the data that is created.

A

Data Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A model that allows the integration of software for the purpose of invoking, existing functionality from other new or existing applications.

A

Functional Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fundamental Challenges of Integration

A

Network is unrealiable - integration solutions have to transport data from one computer to another across network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fundamental Challenges of Integration

A

Distributed - in the worst case every applications runs on a completely separate environment. Database storage is not shared among applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fundamental Challenges of Integration

A

Networks are slow - sending data across a network is multiple orders of magnitude slower than making a local method call.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fundamental Challenges of Integration

A

Any two applications are different - integration solutions need to transmit information between systems that use different programming languages, operating platforms, and data formats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fundamental Challenges of Integration

A

Change is inevitable - applications changes over time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is an integration framework composed of a collection of technologies and services which form a middleware to enable integration of systems and applications across organizations.

A

Application Integration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Is a software which lies between an operating system and the applications running on it.

A

Middleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Is the transmission of a computer file through a communication channel from one computer system to another.

A

File Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Is the process of copying or moving a file from one computer to another over the network or Internet connection.

A

File Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A single physical database can be shared by different applications running on different platforms.

A

Shared Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This method develops each application which is required to be integrated as large scale object or component with encapsulated data.

A

Remote Procedure Invocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Can be used to transfer packets of data frequently, immediately, reliably, and asynchronously or synchronously using customizable formats.

A

Messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Asynchronous messaging is fundamentally a practical reaction to the problems of distributed systems. Sending a message doesn't require both systems to be up and ready at the same time.
Messaging
26
The reason a messaging system needed to move messages from one computer to another is that computers and the networks that connect them are inherently unreliable.
Messaging
27
Four Methods Used in Application Integration
1. Send and Forget 2. Store and Forward
28
Software systems designed to support interoperable machine-to-machine interaction over network.
Web Services
29
XML
Extensible Markup Language
30
SOAP
Simple Object Access Protocol
31
REST
Representational State Transfer
32
This is where web services are often implemented. Services are loosely coupled and can be combined to create new applications.
Service-Oriented-Architecture (SOA)
33
Components of Web Services
1. Service Provider 2. Service Requestor/Consumer 3. Service Registry 4. Service Description
34
The entity that hosts and provides the web service.
Service Provider
35
The entity that accesses and uses the web service.
Service Requestor/Consumer
36
37
A directory that maintains information about available web services.
Service Registry
38
Metadata that describes the capabilities and interface of a web service.
Service Description
39
Types of Web Services
1. SOAP Web Services 2. RESTful Web Services
40
Acts as a bridge between different applications, enabling communication and integration.
Middleware
41
Middleware in Web Services
1. Message Transformation 2. Security 3. Transaction Management 4. Service Orchestration
42
Converting data formats from different systems.
Message Transformation
43
Enforcing authentication, authorization, and encryption.
Security
44
Handling distributed transactions across multiple services.
Transaction Management
45
Combining multiple services to execute complex business processes.
Service Orchestration
46
Allows different systems to communicate regardless of their underlying technologies.
Interoperability
47
Can handle a large number of concurrent requests and adapt to changing workloads.
Scalability
48
Supports various communication protocols and data formats.
Flexibility
49
Provides mechanisms for secure communication and data exchange.
Security
50
Facilitates seamless integration of heterogeneous systems.
Integration
51
Involves designing and implementing software that communicates over a network.
Network Programming
52
Endpoints for communication between two nodes on a network.
Sockets
53
In network programming, _____ programming is used to establish connections, send and receive data, and manage network communication.
Socket
54
Types of Socket
1. TCP Sockets 2. UDP Sockets 3. Raw Sockets
55
Provides reliable, connection oriented communication with error handling and flow control.
TCP Socket
56
Offers fast, connectionless communication without reliability guarantees.
UDP Socket
57
Allows direct access to network protocols for advanced network operations.
Raw Sockets
58
The foundational protocol suite for internet communication, including protocols like TCP, IP, HTTP, FTP, and SMTP.
TCP/IP
59
Protocols for web communication, with HTTPS adding encryption for secure data transmission.
HTTP and HTTPS
60
Protocol for email transmission
SMTP
61
Protocol for file transfer
FTP
62
Protocol for domain name resolution
DNS
63
Libraries like socket.h for low-level socket programming.
C/C++
64
Modules like socket and http.server for network communication.
Python
65
Classes like Socket and ServerSocket for TCP/IP communication.
Java
66
APIs like XMLHttpRequest and fetch for client-side network requests.
JavaScript
67
3 Types of Network Security
1. Encryption 2. Authentication 3. Firewalls and Intrusion Detection Systems (IDS)
68
Using protocols like SSL/TLS to encrypt data during transmission.
Encryption
69
Verifying the identity of communicating parties.
Authentication
70
Protecting networks from unauthorized access and attacks.
Firewalls and Intrusion Detection Systems (IDS)