Systems and Architecture Flashcards

1
Q

Define Round Robin

A

Distributes client requests across a group of servers. Going down the list of servers in the group, the round‑robin load balancer forwards a client request to each server in turn. When it reaches the end of the list, the load balancer loops back and goes down the list again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Load Balancer

A

A load balancer sits between the client and the server farm accepting incoming network and application traffic and distributing the traffic across multiple backend servers using various methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of DNS load balancing

A

A company can have a single domain name and four absolutely identical company home pages on four physical servers based in Europe, Asia, North America, and Africa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Advantage of DNS Round Robin

A

It is simple to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Troubleshoot one load balancer failure

A

If one load balancer fails, the secondary picks up the failure and becomes active. They have a heartbeat link between them that monitors status.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Troubleshoot all load balancer failures

A

If all load balancers fail (or are accidentally misconfigured), servers down-stream are knocked offline until the problem is resolved, or you manually route around them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the Slash Dot Effect?

A

Also known as slashdotting, occurs when a popular website links to a smaller website, causing a massive increase in traffic. This overloads the smaller site, causing it to slow down or even temporarily become unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Active-Active High Availability Cluster

A

An active-active cluster is typically made up of at least two nodes, both actively running the same kind of service simultaneously. The main purpose of an active-active cluster is to achieve load balancing. Load balancing distributes workloads across all nodes in order to prevent any single node from getting overloaded. Because there are more nodes available to serve, there will also be a marked improvement in throughput and response times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Active-Passive High Availability Cluster

A

An active-passive cluster consists of at least two nodes.. Not all nodes are active. The passive (a.k.a. failover) server serves as a backup that’s ready to take over as soon as the active (a.k.a. primary) server gets disconnected or is unable to serve.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define SATA

A

Serial Advanced Technology Attachment : is a serial communication method and began as an enhancement to the original ATA specifications, also known as IDE and, today, PATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SCSI

A

The Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SAS

A

Serial Attached SCSI: is a type of SCSI that uses serial operation rather than parallel as the original SCSI did.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDE

A

Integrated development environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

PATA

A

Parallel Advanced Technology Attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define NAS

A

Network Attached Storage:

  • Name given to a dedicated storage unit that can be directly attached to the network.
  • Transfers data as files.
  • Transfers files over local area network. (i.e. ethernet, wireless, fiber)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define SAN

A

Storage Area Network

  • It is a network that consists of storage units.
  • Transfers data as blocks.
  • Transfers blocks over wide area network using FCIP or iSCSI media.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

FCIP

A

Fibre Channel over IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

iSCSI

A

Internet Small Computer Systems Interface

  • an IP-based networking storage standard method of encapsulating SCSI commands within IP packets.
  • Allows you to use the same network for storage that you use for the balance of the network.
  • Can be used in a NAS
  • First used in a SAN.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

RAID

A

Redundant array of independent risks

-RAID arrays often use caching to improve performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

RAID 0

A
  • Disk Striping with no parity.
  • Need at least 2 Disks
  • No Fault Tolerance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RAID 1

A
  • Disk Mirroring

- Needs at least 2 Disks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RAID 5

A
  • Disk Striping with parity
  • Need at least 3 Disks
  • Most Widely used
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

RAID 0+1

A
  • Disk Striping + Disk Mirroring.
  • For every disk striping, there needs to be one mirroring it.
  • 2 Disk Striping = 2 Disk Mirroring. 1:1 Ratio
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Backplane?

A
  • Provide data
  • Control signal connectors for the hard drives.
  • Provide the interconnect for the front I/O board, power and locator buttons, and system/component status LEDs.

When a backplane fails, it affects all the drives that connect to it.
-Backplane failures are less likely than drive failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Types of RAID failures

A

RAID arrays often use caching to improve performance.

  • A battery-backed cache is one that can maintain the data in the cache during a power outage, preventing the loss of data still residing in the cache at the moment of the power failure. When this battery fails, it can cause the loss of data.
  • Disk failure disk is unable to be accessed, data corrupted, unusual noises from the disk (click of death).
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cache

A

Hardware or software that is used to store something, usually data, temporarily in a computing environment.
When the cache is turned off, you lose all of those performance benefits. Cache can be enabled in both the operating system and in the storage software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Ways to prevent RAID failure

A
  • No SPOF
  • Secondary/backup RAID controller/disks
  • Monitoring systems to identify issues before they become a failure
  • Cloud based backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Full Backup

A
  • All Data is backed-up
  • Slowest backup time
  • Fastest restore time
  • High storage space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Incremental Backup

A
  • New/Modified data backed-up
  • Fast backup time
  • Slower restore time
  • Low storage space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Differential Backup

A
  • All data since last full backed-up
  • Moderate backup time
  • Faster restore time
  • Moderate storage space
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NFS

A

Network File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SMB

A

Server Message Block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

AFS

A

Andrew File System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Types of Storage failures

A
  • Loss of data/data corruption
  • Security issues
  • Loss of connectivity
  • Exposure of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

HBA

A

Host Bus Adaptor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a Fibre channel switch?

A

A network switch compatible with the FC protocol. It allows the creation of a Fibre Channel fabric, that is the core component of a SAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Troubleshoot HBA failures

A
  • Check cables
  • Reseat the adaptor in its slot
  • Implement redundant HBAs
  • If the HBA fails it is a SPOF
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

FCoE

A

Fibre Channel over Ethernet

-Encapsulates Fibre Channel traffic within Ethernet frames -Unlike iSCSI, it does not use IP at all.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Causes and consequences of SAN failures over FCoE

A

-TCP/IP misconfiguration (inability for some / all nodes to access storage;)
-Failure of a single NIC (increased load on remaining
NIC on a single node and possible reduced throughput for this node or complete
outage if this is the only onboard NIC)
-incorrect / invalid LUN (inability to access logical storage
device)
-loss of network - total outage.
- single misconfiguration or failed standard switch (increased load on remaining
switches and possible reduced throughput or storage outage. The standard data
network may also be impacted;)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Causes and consequences of storage area network (SAN) failures over the FC protocol

A

-single misconfigured or failed Fibre switch
-Loss of all Fibre switches (complete loss of access to storage. The standard data
network is unaffected)
-Failure of a single HBA (increased load on remaining HBA on a
single node and possible reduced throughput for this node or complete outage if this
is the only onboard HBA.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

misconfigured NFS

A

loss of access for Linux/ NAS network shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

misconfigured SMB

A

loss of access to Windows network shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

misconfigured AFS

A

loss of access for Apple systems shares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

misconfigured authentication /authorisation

A

-loss of access to some / all NAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is a LUN

A

Logical Unit Number
-A number used to identify a logical unit, which is a device addressed by the SCSI protocol or SAN protocols which encapsulate SCSI, such as Fibre Channel or iSCSI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

LUN masking

A

The process of controlling access to a LUN by effectively “hiding” its existence from those who should not have access. This makes the storage available to some hosts but not to others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Causes and consequences of SAN failures over the iSCSI

A

-single misconfiguration or failed standard switch (increased load on remaining
switches and possible reduced throughput or storage outage. Standard data network)
may also be impacted;
-TCP/IP misconfiguration (Inability for some / all nodes to access storage;)
-failure of a single NIC (increased load on remaining NIC on a single node and
possible;)
-reduced throughput for this node or complete outage if this is the only onboard NIC.
-incorrect / invalid IQN address (inability to access logical storage device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

IQN

A

iSCSI Qualified Name

  • Logical name that is not linked to an IP address
  • Unique
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Causes and consequences of cloud storage failures

A

-router / ISP failure (complete loss of access;)
-TCP/IP misconfiguration (inability for some / all nodes to access storage;) -misconfigured authentication / authorisation (loss of access to some / all cloud
storage;)
-cloud service provider failure (loss of access to data and / or loss of data.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Types of cloud services

A

OneDrive, Dropbox, Google Drive, Amazon EC2 and Microsoft Azure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Causes and impact of computer system failures (Hardware)

A
  • memory component failure (individual node crash;)
  • SSD/HDD failure (system crash and possible loss of data;)
  • CPU failure
  • power supply
  • cooling (intermittent crash or possibly permanent damage to components)
  • Heated/power related issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

SSD/HDD

A

Solid State Drive/Hard disk drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Causes and impact of network failures

A
  • NIC failure (loss of access from/to one network node;)
  • Switch failure (loss of access to LAN;)
  • Router failure (loss of access to WAN;)
  • Firewall (blocked IP’s, no protocols, ports;)
  • Web proxy (No internet access)
  • Cabling - incorrect cable type (straight through / cross over or exceeding recommended lengths and / or EMI)
  • Wireless (exceeding maximum distance and / or EMI or RFI|)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

EMI/RFI

A

Electromagnetic interference/ Radio-frequency interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Patches and Hotfix

A
  • Patch - Publicly released update to fix a known bug/issue.
  • Hotfix - update to fix a very specific issue, not always publicly released
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Causes and impact of incorrectly applied / faulty patches

A
  • intermittent problems / complete loss of function;
  • failure to boot OS.
  • cause a system to crash
57
Q

Causes and impact of IP Addressing configuration errors

A
  • loss of access to some / all LAN / WAN / nodes
  • Invalid IP address (address conflicts with other computers and network configuration problems.)
  • DHCP error causing DNS errors
  • Incorrect subnet mask-(communications fail to some nearby networks)
  • Incorrect Default Gateway (can communicate with hosts on its own network segment, but will fail to communicate with hosts on some or all remote networks.)
58
Q

Causes and impact of VLAN configuration errors

A
  • VLAN in a down state
  • interface flapping on a port set for access-only mode
  • VLAN trunking issues (trunk is still not establishing across the configured link)
  • VLAN routing issues (VLANs cannot reach one another)
59
Q

Causes and impact of excessive heat

A
  • Shorten the lifespan of a system leading to premature failure.
  • Excessive heat can cause a system to crash
  • Excessive dust can also lead to heat build-up
60
Q

HVAC

A

Heating Ventilation and Air Conditioning are vital components of the server room they should be monitored and secure, tampering with HVAC can cause a DoS attack

61
Q

Causes and impact of a lack of power

A
  • intermittent problems;
  • system reboots;
  • complete loss of systems;
  • data loss
  • Blackout/brownout
62
Q

Causes and impact of EMI / RFI

A
  • Data loss

- The amount of interference and frequency will dictate how much interference is caused

63
Q

EMI/RF

A

Electromagnetic interference/Radio frequency

64
Q

Causes and impact of backup failure

A
  • Data loss
  • Data corrupted
  • Virus
  • Physical damage
  • misconfigured backup / restore
65
Q

Malware

A

Malicious software- Programs designed to infiltrate and damage computers without the users consent

66
Q

Causes and impact of malware infection

A
  • Lack of user training- results to loss of data
  • insufficient anti-malware tools
  • poorly configured firewall
67
Q

Worm

A

Malware which is self-replicating

68
Q

Trojan

A
  • Malware which is disguised as something useful or legitimate
  • Illegal downloads, games, screensavers or system software
  • Used to install DDoS Zombies/Bots
69
Q

Rootkit

A
  • Malware which embeds itself in the heart of the OS

- Once infected the system normally has to be completely reinstalled

70
Q

Botnets

A
  • malware which infects numerous systems that are controlled by a hacker
  • Used in DoS/DDoS attacks
  • IRC used to connect with a botnet
71
Q

IRC

A

Internet Relay Chat

72
Q

Ransomware

A
  • Malware which demands payment

- WannaCry most well known Ransomware

73
Q

DOS

A

Denial Of service
-A type of attack which has the primary objective of preventing target systems from performing properly or responding at all

74
Q

DDOS

A

Distributed DoS

  • infiltrate intermediate systems to provide launch platforms.
  • May use Trojans, Bots, Zombies or Botnets
75
Q

Common DOS attacks

A
  • Smurf
  • Fraggle
  • Land attack
  • Ping of Death
  • SYN Flood
76
Q

Smurf

A

using ping packets against the broadcast address so the replies return to the victim causing an overload

77
Q

Fraggle

A

similar principal to the Smurf but using UDP packets against the broadcast address so the ICMP reply returns to the victim

78
Q

Land attack

A

the packets received by the victim contain identical source and destination addresses, generating confusion of the target

79
Q

Ping of Death

A

sending a ping packet that is too large, causing a crash

80
Q

SYN Flood

A

exploits the TCP three-way handshake process

81
Q

Spam

A

Unsolicited/Unwanted Email which may be used for the following:
Transportation of Malware
Social Engineering
DoS

82
Q

Causes and impact of poor wireless security

A
  • weak encryption / poor selection of passphrase
  • Rogue Access Points/Ad-Hoc Networks
  • DOS
  • Configuration Problems (Mis-Configurations/Incomplete Configurations)
83
Q

Causes and impact of a failure to implement physical security.

A
  • unauthorised access
  • Loss of data
  • Theft
  • Natural disaster
84
Q

Causes of network latency

A
  • Storage Delays
  • Routers
  • jitter on time critical services such as poor quality VOIP / video conferencing
85
Q

Causes of lack of bandwidth

A
  • Malware
  • poor cabling
  • junk software
  • slow videos
  • slow file transfers
86
Q

Causes of lack of storage capacity

A
  • lack of maintenance
  • neglecting to plan for future storage needs
  • system failure producing large files
  • Systems slowdown/crash/freeze
87
Q

Causes of lack of memory

A
  • system runs slow
  • disk thrashing
  • system lockup/crash
  • application memory leaks
88
Q

Memory Leaks

A
  • Bugs- fails to release memory when no longer needed
  • affects particular application and OS
  • reduces system performance
  • full system freeze
89
Q

CPU Performance

A
-Core 
processors have one or more
operates as an individual CPU
Internal speed
MHz/GHz
-Bus
speed which motherboard communicates with CPU
-Cache
high speed
expensive memory
located on the CPU
L1,L2,L3 cache
90
Q

Common network devices

A

-Router
-Firewall
-Switch
-Hub
-NIC
-IPS
IDS

91
Q

Layer 2 Switch

A

A type of network switch or device that works on the data link layer (OSI Layer 2) and utilizes MAC Address to determine the path through where the frames are to be forwarded. It uses hardware based switching techniques to connect and transmit data in a local area network (LAN).

92
Q

Layer 3 Switch

A

Combines the functionality of a switch and a router.

  • acts as a switch to connect devices that are on the same subnet or VLAN
  • lightning speeds
  • IP routing intelligence built into it to double up as a router.
93
Q

Cisco’s Three layered model

Core layer

A

-Backbone of network
-provides fault isolation and backbone connectivity.
switches traffic at the highest speeds
-level of redundancy, used in case of link or hardware failure

94
Q

Cisco’s Three layered model

Distribution layer

A
  • communication point between the access and the core layer.
  • handles the routing, packet filtering, WAN access and determines how packets can reach the core if needed.
  • includes all OSI Layer 3 devices, such as routers and layer 3 switches.
95
Q

Cisco’s Three layered model

Access layer

A
  • desktop layer
  • Connects client devices on the internal network
  • separates collision domains, filter MAC addresses and implement load balancing.
  • uses Ethernet
96
Q

VLAN

A
  • Switches provide a method of broadcast domain segmentation called Virtual LANs (VLANs)
  • Layer 2 method of creating more broadcast domains
  • VLANs logically divide a switch into multiple, independent switches at Layer 2, each in their own broadcast domain
97
Q

Static Routing

A

-manually-configured routing entry

98
Q

Dynamic routing

A
  • enables routers to select paths according to real-time logical network layout changes
  • RIP
  • OSPF
99
Q

RIP

A

Routing Information Protocol

100
Q

OSPF

A

Open Shortest Path First

101
Q

WAP

A

Wireless access point

  • Hardware device on a LAN
  • allows wireless and wired networks to connect through a wireless standard
102
Q

Wireless routers.

A
  • enables wireless network packet forwarding and routing
  • serves as an access point in a LAN
  • Like a wired router but replaces wires with wireless radio signals to communicate within and to external network environments
103
Q

Stateful Firewall

A
  • Firewall compares current packets to previous ones.
  • slower than packet filters, but are far more secure.
  • tracks the operating state and characteristics of network connections travelling through it
  • Only packets matching a known active connection are allowed to pass the firewall.
104
Q

Stateless Firewall

A
  • watch network traffic and restrict or block packets based on source and destination addresses or other static values.
  • not aware of traffic patterns and data flow
  • uses simple rule-sets
105
Q

Firewall Deep packet Inspection

A

-data processing that inspects in detail the data being sent over a computer network, and usually takes action by blocking, re-routing, or logging it accordingly

106
Q

IPS

A

intrusion prevention systems

-traffic has to go through the device which has the ability to be proactive and block the suspect traffic

107
Q

IDS

A

intrusion detection systems

  • are placed on segments of a network so they can detect unauthorised activity or malicious traffic
  • Does not prevent traffic from reaching the network
108
Q

NIDS

A

Network intrusion detection system

-monitors segments for malicious traffic or it can be host based

109
Q

HIDS

A

Host-based intrusion detection system

-installed on a host and monitors traffic coming into the host, and also local activity on the host

110
Q

Honeypot

A
  • Used to monitor intrusion / attacks and conduct intelligence gathering
  • Used to deflect potential attacks
111
Q

Tower server

A
  • reside on shelves

- looks like your usual server for desktop

112
Q

Rack mounted server

A
  • Bolted into a framrack called a rack
  • Gets equipment of the floor
  • good for space
113
Q

Blade Server

A
  • houses multiple circuit boards/server blades

- uses less space

114
Q

Types of OS servers

A
  • Red hat enterprise Linux
  • Windows server
  • Mac OS X server
115
Q

Server OS Key features

A
  • have access to the server both in GUI and command level interface
  • execute processes from OS commands
  • advanced level hardware, software and network config services
  • central interface to manage users/ security
  • Shares resources to client systems
  • Stores resources centrally for easy management
116
Q

Client OS Features

A
  • works within computer desktops and various portable devices.
  • only supports a single user.
  • Smartphones and small computer devices are able to support client operating systems
117
Q

Active directory

server

A
  • several services that run on windows server
  • manages permissions and access
  • users/groups/device
118
Q

DNS

server

A
  • Domain Name System
  • database of public IP addresses/hostnames
  • Translates names into IP adresses
119
Q

Web Proxy

server

A
  • hides IP adress from websites

- act as shields between you and the website

120
Q

File and Print

server

A
  • generic term for any computer that is being used to provide file storage and printing for other computers.
121
Q

Email

Server

A
  • handles and delivers e-mail over a network

- receive e-mails from client computers and deliver them to other mail servers

122
Q

Database

server

A
  • data analysis
  • storage
  • data manipulation,
  • archiving
  • other non-user specific tasks.
123
Q

Virtualisation

server

A
  • partitions a physical server into a number of small, virtual servers
  • each virtual server runs multiple OS instances at the same time
124
Q

Type 1 hypervisors

A
  • runs on bare metal
  • runs directly on the host machine’s physical hardware
  • most efficient
125
Q

Type 2 hypervisors

A
  • runs on top of an OS
  • relies on the host machine’s pre-existing OS to manage calls to CPU, memory, storage and network resources.
  • eg. VMware Fusion
126
Q

VMM

A

Virtual machine monitor

-intermediates between the host and the guest VM

127
Q

Public Cloud

A

-provides the infrastructure and services over the public internet and are hosted at the cloud vendor’s premises.

128
Q

Private Cloud

A

cloud infrastructure that is meant for use exclusively by a single organization.

129
Q

Hybrid Cloud

A

-uses a combination of at least one Private and one Public Cloud.

130
Q

PaaS

A

Platform As A Service

  • Cloud based computing system and associated software (OS + Application package)
  • provides a platform for software creation
131
Q

SaaS

A

Software As A Service

  • Cloud based software/application packages
  • utilizes the internet to deliver applications
  • majority of SaaS applications run directly through your web browse
132
Q

IaaS

A

Infrastructure As A Service

  • Cloud based systems being completely
  • self-service for accessing and monitoring computers, networking, storage, and other services outsourced
133
Q

Example of SaaS

A
  • Google Apps,
  • Dropbox
  • Cisco WebEx
134
Q

Example of PaaS

A
  • Windows Azure

- AWS Elastic Beanstalk

135
Q

Example of IaaS

A
  • AWS

- Microsoft Azure

136
Q

Function of VDI

A

Virtual desktop infrastructure

  • technology for providing and managing virtual desktops
  • hosts desktop environments on a centralised server and deploys them to end clients on request.
137
Q

Middleware

A
  • software glue
  • acts as a bridge between OS and applications on a network
  • enables communication and data management for distributed applications.
  • provides a framework for the forwarding and queuing of transactions
138
Q

SOAP

A

Simple object access protocol

-interchange data between applications which are built on different programming languages.