ITELEC Flashcards

(57 cards)

1
Q

means technology solutions can be built via a service-oriented architecture by connecting up services from different providers
- top of other people other’s platforms.

A

Rise Of The Services Economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • to deal with this ever-increasing complexity of our technology landscape will require a move from the standalone solutions of today.
  • today, into a world of systems of systems, where
    smaller technologies are nested within larger ones which in turn are nested within larger ones in a
    plug and play, flexible, modular, service-oriented architecture.
A

Complexity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

increasingly end-users are becoming
producers and to harness this new source
of innovation means closed systems have to
open up; creating APIs and platforms on
which end-users can alter, adapt and
innovate while being supported by the core
technology.

A

user generated systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

is a group of technologies that are
used as a base or infrastructure
upon which other applications,
technologies or processes are
developed for the end-user

A

platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

also known as the infrastructure
layer or system software layer, forms
the foundation for running
applications.

A

Platform Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

sits on top of the platform layer and
represents the actual software
applications that users interact with
to perform specific tasks

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

is the quality of dealing with generic
forms rather than specific events,
details or applications.

A

Abstraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is achieved by defining a core
set of building blocks and then
configuring them into different
bundles depending on the context.

A

Bunding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Platforms are open systems, unlike
traditional technologies that are
simply designed as individual
physical objects that perform a
function, platforms are designed to
be interoperable with other systems,
they will likely have external
applications running on top of them
all of which can not be fully foreseen
by the developers of the platform.

A

Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Adaptive capacity and agility are,
and will increasingly be seen as a
key requirement, if not the key
requirement, in the coming decades

A

Evolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is a critical aspect of platform
technologies as it serves as a bridge
between different components of a
system, allowing them to
communicate and interact
seamlessly.

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

are built on top of the
platform layer and leverage the
underlying infrastructure and
services provided by the platform.

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

is a fundamental component of
platform technologies, serving as an
intermediary between hardware and
software.

A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

refers to the underlying hardware
and networking components that
support the platform and
applications.

A

Infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The interface facilitates
communication between different
layers of the platform, allowing
applications to interact with the
operating system and infrastructure
through well-defined interfaces.

A

Interrelationship/Interoperability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This was from the period of 1940 to
1955.
- This was when machine language
was developed for the use of
computers.
- They used vacuum tubes for the
circuitry

A

1st Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The years 1957-1963 were referred
to as the “second generation of
computers” at the time.
- ____and ______are
employed as assembly languages
and programming languages.
- Here they advanced from vacuum
tubes to transistors.

A

2nd Generation:
Combol & Fortan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The hallmark of this period
(1964-1971) was the development of
the integrated circuit.

A

3rd Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The invention of the
microprocessors brought along the
fourth generation of computers.
- The years 1971-1980 were
dominated by fourth generation
computers. C, C++ and Java were
the programming languages utilized
in this generation of computers.

A

4th Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

These computers have been utilized
since 1980 and continue to be used
now.

A

5th Generation:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

These early computers were
designed, built and maintained by a
single group of people.
- Programming languages were
unknown and there were no
operating systems so all the
programming was done in machine
language. All the problems were
simple numerical calculations.
- By the 1950’s punch cards were
introduced and this improved the
computer system.

A

The First Generation ( 1945 - 1955 ):
Vacuum Tubes and Plugboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

These machines were known as
mainframes and were locked in
air-conditioned computer rooms with
staff to operate them.
- The Batch System was introduced to
reduce wasted time in the computer.

A

Transistors and Batch Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The third generation operating
systems also introduced
multiprogramming.
- This meant that the processor was
not idle while a job was completing
its I/O operation. Another job was
scheduled on the processor so that
its time would not be wasted.

A

The Third Generation ( 1965 - 1980 ):
Integrated Circuits and Multiprogramming

24
Q
  • _________ were easy to
    create with the development of
    large-scale integrated circuits.
A

The Fourth Generation ( 1980 - Present ):
Personal Computers

25
Storage Hierarchy Model
- Register - Cache - Main Memory - nonvolatile memory - Hard-disk driver - Optical Disk - Magnetic tapes
26
any mechanism for controlling access of processes or users to resources defined by the OS
Protection
27
defense of the system against internal and external attacks.
Security
28
used when source CPU type different from target type (i.e. PowerPC to Intel x86) - Generally slowest method - When computer language not compiled to native code – Interpretation
Emulation
29
OS natively compiled for CPU, running guest OSes also natively compiled - Consider VMware running WinXP guests, each running applications, all on native WinXP host OS - VMM (virtual machine Manager) provides virtualization services
Virtualization
30
Stand-alone general-purpose machines
Traditional
31
Handheld smartphones, tablets, etc. Client-Server Computing - Dumb terminals supplanted by smart PCs - Many systems now servers, responding to requests generated by clients - Compute-server system provides an interface to client to request services (i.e., database) - File-server system provides interface for clients to store and retrieve files.
Mobile
32
Another model of distributed system - does not distinguish clients and servers Cloud Computing
Peer-to-Peer
33
Delivers computing, storage, even apps as a service across a network
Cloud Computing
34
available via Internet to anyone willing to pay
Public cloud
35
run by a company for the company’s own use
Private cloud
36
includes both public and private cloud components
Hybrid cloud
37
one or more applications available via the Internet (i.e., word processor)
Software as a Service (SaaS)
38
software stack ready for application use via the Internet (i.e., a database server) Infrastructure as a Service (IaaS) - servers or storage available over Internet (i.e., storage available for backup use)
Platform as a Service (PaaS)
39
most prevalent form of computers
Real-time embedded systems
40
The database is on the server
The 2-tier architecture
41
The back-end server is usually a very large database (or databases) - The middle-tier server usually holds shared applications (application/business logic)
The 3-tier architecture
42
Three ways of distributing the - ‘business logic’ - locate it entirely on the client (fat client) - locate it entirely on the server (fat server) - split it between the client and server
Locating the business logic
43
Dividing up the data
4. Locating the data
44
divides an application into logical layers and physical tiers.
N-tier architecture
45
consists of a collection of small, autonomous services.
Microservices architecture
46
A web front end that serves client requests
Web-Queue-Worker architecture
47
For handling the ingestion, processing, and analysis of data that is too large or complex for traditional database systems. - * For large-scale workloads that require a large number of cores, such as image rendering, fluid dynamics, financial risk modeling, oil exploration, drug design, and engineering stress analysis
Big data, Big compute architectures
48
if the owner of data decides to make available only to certain people and no others, the system should guarantee that release of the data to unauthorized people never occurs
Confidentiality
49
unauthorized users should not be able to modify any data (changing the data, removing data and adding false data) without the owner’s permission
Integrity
50
nobody can disturb the system to make it unusable, such as in the form of denial-of-service attacks that are increasingly common
Availability
51
try to steal information passively - sniff the network traffic and tries to break the encryption to get to the data
Passive attacks
52
try to make a computer program misbehave - take control of a user’s Web browser to make it execute malicious code
Active attacks
53
clutering systems
symmetric/hot standby asymmetric/load balancing
54
archi req
reliable, robust communication between client and server client-server cooperation servers control data/services that the client accesses servers handle conflicting requests application processing is distributed between client and server
55
common network attacks
tcp hijacking dos ddos malware spyware insider attacks packet sniffing exploiting software bugs, buffer overflows social problem finding a way into the network
56
principles
abstraction - dealing with generic form bunding - bulding blocks interoperabilit - platforms are open systems evolution - tech is not static, changes through time
57