SIA345

0.0(0)
studied byStudied by 4 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

119 Terms

1
New cards

Layered Architecture

Divides the system into logical layers, each responsible for specific functionalities.

2
New cards

Layered Architecture

Layers are organized hierarchically, with higher layers depending on lower layers.

3
New cards

Layered Architecture

Common layers include presentation/UI, business logic, and data access layers.

4
New cards

Layered Architecture

Promotes separation of concerns and modularity.

5
New cards

Microservices Architecture

An architectural development style where the application is composed of smaller services that handle a portion of functionality and communicate via lightweight protocols like HTTP.

6
New cards

Microservices Architecture

Relatively easier to manage due to smaller size.

7
New cards

Microservices Architecture

Updating one service requires redeploying only that specific service.

8
New cards

Microservices Architecture

Self-contained and deployed independently with shorter start-up and deployment times.

9
New cards

Microservices Architecture

Allows new developers to understand only the service they work on instead of the entire system.

10
New cards

Microservices Architecture

Enables horizontal scaling by scaling only the overloaded service.

11
New cards

Microservices Architecture

Each service can use different technology depending on business needs.

12
New cards

Microservices Architecture

A service failure doesn't impact others, keeping the rest of the system operational.

13
New cards

Microservices Architecture

More complex than monolithic applications due to distributed nature.

14
New cards

Microservices Architecture

Complexity increases with the number of individual services.

15
New cards

Microservices Architecture

Requires skilled developers to identify and manage inter-service communication.

16
New cards

Microservices Architecture

Independent deployment is more complicated.

17
New cards

Microservices Architecture

Higher network cost due to inter-service communication causing latency.

18
New cards

Microservices Architecture

Less secure due to communication over the network.

19
New cards

Microservices Architecture

Debugging is harder because control spans multiple services.

20
New cards

Monolithic Architecture

All functionalities are contained within a single codebase.

21
New cards

Event-driven Architecture

Relies on the capture, communication, processing, and persistence of events.

22
New cards

Event-driven Architecture

Enables minimal coupling and is ideal for distributed applications.

23
New cards

Event-driven Architecture

Loosely coupled since producers are unaware of consumers and consequences.

24
New cards

Event

A significant occurrence or change in state in hardware or software.

25
New cards

Event

Not the same as a notification, which informs a part of the system that an event occurred.

26
New cards

Event

Can originate from internal or external inputs.

27
New cards

Event

Can be triggered by user actions, external sources, or system operations.

28
New cards

Apache Kafka

A distributed platform widely used for real-time event processing.

29
New cards

Apache Kafka

Handles publishing, subscribing, storing, and processing of event streams.

30
New cards

Apache Kafka

Supports high-throughput, scalable applications by reducing point-to-point integrations.

31
New cards

Event-driven Architecture Models

May use either a pub/sub or an event stream model.

32
New cards

Pub/Sub model

This is a messaging infrastructure based on subscriptions to an event stream.

33
New cards

Pub/Sub model

With this model, after an event occurs, or is published, it is sent to subscribers that need to be informed.

34
New cards

Event Streaming model

events are written to a log.

Event consumers don’t subscribe to an event stream.

35
New cards

Event Streaming model

they can read from any

part of the stream and can join the stream at any time.

36
New cards

Service-Oriented Architecture (SOA)

Organizes software as a set of services that communicate with each other.

37
New cards

Service-Oriented Architecture (SOA)

An enterprise-wide method using reusable software components or services.

38
New cards

Service-Oriented Architecture (SOA)

A service includes code and integrations for a specific business function.

39
New cards

Service-Oriented Architecture (SOA)

Services are self-contained, loosely coupled, and focused on specific functionality.

40
New cards

Service-Oriented Architecture (SOA)

Exposes well-defined interfaces and can be reused across platforms.

41
New cards

Service-Oriented Architecture (SOA)

Encourages interoperability, modularity, and flexibility in design.

42
New cards

Difference between Microservices vs. Service-Oriented Architecture (SOA)

SOA has enterprise scope, while the other has application scope.

43
New cards

Integration Techniques and Patterns

Approaches to connect various systems or components for seamless operation.

44
New cards

Integration Techniques and Patterns

Enables data exchange, communication, and coordination across systems.

45
New cards

Data Integration

Combines data from multiple sources to provide a unified view.

46
New cards

Data Integration

Approaches depend on data complexity, volume, real-time needs, and integration goals.

47
New cards

Application Integration

Connects and allows communication between different applications or components.

48
New cards

Application Integration

Uses different methods depending on architecture and technology involved.

49
New cards

Orchestration

A centralized method for integrating services.

50
New cards

Orchestration

Uses a central engine to coordinate interactions between services.

51
New cards

Orchestration

Defines the order and flow of data among services in a business process.

52
New cards

Orchestration

Directs and controls execution of services in a coordinated manner.

53
New cards

Orchestration

Specifies timing and invocation details for each service.

54
New cards

Orchestration

Enforces communication interfaces between services.

55
New cards

Orchestration

Uses request-response communication and often waits for service replies.

56
New cards

Choreography

A decentralized approach to integrating services.

57
New cards

Choreography

Services communicate based on predefined message formats or contracts.

58
New cards

Choreography

Each service understands its responsibilities and interaction methods.

59
New cards

Choreography

No central coordinator; interaction is contract-driven.

60
New cards

Choreography

Services are aware of their roles and act accordingly.

61
New cards

Choreography

Uses asynchronous messaging without waiting for replies.

62
New cards

Choreography

Loosely coupled; changes in one service don't affect others.

63
New cards

Choreography

Uses events or messages to trigger workflows across services.

64
New cards

Integration Middleware and Tools

Helps manage and facilitate integration across systems and data.

65
New cards

Integration Middleware and Tools

Provides capabilities to connect, transform, route, and monitor interactions.

66
New cards

Integration Governance

A set of policies and practices to oversee system and data integration.

67
New cards

Integration Governance

Ensures effective and efficient collaboration between different technology components.

68
New cards

Standards and Guidelines

Defines integration practices and consistency across teams.

69
New cards

Standards and Guidelines

Helps maintain best practices in implementations.

70
New cards

Architecture and Design

Describes integration infrastructure including APIs and middleware.

71
New cards

Architecture and Design

Simplifies system integration and avoids data silos.

72
New cards

Data Management

Ensures data quality, security, and compliance across systems.

73
New cards

Security and Compliance

Protects data and enforces access control.

74
New cards

Security and Compliance

Ensures adherence to regulatory and industry requirements.

75
New cards

Monitoring and Performance Management

Keeps track of integration processes to detect issues.

76
New cards

Monitoring and Performance Management

Tracks performance to meet service level expectations.

77
New cards

Change Management

Controls updates to integration parts to avoid service disruption.

78
New cards

Vendor Management

Ensures vendors follow standards and are held accountable.

79
New cards

Governance Board

Oversees integration decisions and resolves conflicts in projects.

80
New cards

System Integration Governance Frameworks

Helps manage application and system integrations efficiently and securely.

81
New cards

System Integration Governance Frameworks

Provides policies and processes for controlling integration.

82
New cards

TOGAF (The Open Group Architecture Framework)

Provides a method to plan, design, and govern enterprise architectures.

83
New cards

TOGAF (The Open Group Architecture Framework)

Used to set integration standards and governance policies.

84
New cards

COBIT (Control Objectives for Information and Related Technologies)

A framework for managing IT governance and practices.

85
New cards

COBIT (Control Objectives for Information and Related Technologies)

Defines integration policies aligned with business and compliance goals.

86
New cards

ITIL (Information Technology Infrastructure Library)

A set of ITSM practices aligned with business needs.

87
New cards

ITIL (Information Technology Infrastructure Library)

Manages integration as part of incident, change, and service level management.

88
New cards

API Governance Frameworks

Focuses on API security, lifecycle, versioning, and monitoring.

89
New cards

Integration Best Practices

Guidelines for effective and seamless system or data integration.

90
New cards

Integration Best Practices

Proper implementation improves processes and productivity.

91
New cards

Identity and Access Management (IAM)

Manages digital identities and their access to IT resources.

92
New cards

Identity and Access Management (IAM)

Ensures right access for the right users based on roles and needs.

93
New cards

Protocol

A set of rules for communication between systems or entities.

94
New cards

Protocol

Defines message formats, semantics, and order for interaction.

95
New cards

Protocol

Enables reliable and secure communication between devices and applications.

96
New cards

Protocol

Standardizes cross-system collaboration regardless of vendor.

97
New cards

Secure Communication Protocols

Cryptographic protocols ensuring confidentiality and integrity of transmitted data.

98
New cards

Secure Communication Protocols

Protects sensitive data from unauthorized access and tampering.

99
New cards

Threat Modeling

A method to identify, evaluate, and reduce system vulnerabilities.

100
New cards

Threat Modeling

Used in designing secure applications and systems.