We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7
1. What the advantages are integrating legacy systems ?
a.Business Process Automation /Streamlining,Cost Savings, e-Commerce
Support ,Information Management, Common Security Infrastructure b.Business Process Automation/Streamlining, Cost Savings, e-Commerce Support,increasing data quality, may be cheaper to integrate existing legacy systems than build or acquire completely new system c.May be cheaper to integrate existing legacy systems than build or acquire completely new system, can be integrated across organizational boundaries in order to provide e-commerce capability, Can be achieved by elimination of manual information processing, Integration of systems can aid in encouraging data standardization, increasing data quality, and increasing data accessibility throughout the enterprise. Integration of legacy systems into common enterprise security infrastructure d.Information Management, Common Security Infrastructure, may be cheaper to integrate existing legacy systems than build or acquire completely new system, can be integrated across organizational boundaries in order to provide e-commerce capability, Integration of legacy systems into common enterprise security infrastructure 2.Building and maintaining options is an important system engineering heuristic. Why must system engineers follow this heuristic a.often complex with many unanticipated problems that can arise b.flexibility to deal with these problems c.a and b correct d.a and b uncorrect 3. Why are you integrating? a.Adaptable systems and processes, Integrated security, Management information, Reliable and recoverable systems, Economies of scale b.Streamlined business processes, Replaceable components, Adaptable systems and processes, Integrated security, Economies of scale c.Management information, Reliable and recoverable systems, Streamlined business processes, Replaceable components, Economies of scale d.Adaptable systems and processes, Streamlined business processes, Management information, Support for electronic commerce, Integrated security, Replaceable components, Economies of scale 4. Who will benefit from the integration system? a.Customer b.Organizers of the enterprise c.The people participate in the system d.Everybody 5. What contents are Information System included ? a.Historical data analysis, Process consistency, Exception reporting, security of data, Transparency to users b.Data consistency, Data accessibility, Exception reporting, Historical data analysis, Process consistency c.Data consistency, Data accessibility, Exception reporting, security of data, Transparency to us ers d. Historical data analysis, Process consistency, Historical data analysis, Calculations on data 6.Integrated Security includes a.Firewalls, Authentication, Integrity, Nonrepudiation, Confidentiality b.Firewalls, Authentication, Integrity, Authorization, Confidentiality, IDS c.Firewalls, Authentication, Integrity, Authorization, Confidentiality d.Firewalls, Nonrepudiation, Integrity, Authorization, Confidentiality, Authentication 7. Describe the disadvantages of the Agile software development lifecycle a.The user may not have time to work with the developers, Not suitable for systems that require a high degree of verification and validation b.Not suitable for systems that require a high degree of verification and validation, Non-functional or system properties are difficult to plan c.The user may not have time to work with the developers, Non-functional or system properties are difficult to plan d.Not suitable for systems that require a high degree of verification and validation, Non-functional or system properties are difficult to plan, The user may not have time to work with the developers 8. The technologies support for integration System are a.RPC, Middleware, Web, DTML, HTML b.Middleware, Web, XML, Distributed Objects c.ODBC. LDAP, XML, Distributed Objects d.OLE, COM+, Web, XML, Distributed Objects 9. The most important the values of Integration Heuristics a. Do not care about the most complete b.Build and maintain options as long as possible in the design and implementation of complex systems c.Choose the elements so that independent as possible d. Simplify the components in the system if possible 10. What‘s the Software Development Life Cycle – SDLC? a. Is a process to improve software products b. Is active in a specific project plan c. Is the time from when the software starts to form until it is no longer used anymore d All are correct 11. What are the main difference of the life cycles ? a. Number of stages implemented b. Execution time of each s`tages c. Emphasis, duration, and timing of each stages d.All are correct 12. How do you select a system development life cycle for a system integration project ? a.Suitability for small development team, Customizability/Flexibility of approach, Market adoption b.Compatibility with distributed teams, Ability to handle rapidly changing (unstable) set of requirements, Emphasis on quality measurement c. Size of product, Implementation cost, Built-in support for prototyping d. All are correct 13. System integration life cycle differs from Software Development Life Cycle are a.Legacy system analysis, Testing and Dependencies b.Legacy system analysis, Accessibility of legacy information constrains the design, Testing and Dependencies c.integration, adaptation and Accessibility of legacy information constrains the design, d.stages of operation, flexibility and resilience 14. The integrated models include a. Presentation Integration, Security Integration, Functional Integration b. Data Integration,Network Integration, Functional Integration c. Functional Integration, Enviroment Integration, Presentation Integration d Presentation Integration, Data Integration, Functional Integration 15. When is it Appropriate to use the Presentation Integration Model a.Presentation models are Executive dashboards or Operational status displays b.Information presentation is through application API’s, Cannot access databases directly c.Integrate with an application whose only useful and implementable integration base interface or dashboards,Cannot access databases directly d. Databases are independent – No coupling, Cannot access databases directly 16. What Integration System is the easiest to perform all models? a.Data Integration b.Presentation Integration c.Functional Integration d. a,b,c false 17. Changes in underlying databases may affect GUI, Data may be inconsistent, API’s may not fully support information requirements, these are the disadvantagesof the integrated model a. Data Integration b. Presentation Integration c. Functional Integration d. all right 18. Maintenance can be difficult and data may be inconsistent, these are the characteristics of the integrated model a.Data Integration and Functional Integration b.Presentation Integration and Functional Integration c. Data Integration and Presentation Integration d. all right 19. When were Architectural mismatches found ? a. integrated Story systems b. integrated analytical systems c. integrated hístorical systems d. integrated legacy systems 20. Please provide the name of the main styles integration systems a.File Transfer, Shared Database, Remote Procedure Invocation, Integration Guidelines b. File Transfer, Shared Database, Remote Procedure Invocation, Messaging c. File integration, Shared Database, Remote Procedure Invocation, Messaging d. Integration Guidelines, File integration, Shared Database, Remote Procedure Invocation 21. 3 problems that can arise from integrating systems with different naming services are. a. Same names for different entities, Mismatched protocols, Attribute mis-match b. False protocols, Mismatched DNS, Attribute mis-match c. load balancing mis-match, False protocols, Mismatched DNS d. Same names for different entities, Mismatched protocols, load balancing mis- match 22. Data Integration Common Mistakes a. Testing without a sufficient set of real data, Assuming that one site is a good representation of data at all sites b. Creating yet another database, Waiting for the data analyst to finish developing the perfect schema c. Implementing the perfectly normalized schema, Assuming the data exists as described in the documentation d.all right 23. .................................................are the fundamentals of system security a. Authentication, access control, Login b. Authentication, access control and Data Confidentiality c. Authentication, access control, and auditing d. Authentication, access control and Non-repudiation 24. How many types midles do you have? a. Asynchronous communication, Subscribe Messaging, CORBA, ACID b. Message Oriented Middleware, Object Architectures, Transaction Processing c. Object Architectures, Transaction Processing. Subscribe Messaging d. Message Oriented Middleware, Object Architectures, Transaction Process Monitors 25. The purpose of the network integration is a. these services must be configured to trust each other b. easy data exchange between services each other c. increase the linkages between the components in the network d.All right