0% found this document useful (0 votes)
9 views7 pages

kIEM-TRA-k15cmu

Uploaded by

taolaongtrum00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views7 pages

kIEM-TRA-k15cmu

Uploaded by

taolaongtrum00
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

1. What the advantages are integrating legacy systems ?

a.Business Process Automation /Streamlining,Cost Savings, e-Commerce


Support ,Information Management, Common Security Infrastructure
b.Business Process Automation/Streamlining, Cost Savings, e-Commerce
Support,increasing data quality, may be cheaper to integrate existing legacy
systems than build or acquire completely new system
c.May be cheaper to integrate existing legacy systems than build or acquire
completely new system, can be integrated across organizational boundaries in
order to provide e-commerce capability, Can be achieved by elimination of
manual information processing, Integration of systems can aid in encouraging data
standardization, increasing data quality, and increasing data accessibility
throughout the enterprise. Integration of legacy systems into common enterprise
security infrastructure
d.Information Management, Common Security Infrastructure, may be cheaper to
integrate existing legacy systems than build or acquire completely new system,
can be integrated across organizational boundaries in order to provide e-commerce
capability, Integration of legacy systems into common enterprise security
infrastructure
2.Building and maintaining options is an important system engineering
heuristic. Why must system engineers follow this heuristic
a.often complex with many unanticipated problems that can arise
b.flexibility to deal with these problems
c.a and b correct
d.a and b uncorrect
3. Why are you integrating?
a.Adaptable systems and processes, Integrated security, Management information,
Reliable and recoverable systems, Economies of scale
b.Streamlined business processes, Replaceable components, Adaptable systems
and processes, Integrated security, Economies of scale
c.Management information, Reliable and recoverable systems, Streamlined
business processes, Replaceable components, Economies of scale
d.Adaptable systems and processes, Streamlined business processes, Management
information, Support for electronic commerce, Integrated security, Replaceable
components, Economies of scale
4. Who will benefit from the integration system?
a.Customer
b.Organizers of the enterprise
c.The people participate in the system
d.Everybody
5. What contents are Information System included ?
a.Historical data analysis, Process consistency, Exception reporting, security of
data, Transparency to users
b.Data consistency, Data accessibility, Exception reporting, Historical data
analysis, Process consistency
c.Data consistency, Data accessibility, Exception reporting, security of data,
Transparency to us ers
d. Historical data analysis, Process consistency, Historical data analysis,
Calculations on data
6.Integrated Security includes
a.Firewalls, Authentication, Integrity, Nonrepudiation, Confidentiality
b.Firewalls, Authentication, Integrity, Authorization, Confidentiality, IDS
c.Firewalls, Authentication, Integrity, Authorization, Confidentiality
d.Firewalls, Nonrepudiation, Integrity, Authorization, Confidentiality,
Authentication
7. Describe the disadvantages of the Agile software development lifecycle
a.The user may not have time to work with the developers, Not suitable for
systems that require a high degree of verification and validation
b.Not suitable for systems that require a high degree of verification and validation,
Non-functional or system properties are difficult to plan
c.The user may not have time to work with the developers, Non-functional or
system properties are difficult to plan
d.Not suitable for systems that require a high degree of verification and validation,
Non-functional or system properties are difficult to plan, The user may not have
time to work with the developers
8. The technologies support for integration System are
a.RPC, Middleware, Web, DTML, HTML
b.Middleware, Web, XML, Distributed Objects
c.ODBC. LDAP, XML, Distributed Objects
d.OLE, COM+, Web, XML, Distributed Objects
9. The most important the values of Integration Heuristics
a. Do not care about the most complete
b.Build and maintain options as long as possible in the design and implementation
of complex systems
c.Choose the elements so that independent as possible
d. Simplify the components in the system if possible
10. What‘s the Software Development Life Cycle – SDLC?
a. Is a process to improve software products
b. Is active in a specific project plan
c. Is the time from when the software starts to form until it is no longer used
anymore
d All are correct
11. What are the main difference of the life cycles ?
a. Number of stages implemented
b. Execution time of each s`tages
c. Emphasis, duration, and timing of each stages
d.All are correct
12. How do you select a system development life cycle for a system integration
project ?
a.Suitability for small development team, Customizability/Flexibility of approach,
Market adoption
b.Compatibility with distributed teams, Ability to handle rapidly changing
(unstable) set of requirements, Emphasis on quality measurement
c. Size of product, Implementation cost, Built-in support for prototyping
d. All are correct
13. System integration life cycle differs from Software Development Life
Cycle are
a.Legacy system analysis, Testing and Dependencies
b.Legacy system analysis, Accessibility of legacy information constrains the
design, Testing and Dependencies
c.integration, adaptation and Accessibility of legacy information constrains the
design,
d.stages of operation, flexibility and resilience
14. The integrated models include
a. Presentation Integration, Security Integration, Functional Integration
b. Data Integration,Network Integration, Functional Integration
c. Functional Integration, Enviroment Integration, Presentation Integration
d Presentation Integration, Data Integration, Functional Integration
15. When is it Appropriate to use the Presentation Integration Model
a.Presentation models are Executive dashboards or Operational status displays
b.Information presentation is through application API’s, Cannot access databases
directly
c.Integrate with an application whose only useful and implementable integration
base interface or dashboards,Cannot access databases directly
d. Databases are independent – No coupling, Cannot access databases directly
16. What Integration System is the easiest to perform all models?
a.Data Integration
b.Presentation Integration
c.Functional Integration
d. a,b,c false
17. Changes in underlying databases may affect GUI, Data may be
inconsistent, API’s may not fully support information requirements, these are
the disadvantagesof the integrated model
a. Data Integration
b. Presentation Integration
c. Functional Integration
d. all right
18. Maintenance can be difficult and data may be inconsistent, these are the
characteristics of the integrated model
a.Data Integration and Functional Integration
b.Presentation Integration and Functional Integration
c. Data Integration and Presentation Integration
d. all right
19. When were Architectural mismatches found ?
a. integrated Story systems
b. integrated analytical systems
c. integrated hístorical systems
d. integrated legacy systems
20. Please provide the name of the main styles integration systems
a.File Transfer, Shared Database, Remote Procedure Invocation, Integration
Guidelines
b. File Transfer, Shared Database, Remote Procedure Invocation, Messaging
c. File integration, Shared Database, Remote Procedure Invocation, Messaging
d. Integration Guidelines, File integration, Shared Database, Remote Procedure
Invocation
21. 3 problems that can arise from integrating systems with different naming
services are.
a. Same names for different entities, Mismatched protocols, Attribute mis-match
b. False protocols, Mismatched DNS, Attribute mis-match
c. load balancing mis-match, False protocols, Mismatched DNS
d. Same names for different entities, Mismatched protocols, load balancing mis-
match
22. Data Integration Common Mistakes
a. Testing without a sufficient set of real data, Assuming that one site is a good
representation of data at all sites
b. Creating yet another database, Waiting for the data analyst to finish developing
the perfect schema
c. Implementing the perfectly normalized schema, Assuming the data exists as
described in the documentation
d.all right
23. .................................................are the fundamentals of system security
a. Authentication, access control, Login
b. Authentication, access control and Data Confidentiality
c. Authentication, access control, and auditing
d. Authentication, access control and Non-repudiation
24. How many types midles do you have?
a. Asynchronous communication, Subscribe Messaging, CORBA, ACID
b. Message Oriented Middleware, Object Architectures, Transaction Processing
c. Object Architectures, Transaction Processing. Subscribe Messaging
d. Message Oriented Middleware, Object Architectures, Transaction Process
Monitors
25. The purpose of the network integration is
a. these services must be configured to trust each other
b. easy data exchange between services each other
c. increase the linkages between the components in the network
d.All right

You might also like