h

Ace your homework & exams now with Quizwiz!

Which Architecture is always a tiered architecture? (A) Client-server architecture (B) CORBA (C) Service-oriented architecture (D) DCOM

(A) Client-server architecture

Which concept is least related to coding? (A) Service-oriented architecture (B) Service-oriented computing (C) Service-oriented software development (D) Object-oriented programming

(A) Service-oriented architecture

What is the most significant difference between the Distributed Object Architecture (DOA) (e.g., CORBA and DCOM) and the Service-Oriented Architecture (SOA)? (A) SOA software has better modularity. (B) SOA software does not require code-level integration among the services. (C) DOA software has better reusability. (D) DOA software better supports cross-language integration.

(B) SOA software does not require code-level integration among the services.

Which protocol enables remote invocation of services across network platforms? (A) XML (B) SOAP (C) WSDL (D) UDDI

(B) SOAP

The main idea of cloud computing is to shift computing from... (A) from Web to desktop. (B) from service orientation to object orientation. (C) from desktop to Web. (D) from Web 2.0 to Web 3.0.

(C) from desktop to Web.

Which concept is least related to the application composition? (A) BPEL (B) Choreography (C) Orchestration (D) Code integration.

(D) Code integration.

Which entity does not belong to the three-party model of SOC software development? (A) Service provider (B) Service broker (C) Application builder (D) End user of software

(D) End user of software

Mashup is... (A) a functional building method. (B) an imperative programming method. (C) an object-oriented integration method. (D) a service-oriented composition method.

(D) a service-oriented composition method.

XML is... (A) an object-oriented programming language. (B) a service-oriented programming language. (C) a database programming language. (D) a standard for data representation.

(D) a standard for data representation.

Generally speaking, a service is an interface between the... (A) service provider and the service broker. (B) service requester and the service broker. (C) Yellow Pages and the Green Pages. (D) producer and the consumer.

(D) producer and the consumer.

Which of the following is/are the proposed features of Web 2.0? (A) Software as operational services. (B) Users are treated as co-developers. (C) Use loosely coupled and easy-to-use services to compose applications. (D) Use services and data from multiple external sources to create new services and applications. (E) All of the above

(E) All of the above

Which of the following are fallacies of distributed systems? (A) Latency is zero. (B) Bandwidth is infinite. (C) The network is secure. (D) Topology doesn't change. (E) All of them are fallacies.

(E) All of them are fallacies.

What are the key differences between a Remote Procedure Call (PRC) and a Web Service Invocation (WSI)? Select all that apply. 1. PRC is tightly couples; WSI is loosely coupled. 2. PRC is platform-dependent; WSI is platform-independent. 3. PRC uses one-way asynchronous communication; WSI uses two-way synchronous communication. 4. WSI is a special case of RPC.

1. PRC is tightly couples; WSI is loosely coupled. 2. PRC is platform-dependent; WSI is platform-independent.

The impacts of service-oriented computing include (select all that apply): 1. Programmers do not have to understand application domain. 2. Application builders do not have to understand application domain. 3. Few software engineers will be needed. 4. Shorter software development cycle.

1. Programmers do not have to understand application domain. 4. Shorter software development cycle.

What problems occurred in the first two attempts when scaling up the number of threads in the Collatz conjecture case study? Select all that apply. 1. The thread execution times were different, which reduced the benefit of parallel computing. 2. Extensive communications between the threads eliminated the benefit of parallel computing. 3. The impact of the data structures dominated the performance. 4. All the threads were allocated to the same core, resulting to single-core performance.

1. The thread execution times were different, which reduced the benefit of parallel computing. 3. The impact of the data structures dominated the performance.

In a distributed application with multiple threads, what techniques can be applied to increase the performance? Select all that apply. 1. Use non-blocking calls and callbacks for communication 2. Use blocking calls and wait for results. 3. Use a flat level of threads, instead of hierarchical layers of threads. 4. Use a pool of resource with semaphore, instead of a single cell with lock.

1. Use non-blocking calls and callbacks for communication 3. Use a flat level of threads, instead of hierarchical layers of threads. 4. Use a pool of resource with semaphore, instead of a single cell with lock

A C# delegate (Select all that apply) 1. allows the same method call to be associated with different method codes. 2. defines a semaphore for multiple threads. 3. allows a method name to be passed as a parameter. 4. creates proxy to be associated with a remote service.

1. allows the same method call to be associated with different method codes. 3. allows a method name to be passed as a parameter.

In contrast to objects in object-oriented development, service-oriented development has these distinct features: (Select all that apply.) 1. A service always resides in the service broker. 2. A service has language-independent interface. 3. A proxy to the service is created in the application. 4. The executable code of the service is integrated into the application.

2. A service has language-independent interface. 3. A proxy to the service is created in the application.

Java Enterprise Edition (Java EE) applications are based on a 4-tier architecture, which includes (Select all that apply): 1. Ontology tier 2. Client tier 3. Business tier 4. SOAP tier

2. Client tier 3. Business tier

How can a client binds to a SOAP service? Select all that apply. 1. Dynamically using Download(URL) 2. Dynamically using DynamicProxyFactory(URL) 3. Statically using CreateProxy() 4. Statically using Add Service Reference

2. Dynamically using DynamicProxyFactory(URL) 4. Statically using Add Service Reference

What kinds of remotable objects exist in .Net environment? Select all that apply. 1. Marshal-by-delegate bag. 2. Marshal-by-reference objects. 3. Marshal-by-interface virtual object. 4. Marshal-by-value objects.

2. Marshal-by-reference objects. 4. Marshal-by-value objects.

What functions does WCF (Windows Communication Foundation) support? Select all that apply. 1. BPEL-based service composition 2. WS-* Specification 3. Interoperable Web services 4. Distributed Transactions

2. WS-* Specification 3. Interoperable Web services 4. Distributed Transactions

What is true about a deployed service with the Just-In-Time compilation? Select all that apply. 1. It is slower than a pre-compiled service for every request. 2. It needs to recompile and redeploy the entire project if any part of the code is modified. 3. It is slower than pre-compiled code for the first request. 4. The source code of the service can be redeployed while the service is being accessed.

3. It is slower than pre-compiled code for the first request. 4. The source code of the service can be redeployed while the service is being accessed.

The key ideas of Intel's Threading Building Blocks (TBB) library are to covert (Select all that apply) 1. method synchronization into statement synchronization. 2. HyperThreading programs into multi-core programs. 3. synchronous calls into asynchronous calls. 4. nested method calls into flat method calls.

3. synchronous calls into asynchronous calls. 4. nested method calls into flat method calls.

How is the synchronization mechanism implemented in a Java environment? A. A lock-bit in an object is set to "true" when a synchronized method accesses the object. B. An object is removed from the heap when a synchronized method accesses the object. C. The objects that can be accessed by a synchronized method reside in static memory. D. All of the above.

A. A lock-bit in an object is set to "true" when a synchronized method accesses the object.

How does a client bind to a RESTful service? A. Always dynamically B. Neither statically nor dynamically C. Always statically D. Both statically and dynamically

A. Always dynamically

What architecture is strictly a tiered architecture? A. Client-server architecture B. CORBA C. DCOM D. Enterprise Service Bus E. Service-oriented architecture

A. Client-server architecture

What system is truly based on a vendor-independent standard? A. Enterprise Service Bus (ESB) B. CORBA C. DCOM D. J2EE

A. Enterprise Service Bus (ESB)

If you write a program to search a UDDI service broker, what UDDI pages do you search? A. Green Pages B. Yellow Pages C. White Pages D. Blue Pages

A. Green Pages

If you write a program to search a UDDI service broker, what UDDI pages do you search? A. Green Pages B. Blue Pages C. White Pages D. Yellow Pages

A. Green Pages

Compare and contrast livelock and deadlock. What statement is correct? A. In the case of deadlock, the resources are held. In the case of livelock, the resources are still free. B. Livelock is a deadlock-resolving technique. C. In the case of livelock, the resources are held. In the case of deadlock, the resources are still free. D. Livelock is a synonym of deadlock.

A. In the case of deadlock, the resources are held. In the case of livelock, the resources are still free.

What method in C# can be used if the calling thread does not want to be blocked, even if the object to be accessed is locked by another thread? A. Monitor.TryEnter(...); B. NonBlock.Enter(...); C. ReaderWriterLock(...); D. lock(...); E. Monitor.Enter(...);

A. Monitor.TryEnter(...);

Which of the following layers does not belong to the traditional three-tier architecture? A. Service repository B. Application processing C. Data management D. Presentation

A. Service repository

How is a new (child) process created in the Unix operating system programming environment? A. Use a system call fork( ), followed by a system call execvp(. . .). B. Use a system call copy( ), followed by a system call paste(. . . ). C. Use a system call execvp(. . .), followed by a system call fork( ). D. Call the start( ) method in the Thread class, followed by a call to fork().

A. Use a system call fork( ), followed by a system call execvp(. . .).

XML is A. a Meta language that can be used to define another language. B. a database programming language. C. a service-oriented programming language. D. an object-oriented programming language.

A. a Meta language that can be used to define another language.

Event-driven programming is typically implemented by A. a callback from the object or thread where the event is generated. B. periodic polling from the event service to the event client. C. indivisible instructions at the hardware level. D. a remote procedure call from the event client to the event service.

A. a callback from the object or thread where the event is generated.

If a method is prefixed with the keyword "synchronized", then A. all objects accessed by the method will be locked during the execution of the method. B. the method will send a message to another method. C. the execution of the method cannot be interrupted. D. the method will wait for receiving a message from another method.

A. all objects accessed by the method will be locked during the execution of the method.

Multi tenancy is a key concept in A. cloud computing B. client-server systems C. federation of servers D. virtualization of servers

A. cloud computing

Service-oriented software development achieves the platform-independent computing by A. creating service proxies in the application. B. migrating service code to application site. C. using the same language for all parts. D. integrating service code into the application.

A. creating service proxies in the application.

A thread A. exists when the corresponding code is running. B. is a string of characters. C. is a string of assembly code. D. exists after the corresponding code is compiled.

A. exists when the corresponding code is running.

If a higher priority thread occurs, A. it preempts the lower priority thread and then begins to execute. B. it pushes the lower priority thread into wait state and then begins to execute. C. it pushes the lower priority thread into blocked state and then begins to execute. D. it waits for the current thread to complete or expires and then begins to execute.

A. it preempts the lower priority thread and then begins to execute.

In Distributed Object Architecture, what component is called the software bus? A. object request broker B. communication protocols SOAP/HTTP C. enterprise service bus D. a pair of distributed objects

A. object request broker

A design pattern refers to... A. software pattern B. computing pattern C. architectural pattern D. platform independent design

A. software pattern

The "businessEntity" data structure in UDDI contains information about A. the service provider, and it is called the White Pages of the UDDI. B. the services offered by the service provider, and it is called the Yellow Pages of the UDDI. C. the technical details of services, and it is called Green Pages of the UDDI. D. All of the above.

A. the service provider, and it is called the White Pages of the UDDI.

What law you should use in evaluating the system performance improvement if you have doubled the processor speed, but kept the other parts of the system unchanged? A. Moore's Law B. Amdahl's Law C. Colletz conjecture D. Gustafson's Law

B. Amdahl's Law

What architecture model does not belong to the families of the distributed object architectures implemented in CORBA or DCOM? A. ORB (Object Request Broker) B. ESB (Enterprise Service Bus) C. Networked OLE (Object Linking and Embedding) D. COM (Component Object Model)

B. ESB (Enterprise Service Bus)

What entity does not belong to the three-party model of SOC software development? A. application builder B. End user of software C. Service broker D. Service provider

B. End user of software

How can the data stored in ViewState variable of one page be accessed by another page? A. Use page to page direct post. B. First post it back to server and then send it to the other page. C. There is no way for a page to access the ViewState variable of another page. D. The ViewState is automatically available in all pages of an application.

B. First post it back to server and then send it to the other page.

When calling a RESTful service, the required communication protocol is A. UDDI B. HTTP C. WSDL D. SOAP

B. HTTP

What is the standard language in CORBA that is used for defining the interface between distributed objects? A. Java B. IDL C. HTML D. WSDL

B. IDL

Java Remote Method Invocation (RMI) is used to create distributed applications using A. ORB (Object Request Broker) stub B. Marshal-by-reference C. Marshal-by-value D. SOAP invocation

B. Marshal-by-reference

Can Monitor.Enter(v) lock the variable v if v is of integer type? A. No, a syntax error will occur if one uses Monitor.Enter(v). B. No, Monitor.Enter(v) cannot directly lock the variables of value-type. C. Yes, Monitor.Enter(v) is designed to lock value-type variables only. D. Yes, Monitor.Enter(v) can directly lock any type of variables.

B. No, Monitor.Enter(v) cannot directly lock the variables of value-type.

What would happen if a "WaitOne" request is called when the semaphore value is zero? A. An exception will occur. B. The calling thread will be blocked. C. The semaphore value will be incremented. D. The semaphore value will be decremented.

B. The calling thread will be blocked.

Which of the following components in a Java SOC development environment is responsible for hosting the execution of a Web service? A. Java programming language itself B. Tomcat C. Eclipse programming environment D. Axis2

B. Tomcat

BPEL is primarily A. a specification language at a component / architecture level. B. a specification language at a process/workflow level. C. a language that describes the communication protocol between business process and Web services. D. an object-oriented programming language. E. a language that is used for defining the interface between business process and Web services.

B. a specification language at a process/workflow level.

Web Service Description Language (WSDL) is used for A. composing applications using existing services. B. defining the interface of services. C. writing the executable code of services. D. describing communication protocols between services.

B. defining the interface of services.

Where does the database normally reside in the fat-client (of client-server) architecture? A. the architecture does not support database B. in the server layer C. in a separate data management layer D. in the client layer

B. in the server layer

The binding template in UDDI A. allows one service provider to be linked to another service provider. B. links a businessService in UDDI to an implementation of the service. C. links the businessEntity to the list of services provided by the business. D. contains (hosts) the executable code of a businessService.

B. links a businessService in UDDI to an implementation of the service.

Ethernet's binary exponential backoff mechanism is a technique used for avoiding A. deadlock. B. livelock. C. resource double booking. D. starvation.

B. livelock.

What does the "operation" in a WSDL file correspond to in object-oriented computing? A. class B. method C. parameter D. return value

B. method

UDDI is primarily a standard for A. service registry and service repository. B. service registry only. C. service repository only. D. service development and application building.

B. service registry only.

Compare and contrast wait( ) and sleep(t) methods defined in the library class Thread. A. wait() and sleep(t) must be used in pair. B. wait() does not have a parameter, and thus it will cause the calling thread to sleep a fixed amount of time. C. A thread in the wait state cannot return to the ready state unless another thread issues a notification. D. A thread in the sleep state needs to be waked up by another thread.

C. A thread in the wait state cannot return to the ready state unless another thread issues a notification.

What is the common interface language used in CORBA to facilitate the communication among objects written in different programming languages? A. Java Script B. OLE C. IDL D. C++

C. IDL

What method in the C# is used to move one thread from the "wait" state to the "ready" state? A. Monitor.Wake(...); B. Unlock.Notify(...); C. Monitor.Pulse(...); D. Monitor.Wait(...); E. Monitor.Notify(...);

C. Monitor.Pulse(...);

What is the unique feature of service-oriented computing paradigm that does not exist in other computing paradigms? A. resource sharing B. reasoning C. platform-independent D. stateless

C. Platform-Independent

What protocol is normally used for transferring data between Web services? A. UDDI B. WSDL C. SOAP D. XML

C. SOAP

What step is NOT in the process of application building in SOA style? A. Architecture specification. B. Workflow specification. C. Service implementation. D. Deployment. E. Management

C. Service implementation.

What is NOT be included in a service proxy? A. Parameter list of the remote method. B. Method name of the remote method. C. Source code of the remote method. D. Return type of the remote method.

C. Source code of the remote method.

What is the efficiency of a multi-core computer? A. ExecutionTime / NumberOfCores B. Speedup/ClockRate C. Speedup / NumberOfCores D. Speedup / ExecutionTime

C. Speedup / NumberOfCores

Intel's HyperThreading design duplicates A. the integer and float ALUs in the processor. B. the entire processor. C. control unit in the processor. D. no hardware.

C. control unit in the processor.

The lock(...) method in C# does not need to use try-finally exception handling, because A. the lock(...) method is used for read-only. B. the lock(...) method is used for write-only. C. exception handling is implied. D. an exception can never happen if lock(...) method is used.

C. exception handling is implied.

In service-oriented computing, the building blocks of software systems are services, which are A. always developed by the application builder. B. tightly coupled. C. loosely coupled. D. always stored in a service broker.

C. loosely coupled.

The key function of AJAX programming is to allow A. browser-independent computing. B. executing C# program in html page. C. partial data refreshing and making the Web page more responsive. D. executing Java program in html page.

C. partial data refreshing and making the Web page more responsive.

The design pattern specifically deals with the problems of A. efficiency of algorithms. B. programming language selection. C. reusable solution at the level of software design. D. architecture style of software development.

C. reusable solution at the level of software design.

The C# monitor class's methods Monitor.Enter and Monitor.Exit can be used for A. synchronizing the entire method without specifying the object, similar to the synchronized method in Java. B. making sure the enclosed block of code cannot be interrupted. C. synchronizing a set of statements, similar to the synchronized statements in Java. D. synchronizing the entire class with multiple methods.

C. synchronizing a set of statements, similar to the synchronized statements in Java.

Java Enterprise Edition (Java EE) applications are based on a 4-tier architecture, which includes (Select all that apply): Client tier Ontology tier Correct Business tier SOAP tier

Client tier

What is the standard language in CORBA that is used for defining the interface between distributed objects? A. HTML B. Java C. WSDL D. IDL

D. IDL

What technique can be used to make sure that parallel withdrawals from ATMs cannot exceed the given limit of a bank account? A. Add a random delay before writing back the account balance. B. Execute the program on a single-processor computer. C. Make sure any single withdraw does not exceed a half of the limit. D. Implement a lock mechanism to prevent simultaneous access to the account object.

D. Implement a lock mechanism to prevent simultaneous access to the account object.

What is the proper way of creating a thread class if the class has already inherited members from another class? A. Define the thread supporting methods in the class B. Extend the library class Thread C. Enable the multiple inheritance feature D. Implement the Runnable Interface

D. Implement the Runnable Interface

What is a major difference between object-oriented development and service-oriented development? A. CORBA vs. ESB B. Java vs. C# C. Static binding vs. dynamic binding D. One development cycle vs. three development parallel cycles

D. One development cycle vs. three development parallel cycles

Coordination events in C# are used for A. preventing any two processes (or threads) to access a shared resource simultaneously. B. preventing more processes (or threads) than permitted from accessing a pool of resources. C. replacing Mutex, because Mutex is not efficient in execution time. D. defining the order of execution among the threads.

D. defining the order of execution among the threads.

One of the impacts of SOA/SOC paradigm is that A. Software architecture and implementation are no longer differentiated. B. more programmer jobs will be available. C. Software engineers and programmers are no longer differentiated. D. more software engineer jobs will be available.

D. more software engineer jobs will be available.

A service is defined through a class. What WSDL element corresponds to the Web method name in the class? A. binding B. port C. portType D. operation

D. operation

ebXML is a standard for A. service registry only. B. service repository only. C. service development and application building. D. service registry and service repository.

D. service registry and service repository.

It involves two operations to lock an object: test the value of a lock and set the value to "true" if the value is false. These two operations have A. to be translated into two machine instructions. B. to be synchronized to prevent simultaneous access. C. no requirement at the machine language level. D. to be done in a single instruction or two linked instructions.

D. to be done in a single instruction or two linked instructions.

What resources are typically used as the sources of Mashup? Memory, CUP, and network Data, services, and applications Software, hardware, and firmware Software, platform, and infrastructure

Data, services, and applications

What communication protocol is used for accessing RESTful services? ebXML HTTP IP SOAP TCP UDDI WSDL

HTTP

What protocol in the Web services protocol stack is normally in the layer directly below the SOAP protocol? ebXML HTTP IP SOAP TCP UDDI WSDL

HTTP

What are the key concepts in cloud computing? Select all that apply. Infrastructure as a service Platform as a service Programming language as a service Software as a service

Infrastructure as a service Platform as a service Software as a service

Which of the followings are software architecture? Select all that apply. SOAP over HTTP architecture Topology of interconnection Pipe and filter architecture Blackboard architecture

Pipe and filter architecture Blackboard architecture

The impacts of service-oriented computing include (select all that apply): Programmers do not have to understand application domain. Application builders do not have to understand application domain. Few software engineers will be needed. Shorter software development cycle.

Programmers do not have to understand application domain. Shorter software development cycle.

What communication protocol is directly used by the WSDL Web services for transferring data? ebXML HTTP IP SOAP TCP UDDI WSDL

SOAP

What is the main function of the IIS worker process? What is the main function of the Web Administration Service (WAS) in IIS? Options: 1. Listening to the browsers. 2. Queuing and handling requests. 3. Register Web services and Web applications into the registry. 4. Executing Web services and Web applications as its threads. 5. Compile source code when it is accessed for the first time.

What is the main function of the IIS worker process? 3. Register Web services and Web applications into the registry. What is the main function of the Web Administration Service (WAS) in IIS? 4. Executing Web services and Web applications as its threads.

(1) What communication protocol is used for accessing RESTful services? Choose one [Q1]. (2) What communication protocol is directly used by the WSDL Web services for transferring data? Choose one [Q2]. (3) If you want to create a standard service broker with both service directory and service repository, what standard should be used? Choose one [Q3]. (4) What protocol in the Web services protocol stack is normally in the layer directly below the SOAP protocol? Choose one [Q4]. Options: A. ebXML B. HTTP C. IP D. SOAP E. TCP F. UDDI G. WSDL

[Q1] B. HTTP [Q2] D. SOAP [Q3] A. ebXML [Q4] B. HTTP

What architecture best supports integration based on code migration? a. service-oriented architecture b. object-oriented architecture c. client-server architecture d. distributed object architecture

d. distributed object architecture

If you want to create a standard service broker with both service directory and service repository, what standard should be used? ebXML HTTP IP SOAP TCP UDDI WSDL

ebXML

The process of application building in SOA style includes (Select all that apply): organizing services for easy searching developing the code of each service process level specification code-level assembling and binding of components

process level specification code-level assembling and binding of components

What statements best describe the architecture-driven approach? Select all that apply. bottom-up approach top-down approach elaborating the architecture design into executable generating class diagram directly from the code

top-down approach elaborating the architecture design into executable


Related study sets

Marketing/MKTG 250 ~ Consumer Markets and Buyer Behavior

View Set

Word Basics 2.1 - Page Layout / Page margins / Indents / Tabs

View Set

Regulations - Securities Exchange Act of 1934 : Review Questions

View Set

Insurance Operations Exam 2 Practice Exam

View Set

NRS 301 Exam 1, Exam 2, Exam 3, EXAM 4 combined

View Set

Biology:Human Anatomy (Exam #3 -Lecture review questions) (cardiovascular system)

View Set