0% found this document useful (0 votes)
18 views3 pages

IT332 Reviewer

Good luck sa.exam

Uploaded by

21-07005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views3 pages

IT332 Reviewer

Good luck sa.exam

Uploaded by

21-07005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

IT332 – Integrative Programming and Technologies

Reviewer

• Integration of software refers to techniques for combining existing software components to form a
complete system.
• Integrative programming deals with integration approaches and techniques that connect different
components of IT infrastructure- people, applications, platforms, and databases to enable a secure, intra
and inter-application collaboration.
• Application integration assists in the unlimited sharing of data and business processes among any
connected applications or data sources without making major changes to the applications or data
structures.
• System Integration- Given two or more systems, subsystems, or components, each of which function
properly (satisfying their requirement within their environment).
• Functional Integration is an inter-system communication where the integrated system should provide the
new functionality or use the new technology while preserving the original system functionality.
• Incremental Engineering is where a software system can be developed and delivered using available
technologies and with less functionality than it is intended to finally provide. New technologies and or more
functions then can be integrated into the system.
• The integration model defines how applications will be integrated by defining the nature of and mechanisms
for integration.
• The presentation integration model allows the integration of new software through the existing
presentations of the legacy software.
• The data integration model allows the integration of software through access to the data that is created,
managed, and stored by the software typically for the purposes of reusing or synchronizing data across
applications.

• Heterogeneous– each application implements its own data model. Concepts may be shared, but
representation mismatches are to be expected. Mappings and transformations are required.
• File Transfer - One application writes a file that another later reads. The applications need to agree on the
filename and location, the format of the file, the timing of when it will be written and read, and who will delete
the file.
• A Shared Database is an Integration method where there is no duplicate data storage, no data must be
transferred from one application to the other.
• Remote Procedure Invocation - One application exposes some of its functionality so that it can be
accessed remotely by other applications as a remote procedure. The communication occurs in real-time
and synchronously.
• Middleware is a software programming running at the top of the operating system and below the
applications. It connects applications or software components.
• Based on the diagram below, the example is this, A food delivery application. When a customer places
an order, the order details are sent as a message to a messaging system. This message is then received
by various components of the system, such as the inventory management system, payment gateway, and
delivery tracking system. Each component processes the message independently, updating its own state
accordingly.
• Shared Database - A single physical data base can be shared by different applications running on different
platforms. This method integrates applications by having them store their data in a single shared database.


• File Transfer – One of the possible solutions to allow these applications to be integrated is allowing each
application produce files containing information that other applications need to consume.


• In network programming, Internet Protocol is designed to allow multiple routes between any two points
• and to route packets of data around damaged routers.
• Transmission Control Protocol is the backbone of HTTP/HTTPS protocol used to load web pages.
• Window is a field in TCP Packet Structure that refers to the amount of data that a sender can transmit before
requiring an acknowledgment from the receiver.
• Time-to-Live - Maintains a counter that gradually decrements down to zero, at which point the datagram is
discarded.
• Header Checksum - Helps ensure IP header integrity.
• XML is used in many aspects of web development and is often used to separate data from presentation.
• XML was designed to carry data, focusing on what data is.
• HTML was designed to display data, focusing on how data looks.
• XML Syntax Rules:
o XML Documents must have a Root Element
o XML prolog is optional
o All XML Tags should have a Closing Tag
o XML Tags are Case-Sensitive
o XML Elements must be properly nested
o XML Attribute Values must be quoted
o XML can contain spaces
• Naming examples in XML
o <FirstName>
o <FIRSTNAME>
o <First_Name>
o <first_name>
• DTD can be added in XML by separate documents, or they can be built into an XML document using a special
element named.
• XML element is everything from the element’s start tag to the element’s end tag. An element can contain
text, attributes, or a combination of both.
• XML Schemas (XSD) - used in most Web applications as a replacement for DTDs, for such reasons as XML
Schemas are extensible to future additions, are richer and more powerful than DTDs, XML Schemas are
written in XML and support data types and namespaces.
• XML validator is used to syntax-check your XML. The errors in XML documents will stop your XML
applications, unlike HTML browsers.
• XML document with correct syntax is called "Well Formed", and an XML document validated against a DTD is
"Well Formed" and "Valid".
• XSD attributes
o Simple elements cannot have attributes
o If an element has attributes, it is considered to be of a complex type.
o The attribute itself is always declared as a simple type.
o Example of an XSD attribute: <xs:attribute name= “xxx” type = “yyy”/>
• XSD complex elements can contain only other elements, text, and both elements and text.
• The syntax if the child elements can appear in any order, and that each child element must occur only once
o <xs:all>
• The syntax in specifying that either one child element or another can occur
o <xs:choice>
• The syntax in specifying that the child elements must appear in a specific order.
o <xs:sequence>
• HTML DOM defines a standard way for accessing and manipulating HTML documents. All HTML elements
can be accessed through the HTML DOM.
• The XMLHttpRequest object can be used to request data from a web server where you can update a web
page by reloading the page.
• Parsed Character Data (#PCDATA) is a string data type.
• Design Pattern also called macro-architecture
• All are Gang of Four (GoF) Design Patterns book describes 23 patterns arranged into three groups that classify
how the patterns are used.
o Structural Patterns
o Creational Patterns
o Behavioral Patterns
• API are sets of requirements that govern how one application can talk to another.
• An abstract class is a class that contains one or more abstract methods.
• In abstract method and classes for inheritance:
o Includes the method name, the list of arguments, and the return type, without implementing the
method's body.
o Can use the abstract keyword to declare an abstract method.
o Must declare with a class-modifier abstract and provide a template for further development.
• In versioning and version control:
o Version control enables multiple people to simultaneously work on a single project
o The team can roll back to a previous version, reproduce, and understand a bug report on a past version
o It uses a repository, which refers to a database of changes, and a working copy, called checkout where
you do your work
• A feature offered by the firebase:
o Authentication
o Realtime Database
o Crashlytics
• Firebase Cloud Messaging is a service that lets businesses send messages to their users' devices,
• even if they're not using the app.
• Firebase Crashlytics is a service that helps organizations track and fix crashes in their app.
• Firebase Performance Monitoring provides insights into the performance of their app.
• Firebase Test Lab is a cloud-based service that lets developers test their apps on a variety
of devices and configurations.

You might also like