Briefly describe what you understand by the following five terms, Middleware , Complementary Investments, Agile Methodologies, RDBMS and Malware
i)Middleware:
Middleware is software which lies between an operating system and the applications running on it. Essentially functioning as hidden translation layer, middleware enables communication and data management for distributed applications. It is sometimes called plumbing, as it connects two applications together so data and databases can be easily passed between the "pipe"Using middleware allows users to perform such requests as submitting forms on a web browser or allowing the web server to return dynamic web pages based on a user's profile.
Common middleware examples include database middleware, application server middleware, message-oriented middleware, web middleware and transaction-processing monitors. Each programme typically provides messaging services so that different applications can communicate using messaging frameworks like simple object access protocol (SOAP), web services, representational state transfer (REST) and JavaScript object notation (JSON). While all middleware performs communication functions, the type a company chooses to use will depend on what service is being used and what type of information needs to be communicated. This can include security authentication, transaction management, message queues, applications servers, web servers and directories. Middleware can also be used for distributed processing with actions occurring in real time rather than sending data back and forth.
ii)complementary investment:
Complementary investment is a sum of money provided to a company to further its business objectives. The term also can refer to a company's acquisition of long-term assets such as real estate, manufacturing plants, and machinery.
how it works:
An individual, a venture capital group, or a
financial institution may make a capital investment in a business.
A sum of money is handed over as a loan or in return for a promise
of repayment or a share of the profits down the road. In this sense
of the word, capital means cash.
The executives of a company may make a
complementary investment in the business. They buy long-term assets
that will help the company run more efficiently or grow faster. In
this sense, capital means physical assets.
iii)Agile methologies:
Agile methodology is a type of project management process, mainly
used for software development, where demands and solutions evolve
through the collaborative effort of self-organizing and
cross-functional teams and their customers.
Stemming from the values and principles of the Agile Manifesto, it was created as a response to the inadequacies of traditional development methods such as the Waterfall method. The software industry is a highly competitive market due to the fact that software is something that can be continuously upgraded. This means that developers need to constantly improve and innovate their products to keep on top of the game — and the linear, sequential approach of the Waterfall method just wasn’t cutting it.
iv)RDBMS :
RDBMS Stands for "Relational Database Management System." An RDBMS is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.
A relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.
While a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values. An RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some RDMBS programs allow you to create forms that can streamline entering, editing, and deleting data.
Most well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.
Examples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.
v)Malware:
Malware is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.
Different types of malware::
The term malware includes viruses, worms, Trojan Horses, rootkits,
spyware, keyloggers and more. To get an overview of the difference
between all these types of threats and the way they work, it makes
sense to divide them into group
Viruses and worms :
Viruses and worms are defined by their behaviour – malicious
software designed to spread without the user’s knowledge. A virus
infects legitimate software and when this software is used by the
computer owner it spreads the virus – so viruses need you to act
before they can spread. Computer worms, on the other hand, spread
without user action. Both viruses and worms can carry a so-called
“payload” – malicious code designed to do damage.
Trojans:
Trojans are grouped together as they both seek to conceal attacks
on computers. Trojan Horses are malignant pieces of software
pretending to be benign applications. Users therefore download them
thinking they will get a useful piece of software and instead end
up with a malware infected computer.
Spyware:
Spyware are malware used in malicious attacks like identity theft,
phishing and social engineering - threats designed to steal money
from unknowing computer users, businesses and banks.
The latest security reports for the first quarter of 2011 put Trojan infections at the top of the malware list, with more than 70% of all malicious files detected on computer systems, followed by the traditional viruses and worms.
The popularity of rogue antiviruses has been decreasing over the end of 2010 and beginning of 2011, but the number of downloader Trojans significantly increased. The detection rates of new malware have increased 15% in the first quarter of 2011 compared to the last quarter of 2010.
Briefly describe what you understand by the following five terms, Middleware , Complementary Investments, Agile Methodologies,...
What is project management? Briefly describe each of the five process groups. Additionally, what is the SDLC? Describe, compare and contrast the predictive (traditional waterfall) model and the adaptive (agile) model.
Describe what is Client Server Computing ? And Briefly describe the following Client/Server Terminology: A) Application Programming Interface B) Client C) Middleware D) Server E) Relational Database
Define the following terms briefly but with enough detail to convince the instructor that you understand the concept. Use your own words. Terminal Shell Command Command Line Command Line Argument Script
Briefly describe the nature versus nurture debate as you understand it. What is more important nature or nurture? Why? How do you know one is more important?
please help fast and explain thank you 5. Name and briefly describe five fabrication techniques used for plastic polymer. 5. Name and briefly describe five fabrication techniques used for plastic polymer.
Choose an organisation you are familiar with and briefly describe the organisation in terms of: Current products. Current market segments. Three potential new marketing opportunities.
Answer the following questions: a. What event spurred the creation of the SEC? Why was the SEC created? b. What are the five divisions of the SEC? Briefly describe the purpose of each. c. What are the responsibilities of the chief accountant? Answer the following questions: a. What event spurred the creation of the SEC? Why was the SEC created? b. What are the five divisions of the SEC? Briefly describe the purpose of each. c. What are the responsibilities...
What are Animals? 1. List and briefly describe the defining features of animals. Be sure you understand these terms: eukaryote, heterotrophic, multicellular 2. Clearly show how the set of features listed in your answer to question 1 distinguishes animals from bacteria, fungi, plants and protists. 3. Describe the characteristics of true multicellularity in animals. Your answer should include: collagen (what is it, what does it do, etc.), gap junctions vs tight junctions, cell differentiation, totipotency and more. 4. To what...
I. Financial Intermediaries: Briefly describe each of the following financial intermediaries in terms of the way they help issuers raise capital: Commercial Bank Investment Bank Financial Services Company B. In what ways do efficient capital markets help both issuers and investors?
Could you please explain them in your words very shortly to understand logically? Thanks. Briefly describe the applications of the following mathematical tools. Liapunov function Hartman-Grobman Theorem Invariant manifolds The Poincare map Poincare Bendixson Theorem Hopf Bifurcation Theorem w-limit set attractions pitchfork bifurcation invariant stable and unstable manifolds homoclinic orbit unstable periodic orbit period doubling saddle node bifurcation