Question

Briefly describe what you understand by the following five terms, Middleware , Complementary Investments, Agile Methodologies,...

Briefly describe what you understand by the following five terms, Middleware , Complementary Investments, Agile Methodologies, RDBMS and Malware

0 0
Add a comment Improve this question Transcribed image text
Answer #1

i)Middleware:  

Middleware is software which lies between an operating system and the applications running on it. Essentially functioning as hidden translation layer, middleware enables communication and data management for distributed applications. It is sometimes called plumbing, as it connects two applications together so data and databases can be easily passed between the "pipe"Using middleware allows users to perform such requests as submitting forms on a web browser or allowing the web server to return dynamic web pages based on a user's profile.

Common middleware examples include database middleware, application server middleware, message-oriented middleware, web middleware and transaction-processing monitors. Each programme typically provides messaging services so that different applications can communicate using messaging frameworks like simple object access protocol (SOAP), web services, representational state transfer (REST) and JavaScript object notation (JSON). While all middleware performs communication functions, the type a company chooses to use will depend on what service is being used and what type of information needs to be communicated. This can include security authentication, transaction management, message queues, applications servers, web servers and directories. Middleware can also be used for distributed processing with actions occurring in real time rather than sending data back and forth.

ii)complementary investment:

Complementary investment is a sum of money provided to a company to further its business objectives. The term also can refer to a company's acquisition of long-term assets such as real estate, manufacturing plants, and machinery.

how it works:

    An individual, a venture capital group, or a financial institution may make a capital investment in a business. A sum of money is handed over as a loan or in return for a promise of repayment or a share of the profits down the road. In this sense of the word, capital means cash.
    The executives of a company may make a complementary investment in the business. They buy long-term assets that will help the company run more efficiently or grow faster. In this sense, capital means physical assets.

iii)Agile methologies:

  


Agile methodology is a type of project management process, mainly used for software development, where demands and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customers.

Stemming from the values and principles of the Agile Manifesto, it was created as a response to the inadequacies of traditional development methods such as the Waterfall method. The software industry is a highly competitive market due to the fact that software is something that can be continuously upgraded. This means that developers need to constantly improve and innovate their products to keep on top of the game — and the linear, sequential approach of the Waterfall method just wasn’t cutting it.

iv)RDBMS :

RDBMS Stands for "Relational Database Management System." An RDBMS is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.

A relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.

While a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values. An RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some RDMBS programs allow you to create forms that can streamline entering, editing, and deleting data.

Most well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.

Examples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.

v)Malware:

Malware is short for “malicious software” - computer programs designed to infiltrate and damage computers without the users consent. “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on.

Different types of malware::
The term malware includes viruses, worms, Trojan Horses, rootkits, spyware, keyloggers and more. To get an overview of the difference between all these types of threats and the way they work, it makes sense to divide them into group


Viruses and worms :
Viruses and worms are defined by their behaviour – malicious software designed to spread without the user’s knowledge. A virus infects legitimate software and when this software is used by the computer owner it spreads the virus – so viruses need you to act before they can spread. Computer worms, on the other hand, spread without user action. Both viruses and worms can carry a so-called “payload” – malicious code designed to do damage.


Trojans:
Trojans are grouped together as they both seek to conceal attacks on computers. Trojan Horses are malignant pieces of software pretending to be benign applications. Users therefore download them thinking they will get a useful piece of software and instead end up with a malware infected computer.

Spyware:
Spyware are malware used in malicious attacks like identity theft, phishing and social engineering - threats designed to steal money from unknowing computer users, businesses and banks.

The latest security reports for the first quarter of 2011 put Trojan infections at the top of the malware list, with more than 70% of all malicious files detected on computer systems, followed by the traditional viruses and worms.

The popularity of rogue antiviruses has been decreasing over the end of 2010 and beginning of 2011, but the number of downloader Trojans significantly increased. The detection rates of new malware have increased 15% in the first quarter of 2011 compared to the last quarter of 2010.

  

Add a comment
Know the answer?
Add Answer to:
Briefly describe what you understand by the following five terms, Middleware , Complementary Investments, Agile Methodologies,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT