0% found this document useful (0 votes)
36 views4 pages

Summary

The document discusses different topics related to software development including programming languages, software development methodologies, databases, big data, security, and cloud computing. It provides information on low-level and high-level programming languages, different types of software development, development frameworks, software testing, database objects and applications, challenges of big data, and concepts of security, threats, and cloud computing models.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views4 pages

Summary

The document discusses different topics related to software development including programming languages, software development methodologies, databases, big data, security, and cloud computing. It provides information on low-level and high-level programming languages, different types of software development, development frameworks, software testing, database objects and applications, challenges of big data, and concepts of security, threats, and cloud computing models.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 7:

The two basic types of programming languages are low-level and high-level languages. Examples of low-
level languages are machine language, assembly languages, and scripting languages.

The low-level languages are so named because of their proximity to the processor. Similarly, high-level
languages are so named because they are further away from the processor. Examples of high-level
languages are Java and VB.NET.

The types of software development are categorized by web development, applications development,
systems development, and embedded systems development.

Software development methodology is described as the processes used in creating software. The
methodologies can either be plan driven or agile; examples include Agile, Rational Unified Process (RUP),
Rapid Application Development (RAD), and Iterative. The one chosen by the development team depends
on the team and the phase of the project in development.

Development frameworks are like templates that developers use to jump-start their development. They
include preestablished code that eliminates mundane tasks that would otherwise need to be coded by
the developer from the start. There are open-source frameworks as well as commercial grade ones. .NET
framework and the PHP development framework are common examples.

Staying current is a challenge for all parties: developers, hiring organizations, and recruiters. As the
challenge deepens for developers and their organizations, recruiters must

Chapter 8:

Software testing is a process of verifying and validating that a software application works in accordance
with documented business specifications and technical requirements and is without defects, bugs,
variances, or errors.

Software bugs are inconsistencies or discrepancies in software causing it to act in a way that was not
included or documented in the specifications or simply to not work properly.

The goal of the software tester is to find bugs, find them as early as possible, and make sure they get
fixed. The software tester’s role is to validate and verify that a software application or process meets the
specific objectives of its intended purpose. The individual filling this role must be very knowledgeable
about the business and technical requirements of a product in order to test it appropriately. Some of the
tools/skills the tester must have may depend on the specific software environment, but the basic skill
sets are the same: writing test plans, finding important defects, and patience when working with
developers.

Types of software testing are classified according to the purpose of the test. Software testing types
include black-box testing, white-box testing, gray-box testing, stress testing, regression testing, and
functional testing.
The two methods of testing are manual and automated testing. Software testers either manually test
with their hands and eyes or write code to perform tests automatically.

Software testing has stages that define the various activities that are performed to start and complete a
software testing cycle. These activities fall into the test planning, test analysis, test design, and
verification categories.

A software development engineer in test (SDET) possesses a combination of software testing and
software development skill sets.

Chapter 9:

Database applications are built based on their need to perform either online transaction processing or
online analytical processing—decision support.

The official database language is SQL, declared to be a standard by ANSI in 1986.

Database objects are the tangible components that make up a database. A few of them are as follows:
o Tables, which contain rows and columns that store the attributes of an item
o Stored procedures, which are programmatic objects that are executed automatically and are used to
validate data, control database access, and return database results
o Views, which are queries that act as filters to an underlying table

Database administrators (DBAs) are different from database engineers (DBEs). The former are engaged
in the administration of the production system, while the latter are developer and write cod using
database syntax.

Chapter 10:

Big data is used to describe collections of data of large volume, great variety, and rapid velocity. Volume
means that the amount or quantity of data is large. Variety means that there are different types or
formats of data. Velocity means that data is arriving at breakneck speeds.

Data growth creates two main challenges: the first is the data storage capacity needed to capture, store,
and analyze the data; the second is the database technology needed to process and analyze the massive
quantities of data.

A driver for creating value from big data is being able to analyze the data.

There is an important difference between traditional database systems and big data systems. Traditional
database technologies are used for managing data stored in relational databases (e.g., Oracle,
MicrosoftSQL Server). Big data is usually managed with nonrelational databases technologies (e.g.,
NoSQL, MongoDB).

Hadoop is an open-source framework for processing, storing, and analyzing massive amounts of
distributed data. Hadoop has two primary functions: storing data and processing data. Storage is
provided by HDFS, and data processing and analysis is performed by MapReduce.

Data science is a term used to describe a combination of statistics, data analysis, machine learning, deep
learning, mathematics, and artificial intelligence. Data science is sometimes known as data-driven
science or the study of data.

Chapter 11:

The basics of information systems security include the protection of hardware, software, data,
procedures, and people in terms of three goals: confidentiality, integrity, and availability.

Confidentiality is the hiding of information and making it available only to authorized persons or systems
that need to know the information.

Integrity in information security refers to the quality of being unaltered, uncorrupted, and whole.
Integrity is intertwined with trustworthiness.

Availability in information security is the requirement for information to be accessible to the user when
it is needed and without delays.

A threat is the potential for an event, incident, or circumstance to have an adverse effect on an
information system.

A vulnerability is a weakness in an information system that can be attacked. An attack is the actual
violation of security. An attack occurs when a vulnerability is successfully exploited.

Chpater 12:

Cloud computing is convenient, on-demand network access to a shared and elastic pool of computing
resources that can be quickly deployed with little management effort.

There are three main cloud services available and three ways that cloud services can be delivered to
users.

Cloud services models are Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure
as a Service (IaaS).

Cloud delivery models are private cloud, public cloud, and hybrid cloud.

Concerns about security, privacy, data ownership, and loss of control are some of the risk factors that
plague the adoption of cloud services.
DevOps is a term that describes the combination of practices and tools in “development” and
“operations”—that is, software development and IT operations. DevOps practices include continuous
integration, continuous delivery, infrastructure as code, configuration management, and automation.

You might also like