- 1. is the process of connecting different computing systems, applications, and software so that they can work together as a coordinated whole.
A) Data Integration B) e-commerce platform C) System Integration
- 2. A company’s Sales System, Inventory System, and Accounting System share data automatically so that when a product is sold, inventory updates and accounting records are adjusted instantly. is an example of
A) System Integration B) Application Integration C) Enterprise Integration
- 3. What is one common problem organizations face without integration?
A) Slow processes B) Manual updates C) Data duplication
- 4. Which of the following is a benefit of integration?
A) Automated tasks B) More manual work C) Increased errors
- 5. How does integration improve accuracy?
A) Through real-time, consistent data B) By adding more systems C) By increasing manual input
- 6. What happens to processes in an organization that lacks integration?
A) They slow down B) They operate in real time C) They fully automate
- 7. Which benefit of integration helps departments work together smoothly?
A) Manual data entry B) System isolation C) Collaboration
- 8. What is a common issue when data is stored in separate systems?
A) Unified data B) Automated processes C) Data duplication
- 9. It is the process of connecting different computing systems so they can work together as one coordinated whole.
A) System Automation B) System Integration C) Digital Processing
- 10. This integration technology uses HTTP, is lightweight, and is widely used in modern applications.
A) REST B) WSDL C) XML-RPC
- 11. A technology that acts as a “bridge” connecting different systems or databases.
A) Middleware B) Firewall C) Switch
- 12. Which integration tool extracts data from a source, transforms it, and loads it into a data warehouse?
A) REST API B) Load Balancer C) ETL Tool
- 13. A central communication backbone that routes, transforms, and manages messages between systems.
A) Data Hub B) Switchboard C) Enterprise Service Bus (ESB)
- 14. This web service protocol is XML-based, secure, but more complex.
A) JSON B) SOAP C) REST
- 15. Tool used to create, secure, publish, and monitor APIs.
A) Compiler B) API Management Tool C) CDN
- 16. A cloud-based integration platform that allows connecting apps without coding.
A) Zapier B) BIOS C) Visual Basic
- 17. Microsoft’s integration tool used to manage enterprise data workflows (part of SQL Server).
A) OneDrive B) MS DOS C) SSIS
- 18. Technology that allows systems to communicate over the internet using standardized protocols.
A) Hypervisor B) Router C) Web Services
- 19. This integration approach reduces errors by enabling real-time, consistent data sharing between systems.
A) System Integration B) Web Caching C) Virtualization
- 20. Example of an API management tool.
A) Oracle Java B) WinRAR C) Postman
- 21. A platform used for message brokering in middleware.
A) VLC B) Windows Media Player C) MuleSoft
- 22. This challenge occurs when systems cannot easily exchange data due to different formats or vendor technologies.
A) Port Forwarding B) System Compatibility Issue C) Network Cabling Fault
- 23. It ensures that data passed during integration is safe through authentication, encryption, and access control.
A) Data Typing B) Data Sorting C) Data Security
- 24. This technologies are frameworks and standards that make systems work together smoothly.
A) Web Services B) Integration Technologies C) Middleware
- 25. is a central communication backbone that allows different applications to interact through a unified bus system.
A) Enterprise Service Bus (ESB) B) Middleware C) API Management Tools
- 26. Apache Camel, Mule ESB, WSO2 ESB is an example of
A) API Management Tools B) Enterprise Service Bus (ESB) C) Middleware
- 27. Used to create, secure, and monitor APIs that connect systems.
A) API Management Tools B) ETL (Extract, Transform, Load) Tools C) Cloud-Based Integration Tools
- 28. Used in data integration — extract data from sources, transform it, and load into a data warehouse.
A) ETL (Extract, Transform, Load) Tools B) API Management Tools C) Cloud-Based Integration Tools
- 29. Allow integration of cloud apps and on-premise systems.
A) Cloud-Based Integration Tools B) ETL (Extract, Transform, Load) Tools C) API Management Tools
- 30. CRM connected with email automation tools
A) Enterprise Integration B) Data Integration C) Application Integration
- 31. the process of combining data from different sources to provide a unified view.
A) Data Processing B) Data Migration C) Data Integration
- 32. The process of moving data from one system to another is known as:
A) Data Cleaning B) Data Migration C) Data Conversion
- 33. When a university combines enrollment, LMS, and library data into a single dashboard, this is an example of:
A) Data Synchronization B) Application Migration C) Data Integration
- 34. Migrating data from MySQL to Azure SQL Database is an example of:
A) Business Process Migration B) Format Migration C) Database Migration
- 35. Which type of data integration involves humans manually copying or importing CSV files?
A) Common Storage Integration B) Middleware-Based Integration C) Manual Data Integration
- 36. Which integration approach uses APIs, webhooks, or microservices to exchange data?
A) Storage Integration B) Application-Based Integration C) Middleware-Based Integration
- 37. A reporting tool that reads data directly from multiple databases without copying it uses:
A) Database Federation B) Uniform Data Access Integration C) Cloud Migration
- 38. Which widely used model copies data from different sources into a central repository like a data warehouse?
A) Uniform Data Access B) Common Storage Integration C) Distributed Storage
- 39. Moving data from local disk storage to cloud storage is an example of:
A) Storage Migration B) Cloud Transformation C) System Upgrade
- 40. Migrating from an on-premise ERP to SAP S/4HANA Cloud is what type of migration?
A) Business Process Migration B) Database Migration C) Application Migration
- 41. The ETL process performs transformations at what stage?
A) Before loading B) After loading C) During mapping
- 42. Which ETL/ELT tool is commonly used in cloud-based transformations?
A) MySQL Workbench B) AWS Glue C) NetBeans
- 43. Duplicate records, incomplete data, and wrong formats are examples of:
A) Data Quality Issues B) Schema Mismatch C) Integration Errors
- 44. Matching fields such as student_fname → first_name refers to:
A) Data Warehousing B) Data Mapping C) Data Profiling
- 45. Which real-world example involves integrating payment gateways, inventory systems, and delivery partners?
A) University Enrollment Systems B) Government Portals C) E-commerce Platforms
- 46. Moving data from MySQL (local server) to Azure SQL Database (cloud). is an example of
A) Application-Based Integration B) Data Migration C) Data Integration
- 47. Company merges and adopts new HR and payroll systems.
A) Cloud Migration B) Application Migration C) Business Process Migration
- 48. What security threat occurs when a hacker intercepts data traveling between integrated systems?
A) Injection Attack B) API Rate Limiting C) Man-in-the-Middle (MITM) Attack
- 49. Which core security control verifies who is trying to access a system?
A) Authentication B) Logging C) Authorization
- 50. Which compliance standard protects the personal data of EU citizens
A) Data Privacy Act of 2012 B) GDPR C) HIPAA
- 51. What security mechanism protects data so that only authorized systems can read it, either in transit or at rest?
A) Encryption B) Logging and Monitoring C) API Gateway
- 52. Which integration architecture model follows the principle “Never trust, always verify”?
A) Firewall Filtering B) Message Queue C) Zero Trust Architecture
- 53. exposed publicly without proper security can be exploited.
A) Data Leakage B) Man-in-the-Middle Attacks (MITM) C) API Attacks
- 54. Weak authentication lets attackers enter integrated systems.
A) Misconfigured Cloud Components B) Injection Attacks C) Unauthorized Access
- 55. Sensitive data transferred without encryption gets exposed.
A) API Attacks B) Injection Attacks C) Data Leakage
- 56. Malicious data sent through APIs or middleware to corrupt systems.
A) Injection Attacks B) API Attacks C) Misconfigured Cloud Components
- 57. Cloud-based integrations left public accidentally.
A) Injection Attacks B) Misconfigured Cloud Components C) Data Leakage
- 58. 4111-1111-1111-1234 → --****-1234
A) Logging and Monitoring B) Data Masking and Tokenization C) API Security
- 59. Protects personal data of Filipinos.
A) ISO 27001 B) Data Privacy Act 2012 C) HIPAA
- 60. Protects confidential health information.
A) ISO 27001 B) HIPAA C) Data Privacy Act 2012
- 61. Framework for managing information security.
A) Data Privacy Act 2012 B) ISO 27001 C) HIPAA
- 62. is the blueprint that outlines how different software applications, systems, and data sources within an organization are connected to work together.
A) N-tier Architecture B) Integration Architecture C) Monolith Architecture
- 63. All-in-one system, single codebase
A) Monolithic Architecture B) N-tier Architecture C) Integration Architecture
- 64. Online banking apps connecting to bank servers
A) N-tier Architecture B) Monolithic Architecture C) Client-Server Model
- 65. Clients request services from a central server
A) N-tier Architecture B) Client-Server Model C) Monolithic Architecture
- 66. Web app (React frontend → Node.js backend → MySQL database)
A) Client-Server Model B) Monolithic Architecture C) N-tier Architecture
- 67. Multi-layer system (presentation, business logic, database)
A) N-tier Architecture B) Client-Server Model C) Monolithic Architecture
- 68. Systems built from independent services
A) Service-Oriented Architecture B) Client-Server Model C) Monolithic Architecture
- 69. Small, independent services communicating via APIs
A) Microservices B) Client-Server Model C) Service-Oriented Architecture
- 70. software layer between OS and applications.
A) Middleware B) Microservices C) Data Translation
- 71. •Converts data formats between different systems.
A) Authentication & Authorization B) Data Translation C) Messaging Services
- 72. a set of rules that allow different software applications to communicate with each other
A) GDPR B) API C) REST
- 73. also called Web Services is an extensively used API over the web and can be easily accessed using the HTTP protocols.
A) WEB API B) REST C) API
- 74. In this type of API, the programmers get the local middleware services.
A) LOCAL API B) API C) WEB API
- 75. It makes a remote program appear to be local by making use of RPCs (Remote Procedural Calls).
A) API B) WEB API C) PROGRAM API
- 76. All systems working together (payment, inventory, shipping) to complete a transaction is an example of:
A) System Integration B) System Isolation C) Manual Processing
- 77. Bank-to-bank communication.
A) REST B) SOAP
- 78. Simplifies complex integrations by routing, transforming, and managing messages.
A) Middleware B) WEB services C) ESB
- 79. Talend, Informatica, Microsoft SSIS, Pentaho are examples of
A) ESB B) ETL
- 80. Postman, Apigee (Google), Kong, AWS API Gateway are examples of
A) ETL B) ESB C) API Management Tools
|