FUNDAMENTALS OF SOFTWARE
ARCHITECTURE QUESTIONS WITH
DETAILED VERIFIED ANSWERS
Software Architecture Ans: Fundamental organization of a software
system.
Architectural Design Ans: Process of defining system structures and
relationships.
Component Ans: Element implementing a coherent set of functionalities.
Component Interface Ans: Defines how components interact without
implementation details.
Non-functional System Properties Ans: Attributes like performance,
security, and maintainability.
Responsiveness Ans: System returns results in a reasonable time.
Reliability Ans: System features behave as expected by users.
Availability Ans: System delivers services when requested by users.
Security Ans: Protection against unauthorized access and intrusions.
Usability Ans: Ease of access and use of system features.
Maintainability Ans: Ease of updating and adding features to the system.
Resilience Ans: System continues services during partial failures.
Centralized Security Architecture Ans: All information stored in one
secure location.
Distributed Security Architecture Ans: Information stored across multiple
locations for security.
, Page | 2
Multi-database Architecture Ans: Each component has its own database
copy.
Database Reconciliation Ans: Ensures data consistency across multiple
databases.
Architectural Influences Ans: Factors affecting architectural decisions
and design.
Software Reuse Ans: Utilizing existing components to save development
time.
Product Lifetime Ans: Duration for which a product is expected to be
used.
Number of Users Ans: Impacts system performance and scalability
requirements.
Complexity Minimization Ans: Goal to reduce system complexity for
easier management.
Architectural Description Ans: Document outlining critical components
and relationships.
Performance Degradation Ans: Decline in system efficiency under high
user load.
Evolutionary Architecture Ans: Architecture designed to accommodate
future changes.
Critical Components Ans: Essential parts of a system affecting its
operation.
System Usability Ans: User's ability to effectively interact with the
system.
Security Breach Ans: Unauthorized access compromising system
integrity.