A service agent has a technical contract that allows it to be explicitly invoked by service consumer programs.
A. True
B. False
Which of the following functions would not be suitable for a typical service agent?
A. event logging
B. message routing
C. complex Web service composition
D. error logging
The use of service agents will affect the design of service compositions as follows:
A. it will tend to increase the number of required services
B. it will tend to decrease the number of required services
C. it will tend to increase the number of required service compositions
D. it will tend to decrease the number of required service compositions
Which of the following patterns may also require the application of the Service Agent pattern?
A. Reliable Messaging
B. Asynchronous Queuing
C. Intermediate Routing
D. Policy Centralization
The application of the Redundant Implementation pattern can help increase service availability by establishing a duplicate deployment of a service in order to provide failover support.
A. True
B. False
The application of the Intermediate Routing pattern relies on the use of service agents. In order for the pattern to be applied properly, these service agents must be active in that they must change data within the message as part of their routing functionality.
A. True
B. False
Which of the following statements is true?
A. A compensating service transaction always exists within the scope of an atomic service transaction.
B. The application of the Compensating Service Transaction pattern relies heavily upon an underlying database that supports the rollback of changes.
C. A compensating service transaction is only used in situations where the rollback of changes across services needs to be guaranteed.
D. None of these statements are true.
The WS-BPEL technology can be used when applying the Compensating Service Transaction pattern.
A. True
B. False
Which of the following represent common types of logic that can be placed within a service fa?ade component?
A. Behavior correction logic used to compensate for changes in the behavior of the core service logic.
B. Protocol bridging logic that dynamically converts from one transport protocol to another at runtime.
C. Relaying logic that simply relays input and output messages to and from the core service logic.
D. Transformation logic that performs runtime data model or data format conversion.
Legacy systems often rely upon a combination of proprietary data models, proprietary data formats, and proprietary transport protocols. For this reason the Legacy Wrapper pattern is often used together with which of the following patterns?
A. Atomic Service Transaction
B. Service Messaging
C. Service Broker
D. Messaging Metadata