amazon_connect_348_terms_flashcards

(370 cards)

1
Q

Term

A

Definition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Amazon Connect

A

Cloud-based omnichannel contact center service from AWS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Contact Flow

A

Visual workflow that defines customer experience

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Contact vs Case

A

Contact = single interaction; Case = record tracking issue over time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CCP (Contact Control Panel)

A

Interface agents use to handle contacts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Routing Profile

A

Assigns queues and priorities to agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Contact Lens

A

AI-powered analytics with transcription and sentiment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Contact Queue

A

Waiting area that holds contacts for agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Quick Connect

A

Saved transfer targets (agents, queues, numbers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Transfer Flow

A

Flow that runs during transfers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Whisper Flow

A

Flow that plays just before agent and customer connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hold Flow

A

Flow that runs while contact is on hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CTR (Contact Trace Record)

A

Record with metadata, metrics, and recording links

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IVR (Interactive Voice Response)

A

Phone menu that routes callers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attribute

A

Named data field (key-value pair) on contact/user/resource

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DTMF

A

Dual Tone Multi Frequency, touch tone digits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Amazon Lex

A

Bot service using intents, utterances, and slots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Amazon Polly

A

Text-to-speech service with SSML control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Amazon Kendra

A

Enterprise search with natural language questions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Amazon Q in Connect

A

AI assistant for agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AWS Lambda

A

Serverless compute that runs code on events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

API Gateway

A

Managed service for creating and managing APIs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

S3 (Simple Storage Service)

A

Object storage service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Bucket

A

Container for objects in S3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Object
Individual file stored in S3
26
Versioning
Keeping multiple versions of objects
27
Lifecycle Policy
Automated rules for moving/deleting objects
28
DynamoDB
Serverless NoSQL database from AWS
29
GSI (Global Secondary Index)
Index with independent partition key
30
RDS (Relational Database Service)
Managed relational database service
31
Aurora
AWS fully managed relational database compatible with MySQL and PostgreSQL
32
ElastiCache
In-memory caching service supporting Redis and Memcached
33
Redis
In-memory data structure store used as database, cache, and message broker
34
Memcached
High-performance distributed memory caching system
35
EC2 (Elastic Compute Cloud)
Virtual servers in cloud
36
AMI (Amazon Machine Image)
Template for EC2 instances
37
Instance Type
Size and capability of virtual server
38
ECS (Elastic Container Service)
Container orchestration service for Docker
39
ECR (Elastic Container Registry)
Docker container image registry
40
Amazon Kinesis
AWS streaming service for real-time data
41
Amazon SQS
Simple Queue Service for managed message queues
42
DLQ (Dead Letter Queue)
Queue for failed messages after retries
43
SNS (Simple Notification Service)
Pub/sub messaging service for notifications
44
Step Functions
Serverless workflow orchestration service
45
State Machine
Step Functions workflow definition with states and transitions
46
Athena
Serverless SQL query service for S3 data
47
Glue
ETL service for data preparation and transformation
48
EMR (Elastic MapReduce)
Managed big data processing with Hadoop/Spark
49
SES (Simple Email Service)
Email sending and receiving service
50
Pinpoint
Customer engagement and messaging service
51
Cognito
User authentication and authorization service
52
Amplify
Full-stack development platform for web and mobile apps
53
AppSync
Managed GraphQL service for real-time data
54
CloudFormation
Infrastructure as code for AWS resources
55
Systems Manager
AWS service for managing infrastructure
56
Parameter Store
Secure storage for configuration and secrets
57
IAM (Identity and Access Management)
Service managing access to AWS resources
58
IAM User
Identity representing person or application
59
IAM Role
Set of permissions assumed temporarily
60
IAM Policy
Document defining permissions - This user can do this but can't do this
61
ARN (Amazon Resource Name)
Unique identifier for AWS resources
62
Principal
Entity making request (user, role, service)
63
Resource
AWS entity being accessed
64
Action
Specific operation being performed
65
Effect
Allow or Deny in IAM policy
66
Condition
Circumstances when policy applies
67
MFA (Multi-Factor Authentication)
Two or more verification methods
68
Access Keys
Credentials for programmatic access
69
Least Privilege
Granting minimum permissions necessary
70
Encryption
Reversible transformation of data using a key for confidentiality
71
Hash
Fixed-length output of a one-way hashing algorithm
72
Encryption at Rest
Data encrypted when stored
73
Encryption in Transit
Data encrypted while moving
74
KMS (Key Management Service)
Managed service for creating and controlling encryption keys
75
Secrets Manager
Service for storing and rotating secrets
76
Certificate Manager (ACM)
Provisions and manages SSL/TLS certificates
77
VPC (Virtual Private Cloud)
Isolated network in AWS cloud
78
Subnet
Range of IP addresses in VPC
79
CIDR (Classless Inter-Domain Routing)
Method for allocating IP addresses and routing
80
Security Group
Virtual firewall controlling inbound and outbound traffic for resources
81
NACL (Network Access Control List)
Firewall at subnet level controlling traffic
82
Internet Gateway
Allows communication between VPC and internet
83
NAT Gateway
Enables instances in private subnet to connect to internet
84
VPC Endpoint
Private connection between VPC and AWS services
85
PrivateLink
Private connectivity between VPCs and AWS services
86
Peering
Networking connection between two VPCs
87
Transit Gateway
Central hub for connecting VPCs and on-premises networks
88
VPN (Virtual Private Network)
Encrypted connection over internet between networks
89
Direct Connect
Dedicated network connection from on-premises to AWS
90
DNS
Translates domain names to IP addresses
91
IP Address
Unique network identifier for a device (IPv4 and IPv6)
92
Port
Numerical endpoint for network communication
93
Route 53
AWS scalable DNS and domain name registration service
94
Elastic IP
Static IPv4 address designed for dynamic cloud computing
95
CDN (Content Delivery Network)
Distributed network of servers delivering content based on geographic location
96
CloudFront
AWS content delivery network service
97
Edge Location
Cache location for content delivery
98
Load Balancer
Distributes incoming traffic across multiple targets
99
Region
Geographic area with multiple Availability Zones
100
Availability Zone (AZ)
Isolated data center within region
101
High Availability (HA)
System remains operational with minimal downtime
102
CORS
Cross-Origin Resource Sharing using HTTP headers
103
WAF (Web Application Firewall)
Firewall filtering HTTP/HTTPS requests
104
Shield
Managed DDoS protection service
105
Latency
Time from request to response
106
CloudWatch
Monitoring and observability service for metrics, logs, and alarms
107
Metric
Quantifiable measurement tracked over time
108
Logging
Recording application events for debugging and monitoring
109
CloudTrail
Records AWS API calls and account activity
110
Config
Service that tracks resource configurations and changes
111
GuardDuty
Threat detection service monitoring for malicious activity
112
Inspector
Automated vulnerability scanning service
113
Database
Persistent data store for access and updates
114
Relational Database
Data organized in related tables with foreign keys
115
NoSQL
Non-relational database (DynamoDB is NoSQL)
116
Schema
Structure of a database table
117
Primary Key
Unique identifier for a database record
118
Foreign Key
Column referencing primary key in another table
119
Composite Key
Primary key consisting of multiple columns
120
Relational Table
Join table with composite key of foreign keys
121
Index (database)
Data structure improving query speed
122
SQL
Language to interact with relational databases
123
DML (Data Manipulation Language)
SQL commands: INSERT, SELECT, UPDATE, DELETE
124
Query Parameters
Key-value pairs in URL after question mark
125
Transaction
Group of operations as one unit (all or nothing)
126
Normalization
Organizing database to reduce redundancy
127
Denormalization
Adding redundancy to improve read performance
128
ACID
Atomicity, Consistency, Isolation, Durability (database properties)
129
BASE
Basically Available, Soft state, Eventual consistency (NoSQL properties)
130
CAP Theorem
System can have only 2 of 3: Consistency, Availability, Partition tolerance
131
Eventual Consistency
Data becomes consistent over time, not immediately
132
Strong Consistency
All reads return most recent write immediately
133
Replication
Copying data across multiple databases/servers
134
Sharding
Partitioning database horizontally across multiple servers
135
Partitioning
Dividing database into smaller pieces
136
Backup
Copy of data for recovery purposes
137
API (Application Programming Interface)
Way for software to communicate
138
REST API
API using HTTP methods for operations
139
API Gateway
Managed service for creating and managing APIs
140
Endpoint
Specific URL where API is accessed
141
Webhook
HTTP callback sent when an event occurs
142
CRUD
Create, Read, Update, Delete operations
143
Payload
Body data of a request or response
144
HTTP Status Codes
1xx info, 2xx success, 3xx redirect, 4xx client error, 5xx server error
145
Authentication
Verify identity (WHO are you?)
146
Authorization
Grant or deny permissions (WHAT can you do?)
147
API Key
Secret token for API authentication
148
GraphQL
Query language for APIs with strongly-typed schema
149
WebSocket
Full-duplex communication protocol over single connection
150
gRPC
High-performance RPC framework using Protocol Buffers
151
SOAP
XML-based messaging protocol for web services
152
JSON
JavaScript Object Notation, text format for data exchange
153
XML
Extensible Markup Language for structured data
154
YAML
Human-readable data serialization format
155
Base64
Binary-to-text encoding scheme
156
UTF-8
Unicode character encoding standard
157
ASCII
American Standard Code for Information Interchange
158
Encoding
Converting data from one format to another
159
Serialization
Converting object to storable/transmittable format
160
Deserialization
Converting stored format back to object
161
Parsing
Analyzing and converting data from one format to structured format
162
Regular Expression (Regex)
Pattern matching for text manipulation
163
Variable
Named storage location for data
164
Function
Reusable unit of code
165
Parameter
Variable in method signature
166
Argument
Value passed to a function at runtime
167
String
Data type for text (characters in quotes)
168
Boolean
Data type with two values: true or false
169
Null
Intentional absence of value
170
Array
List data structure
171
Object
Collection of key-value pairs (or instance of a class)
172
Key-Value Pair
Key (identifier) mapped to value (data)
173
Loop
Repeated process or traversal
174
Iterator
Object that steps through a collection
175
Concatenation
Join values together
176
Casting
Convert one data type to another
177
Callback Function
Function passed as argument and invoked later
178
Constant
Variable whose value cannot be changed
179
Scope
Region where variable is accessible
180
Immutable
Object whose state cannot be modified after creation
181
Mutable
Object whose state can be changed after creation
182
Closure
Function with access to outer function's variables
183
Higher-Order Function
Function taking or returning other functions
184
Pure Function
Function with no side effects, same input = same output
185
Side Effect
Function modifying state outside its scope
186
Recursion
Function calling itself
187
Iteration
Repeating process using loops
188
Node.js
JavaScript runtime for server-side execution
189
Python
High-level interpreted programming language
190
JavaScript
Programming language for web browsers and Node.js
191
TypeScript
Typed superset of JavaScript that compiles to JavaScript
192
Java
Object-oriented programming language running on JVM
193
Go (Golang)
Compiled programming language from Google
194
Bash
Unix shell and command language
195
Shell Script
Automated commands in shell language
196
PowerShell
Task automation framework from Microsoft
197
Runtime
Environment where code executes
198
Compiler
Translates source code to machine code before execution
199
Interpreter
Executes code line-by-line at runtime
200
Object-Oriented Programming (OOP)
Paradigm organizing code around objects
201
Class
Blueprint for creating objects with properties and methods
202
Inheritance
Child class inherits from parent, can override or reuse
203
Polymorphism
One interface with many implementations
204
Encapsulation
Wrap data and code in one unit with controlled access
205
Functional Programming
Paradigm treating computation as function evaluation
206
Procedural Programming
Paradigm based on procedure calls
207
Declarative Programming
Describing what to do, not how
208
Imperative Programming
Describing how to do it step-by-step
209
Design Pattern
Reusable solution to common problem
210
Singleton
Pattern ensuring class has only one instance
211
Factory Pattern
Pattern for creating objects without specifying class
212
Observer Pattern
Pattern where object notifies dependents of changes
213
Version Control
System tracking file changes over time (Git)
214
Repository
Storage location for code and version history
215
Branch
Parallel version of code in repository
216
Commit
Snapshot of changes saved to repository
217
Push
Upload local commits to remote repository
218
Pull
Download changes from remote repository
219
Merge
Combine changes from different branches
220
Pull Request (PR)
Request to merge changes from one branch to another
221
Fork
Copy of repository under your account
222
Clone
Local copy of remote repository
223
GitHub
Git hosting platform with collaboration features
224
GitLab
Git repository manager with CI/CD
225
Bitbucket
Git repository hosting service from Atlassian
226
Merge Conflict
Conflicting changes in same file requiring manual resolution
227
Rebase
Reapply commits on top of another branch
228
Cherry-pick
Apply specific commit from one branch to another
229
Stash
Temporarily save uncommitted changes
230
Tag
Named reference to specific commit (often for releases)
231
Release
Packaged version of software for distribution
232
Semantic Versioning
Version numbering scheme (MAJOR.MINOR.PATCH)
233
Breaking Change
Change that breaks backward compatibility
234
Backward Compatibility
New version works with old code/data
235
CI/CD
Continuous Integration and Continuous Deployment
236
Deployment
Release code/config to production environment
237
Infrastructure as Code (IaC)
Managing infrastructure through code
238
Terraform
Open-source IaC tool
239
Stack
Collection of AWS resources managed as single unit
240
Template
JSON/YAML file defining infrastructure
241
Environment
Context where code runs (dev, staging, production)
242
Environment Variable
Runtime configuration outside code
243
Blue-Green Deployment
Two identical environments, switch between them
244
Canary Deployment
Gradual rollout to subset of users
245
Rolling Deployment
Sequential update of instances
246
Feature Flag
Toggle for enabling/disabling features
247
A/B Testing
Comparing two versions with different user groups
248
Maintenance Window
Scheduled time for system maintenance
249
Uptime
Time system is operational and available
250
Downtime
Time system is unavailable
251
Bug
Error or flaw in code causing incorrect behavior
252
Debugging
Process of finding and fixing bugs
253
Breakpoint
Marker stopping code execution for inspection
254
Stack Trace
Report of active function calls when error occurred
255
Exception
Error condition disrupting normal program flow
256
Error Handling
Managing errors gracefully without crashing
257
Try-Catch
Block catching and handling exceptions
258
Throw
Explicitly raise an exception
259
Finally
Block that always executes after try-catch
260
Regression
Bug introduced by recent code changes
261
Validation
Checks to catch potential errors before processing
262
Forward Compatibility
Old version works with new code/data
263
Mock
Fake object simulating real object for testing
264
Stub
Minimal implementation providing predefined responses
265
Spy
Wrapper recording interactions for verification
266
Asynchronous
Work that runs without waiting for immediate result
267
Synchronous
Work that runs step by step, waits for each result
268
Promise
Object representing eventual completion/failure of async operation
269
Async/Await
Syntax for handling asynchronous operations
270
Event Loop
Mechanism handling asynchronous callbacks
271
Event
Notification that something happened, triggering actions
272
Event-Driven Architecture
Design where events trigger async processing
273
Concurrency
Multiple tasks making progress in overlapping time periods
274
Parallelism
Multiple tasks executing simultaneously
275
Thread
Smallest unit of execution within process
276
Process
Instance of executing program with own memory
277
Serverless
No infrastructure management, cloud provider handles servers
278
Memory Leak
Allocated memory not released, causing gradual consumption
279
Garbage Collection
Automatic memory management reclaiming unused memory
280
Heap
Memory region for dynamic allocation
281
Stack (memory)
Memory region for function calls and local variables
282
Pointer
Variable storing memory address of another variable
283
Reference
Alias to existing variable
284
Mutex
Mutual exclusion lock preventing concurrent access
285
Semaphore
Signaling mechanism controlling access to shared resource
286
Race Condition
Bug where timing of events affects correctness
287
Deadlock
Two or more processes waiting for each other indefinitely
288
Timeout
Maximum duration before operation stops
289
Throttling
Limiting request rate to prevent system overload
290
Caching
Storing data temporarily for fast repeated access
291
Scalability
Ability to handle increased load by adding/removing resources
292
Algorithm
Step-by-step procedure for solving problem
293
Data Structure
Format for organizing and storing data
294
Linked List
Sequential data structure with nodes pointing to next
295
Stack (data structure)
LIFO (Last In First Out) data structure
296
Queue
FIFO (First In First Out) data structure
297
Tree
Hierarchical data structure with root and branches
298
Binary Tree
Tree where each node has at most two children
299
Graph
Network of nodes connected by edges
300
Hash Table
Data structure mapping keys to values via hash function
301
Set
Collection of unique elements
302
Map
Collection of key-value pairs
303
Tuple
Immutable ordered collection of elements
304
Dictionary
Collection of key-value pairs (Python)
305
Big O Notation
Describes algorithm time/space complexity growth
306
Time Complexity
Amount of time algorithm takes relative to input size
307
Space Complexity
Amount of memory algorithm uses relative to input size
308
Binary Search
Search algorithm dividing sorted array in half
309
Linear Search
Search algorithm checking each element sequentially
310
Sorting
Arranging elements in order
311
Traversal
Visiting all nodes in data structure
312
Docker
Platform for building, shipping, and running containerized applications
313
Container
Lightweight, standalone package containing application and dependencies
314
Kubernetes
Open-source container orchestration platform
315
Microservices
Architectural style where application is collection of small, independent services
316
Monolith
Single-tiered application where all components are interconnected and interdependent
317
Dependency
External code/library your project requires
318
Package Manager
Tool for installing and managing dependencies
319
npm
Node Package Manager for JavaScript/Node.js
320
pip
Package installer for Python
321
Virtual Environment
Isolated Python environment with specific package versions
322
Service-Oriented Architecture (SOA)
Architecture where services communicate over network
323
MVC (Model-View-Controller)
Architectural pattern separating concerns
324
Dependency Injection
Providing dependencies from outside rather than creating internally
325
Inversion of Control
Framework controls program flow, not application
326
Module
Self-contained units of code you import
327
Middleware
Code that runs between request receipt and response
328
Idempotent
Repeated calls have same effect as one call
329
Failover
Automatic switch from failed primary to backup system
330
Auto Scaling
Automatically adjusts number of resources based on demand
331
EventBridge
Serverless event bus routing events between services
332
SDK (Software Development Kit)
Pre-built libraries for AWS services
333
PATH
Environment variable defining executable search directories
334
Restore
Recovering data from backup
335
Snapshot
Point-in-time copy of data
336
Point-in-Time Recovery
Restore to specific moment in past
337
Disaster Recovery (DR)
Process of restoring operations after catastrophic failure
338
RTO (Recovery Time Objective)
Maximum acceptable downtime
339
RPO (Recovery Point Objective)
Maximum acceptable data loss
340
SLA (Service Level Agreement)
Commitment defining service expectations
341
SLO (Service Level Objective)
Specific measurable target in SLA
342
SLI (Service Level Indicator)
Metric measuring service level
343
Load Testing
Testing system under expected load
344
Stress Testing
Testing system beyond normal capacity
345
Unit Test
Test of individual component in isolation
346
Integration Test
Test of multiple components together
347
End-to-End Test
Test of complete user workflow
348
Smoke Test
Basic test verifying critical functionality
349
Regression Test
Test ensuring changes didn't break existing features
350
Test Coverage
Percentage of code tested
351
Test-Driven Development (TDD)
Write tests before implementation
352
Behavior-Driven Development (BDD)
Testing based on expected behavior
353
Code Review
Systematic examination of code by peers
354
Pair Programming
Two developers working together on same code
355
Refactoring
Restructuring code without changing behavior
356
Technical Debt
Future cost of quick/easy solutions now
357
Code Smell
Symptom of deeper problem in code
358
SOLID Principles
Five object-oriented design principles
359
DRY (Don't Repeat Yourself)
Principle avoiding code duplication
360
KISS (Keep It Simple Stupid)
Principle favoring simplicity
361
YAGNI (You Aren't Gonna Need It)
Principle avoiding premature features
362
Code Optimization
Improving code performance
363
Profiling
Analyzing code to identify performance bottlenecks
364
Benchmarking
Measuring and comparing performance
365
Macie
Data discovery and protection service for sensitive data
366
Bubble Sort
Simple sorting comparing adjacent elements
367
Quick Sort
Efficient divide-and-conquer sorting
368
Merge Sort
Divide-and-conquer sorting merging sorted halves
369
DFS (Depth-First Search)
Graph traversal exploring deep before backtracking
370
BFS (Breadth-First Search)
Graph traversal exploring level by level