Chapter 7: Database Management

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

fat client

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions.

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

API

ODBC (Open Database Connectivity)

An interface for accessing database management systems that can be ported to other systems by using a driver.

All of the following are additional methods of Web security EXCEPT:

Blacklist bad users

A mechanism in a ResultSet object in Java that points to the current row of data is called a:

Cursor

The role that is responsible for developing overall policies and procedures for database security is:

Data Administration

The role responsible for administering database security is:

Database Administration

A computer that provides database storage and access in a client/server environment is called a(n):

Database server

Which of the following is not a basic step to accessing a database from an application:

Define physical storage

Many Python web applications use:

Django

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

Exclusive lock

A shared lock prevents another transaction from reading a record. (T/F)

False

A transaction is consistent if it always runs with the same amount of memory. (T/F)

False

A transaction is durable if it can resist failure. (T/F)

False

An API is a set of routines that a database server uses to access database objects. (T/F)

False

An application server provides basic functionality for receiving and responding to requests from browsers. (T/F)

False

Business rules logic includes such activities as data validation and identification of processing errors.

False

During multiple simultaneous transactions data integrity is maintained by logging. (T/F)

False

Storage logic is provided by an application server. (T/F)

False

Three-tier architectures generally result in higher long-term costs. (T/F)

False

Versioning is a pessimistic approach to concurrency control. (T/F)

False

A data-interchange format easily for humans to read and machines to parse and process is called:

JavaScript Object Notation (JSON)

Which of the following threats involves outside parties using information to embarrass a company?

Loss of confidentiality

The architecture that most applicaitons use that separates the business logic, presentation logic, and database logic is called:

Model-view-controller

All of the following are well-accepted characteristics of transactions EXCEPT:

Persistence

The W3C standard for Web privacy is called:

Platform for Privacy Preferences

All of the following are key components of a web application EXCEPT:

Processing-logic server

An application server

Provides the building blocks for creating dynamic web sites and web-based applications.

Security measures for dynamic Web pages are different from static HTML pages because:

The connection requires full access to the database for dynamic pages

A PC configured to handle user interfaces with limited local storage is called a(n):

Thin client

A client/server configuration that has three layers (one client and two servers) has a three-tier architecture. (T/F)

True

All .html files can be processed by the web server itself. (T/F)

True

All transactions must have the ACID characteristics. (T/F)

True

Java servlets execute from within another program and reside on the server. (T/F)

True

The LAMP stack consists of Apache, PHP, and MySQL. (T/F)

True

The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen. (T/F)

True

An optimistic approach to concurrency control is called:

Versioning

A transaction is considered isolated when:

any changes in the database are not revealed to the user until the transaction is complete

The client/server architectures that have evolved can be distinguished by the distribution of _______ across clients and servers

application logic components

________ is the process of assigning pieces of application code to clients or servers.

application partitioning

The extent of teh database resource that is included with each lock is called the level of:

lock granularity

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

two-phase lock

Geolocation logic is the application logic component responsible for data storage and retrieval. (T/F)

False


Ensembles d'études connexes

America and the World Since 1945

View Set

Nutrition Chapter 12: Water and Major Minerals

View Set

PSYC 100: States of Consciousness

View Set

5-1 SmartBook Assignment: Chapter 6 (Sections 6.1 through 6.4)

View Set

Anatomy and Physiology Final Exam

View Set

Saunders Comprehensive Review for the NCLEX-RN® -Pt 1

View Set

Functions and Structure of Muscles

View Set

Principles of Management Chapter 4

View Set