DATA ANALYTICS UTT- CHAPTER 7

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A) API B) MOM C) RPC D) LAN

A) API

________ is the process of assigning pieces of application code to clients or servers. A) Application partitioning B) Modularizing programs C) Code distribution D) Program breakup

A) Application partitioning

Which of the following is a type of network security? A) Authentication of the client workstation B) Password naming conventions C) Guidelines for frequency of password changes D) Random password guessing

A) Authentication of the client workstation

The role that is responsible for developing overall policies and procedures for database security is: A) Data Administration. B) Database Administration. C) Database Development. D) Accounting.

A) Data Administration.

A common encryption method to secure data traveling between a client and a server is called: A) Secure Sockets Layer (SSL). B) Secure Synchronization Layer (SSL). C) RSA. D) ITT.

A) Secure Sockets Layer (SSL).

A computer that provides database storage and access in a client/server environment is called a(n): A) database server. B) file server. C) cloud data store. D) info server.

A) database server.

Which Java method retrieves the next row of a cursor? A) next() B) first() C) get() D) load()

A) next()

A sequence of steps that constitute a well-defined business activity is called a: A) transaction. B) transfixture. C) database. D) table.

A) transaction.

An optimistic approach to concurrency control is called: A) versioning. B) denormalization. C) deadlock resolution. D) HappyControl.

A) versioning.

The role responsible for administering database security is: A) Data Administration. B) Database Administration. C) Security. D) Developers.

B) Database Administration.

Many Python web applications use: A) iPython. B) Django. C) jQuery. D) stored procedures.

B) Django.

One major disadvantage of JSP is: A) it runs slow. B) HTML, Java cod,e and SQL code are mixed together. C) it is not popular. D) it does not use XML.

B) HTML, Java cod,e and SQL code are mixed together.

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A) User interface enhancers B) Middleware C) Interface managers D) MPP

B) Middleware

The W3C standard for Web privacy is called: A) the Web privacy act. B) Platform for Privacy Preferences. C) Freedom of Web Information Act. D) the Magna Carta.

B) Platform for Privacy Preferences.

Which of the following is NOT a common distribution logic for two-tiered server environments? A) Fat client B) Tall client C) Thin client D) Distributed

B) Tall client

A transaction is considered isolated when: A) it runs in a vacuum. B) any changes in the database are not revealed to the user until the transaction is complete. C) it can only be run on one server. D) users can see changes to tables before the transaction is complete.

B) any changes in the database are not revealed to the user until the transaction is complete.

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. A) logging B) concurrency control C) transaction authorization D) multiple management

B) concurrency control

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked. A) record controller B) exclusive lock C) authorization rule D) shared lock

B) exclusive lock

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n): A) server. B) fat client. C) thin client. D) workstation.

B) fat client.

The architecture that most applications use that separates the business logic, presentation logic, and database logic is called: A) model-value-controller. B) model-view-controller. C) JSP. D) frameworks.

B) model-view-controller.

Durability means that: A) transactions can't be erased. B) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction. C) transactions can withstand failure. D) transactions never finish on time.

B) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.

An application server A) provides basic functionality for receiving and responding to requests from browsers. B) provides the building blocks for creating dynamic web sites and web-based applications. C) provides storage logic. D) none of the above.

B) provides the building blocks for creating dynamic web sites and web-based applications.

How the database results are read into memory is determined by: A) the program. B) the database driver. C) the operating system. D) none of the above.

B) the database driver.

A PC configured to handle user interfaces with limited local storage is called a(n): A) fat client. B) thin client. C) light client. D) overweight client.

B) thin client.

Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity

C) Loss of confidentiality

All of the following are well-accepted characteristics of transactions EXCEPT: A) Atomicity. B) Consistency. C) Persistence. D) Durability.

C) Persistence.

The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers. A) memory B) files C) application logic components D) query logic components

C) application logic components

Which of the following is not a basic step to accessing a database from an application: A) register database driver. B) open a connection. C) define physical storage. D) query the database.

C) define physical storage.

The extent of the database resource that is included with each lock is called the level of: A) impact. B) management. C) lock granularity. D) TIO.

C) lock granularity.

All of the following are advantages of stored procedures EXCEPT: A) performance improves for compiled SQL statements. B) network traffic deceases. C) portability. D) thinner client.

C) portability.

All of the following are key components of a web application EXCEPT: A) database server. B) web server. C) processing-logic server. D) web browser.

C) processing-logic server.

A business transaction requires: A) a trigger. B) a stored procedure. C) several actions against the database. D) human intervention.

C) several actions against the database.

Security measures for dynamic Web pages are different from static HTML pages because: A) dynamic Web pages are built "on the fly." B) static Web pages contain more sensitive data. C) the connection requires full access to the database for dynamic pages. D) HTML is more complex than dynamic Web pages.

C) the connection requires full access to the database for dynamic pages.

Which of the following is a component of processing logic? A) Input B) Output C) Retrieval D) Business rules

D) Business rules

The LAMP stack consists of all of the following EXCEPT: A) Apache. B) MySQL. C) PHP or Python. D) IIS.

D) IIS.

A data-interchange format easily for humans to read and machines to parse and process is called: A) Java Oriented Notation (JON). B) HTML. C) XML. D) JavaScript Object Notation (JSON).

D) JavaScript Object Notation (JSON).

In order for a transaction to be consistent: A) it must run the same way all the time. B) it must tell the truth. C) it must run using the same amount of memory. D) any database constraints that must be true before the transaction must also be true after the transaction.

D) any database constraints that must be true before the transaction must also be true after the transaction.

All of the following are additional methods of Web security EXCEPT: A) restrict the number of users on the Web server. B) restrict access to the Web server. C) remove unneeded programs. D) blacklist bad users.

D) blacklist bad users.

A mechanism in a ResultSet object in Java that points to the current row of data is called a: A) stored procedure. B) trigger. C) table. D) cursor.

D) cursor.

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a: A) file server. B) file processor. C) database server. D) fat client.

D) fat client.

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released. A) record controller B) exclusive lock C) authorization rule D) two-phase lock

D) two-phase lock

T/F: A database is a sequence of steps that constitute a well-defined business activity.

FALSE

T/F: A fat client does most of its processing on the server.

FALSE

T/F: A shared lock prevents another transaction from reading a record.

FALSE

T/F: A transaction is consistent if it always runs with the same amount of memory.

FALSE

T/F: A transaction is durable if it can resist failure.

FALSE

T/F: ABET is a common encryption method used to secure data traveling between a client and a server.

FALSE

T/F: An API is a set of routines that a database server uses to access database objects.

FALSE

T/F: An application server provides basic functionality for receiving and responding to requests from browsers.

FALSE

T/F: Business rules logic includes such activities as data validation and identification of processing errors.

FALSE

T/F: Database administrators are responsible for developing overall policies and procedures for database security.

FALSE

T/F: During multiple simultaneous transactions data integrity is maintained by logging.

FALSE

T/F: Geolocation logic is the application logic component responsible for data storage and retrieval.

FALSE

T/F: Loss of data integrity means that someone has stolen data from the database server.

FALSE

T/F: Random password guessing is a type of network security.

FALSE

T/F: Storage logic is provided by an application server.

FALSE

T/F: The Magna Carta is the W3C standard for Web privacy.

FALSE

T/F: The process of assigning parts of an application to a client or server is called application partitioning.

FALSE

T/F: Three-tier architectures generally result in higher long-term costs.

FALSE

T/F: Two-tier architectures are much more scalable than three-tier architectures.

FALSE

T/F: Versioning is a pessimistic approach to concurrency control.

FALSE

T/F: When developing an application, one must decide where it will be placed when it is developed.

FALSE

T/F: A business transaction requires several actions against a database.

TRUE

T/F: A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.

TRUE

T/F: A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.

TRUE

T/F: A web server is a key component of web applications.

TRUE

T/F: All .html files can be processed by the web server itself.

TRUE

T/F: All transactions must have the ACID characteristics.

TRUE

T/F: Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

TRUE

T/F: Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

TRUE

T/F: Database administrators are responsible for administering database security.

TRUE

T/F: In some three-tier architectures, most application code is stored on the application server.

TRUE

T/F: Java servlets execute from within another program and reside on the server.

TRUE

T/F: Level of lock granularity is the extent of a database resource include with each lock.

TRUE

T/F: Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.

TRUE

T/F: ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.

TRUE

T/F: Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

TRUE

T/F: Restricting access to the Web server is one method of Web security.

TRUE

T/F: Since dynamic Web pages require full access to the database, security is different from static HTML pages.

TRUE

T/F: The LAMP stack consists of Apache, PHP and MySQL.

TRUE

T/F: The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.

TRUE

T/F: The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

TRUE

T/F: Two-phase locking is a procedure for acquiring locks for a transaction before any are released.

TRUE

T/F: When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated.

TRUE


संबंधित स्टडी सेट्स

Chapter 1.2: Organisms - Cell to Body Systems

View Set

love hate and other filters character map

View Set

Cellular regulation Exemplar 2.E Leukemia

View Set

Unit 3: Sensation and Perception

View Set

First semester Health and Fitness multiple choice

View Set