CIS 3050 Bank 2
A common encryption method to secure data traveling between a client and a server is called: A) Secure Sockets Layer (SSL). B) Secure Synchronization Layer (SSL). C) RSA. D) ITT.
A
A PC configured to handle user interfaces with limited local storage is called a(n): A) fat client. B) thin client. C) light client. D) overweight client.
B
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n): A) server. B) fat client. C) thin client. D) workstation.
B
A transaction is considered isolated when: A) it runs in a vacuum. B) any changes in the database are not revealed to the user until the transaction is complete. C) it can only be run on one server. D) users can see changes to tables before the transaction is complete.
B
Durability means that: A) transactions can't be erased. B) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction. C) transactions can withstand failure. D) transactions never finish on time.
B
Many Python web applications use: A) iPython. B) Django. C) jQuery. D) stored procedures.
B
A business transaction requires: A) a trigger. B) a stored procedure. C) several actions against the database. D) human intervention.
C
All of the following are advantages of stored procedures EXCEPT: A) performance improves for compiled SQL statements. B) network traffic deceases. C) portability. D) thinner client.
C
The extent of the database resource that is included with each lock is called the level of: A) impact. B) management. C) lock granularity. D) TIO.
C
The role responsible for administering database security is: A) Data Administration. B) Database Administration. C) Security. D) Developers
B
A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system. A) API B) MOM C) RPC D) LAN
A
An optimistic approach to concurrency control is called: A) versioning. B) denormalization. C) deadlock resolution. D) HappyControl.
A
Which Java method retrieves the next row of a cursor? A) next() B) first() C) get() D) load()
A
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a: A) file server. B) file processor. C) database server. D) fat client.
D
A data-interchange format easily for humans to read and machines to parse and process is called: A) Java Oriented Notation (JON). B) HTML. C) XML. D) JavaScript Object Notation (JSON).
D
A mechanism in a ResultSet object in Java that points to the current row of data is called a: A) stored procedure. B) trigger. C) table. D) cursor.
D
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released. A) record controller B) exclusive lock C) authorization rule D) two-phase lock
D
All of the following are additional methods of Web security EXCEPT: A) restrict the number of users on the Web server. B) restrict access to the Web server. C) remove unneeded programs. D) blacklist bad users.
D
In order for a transaction to be consistent: A) it must run the same way all the time. B) it must tell the truth. C) it must run using the same amount of memory. D) any database constraints that must be true before the transaction must also be true after the
D
The LAMP stack consists of all of the following EXCEPT: A) Apache. B) MySQL. C) PHP or Python. D) IIS.
D
Which of the following is a component of processing logic? A) Input B) Output C) Retrieval D) Business rules
D
A computer that provides database storage and access in a client/server environment is called a(n): A) database server. B) file server. C) cloud data store. D) info server.
A
A sequence of steps that constitute a well-defined business activity is called a: A) transaction. B) transfixture. C) database. D) table.
A
The role that is responsible for developing overall policies and procedures for database security is: A) Data Administration. B) Database Administration. C) Database Development. D) Accounting
A
Which of the following is a type of network security? A) Authentication of the client workstation B) Password naming conventions C) Guidelines for frequency of password changes D) Random password guessing
A
________ is the process of assigning pieces of application code to clients or servers. A) Application partitioning B) Modularizing programs C) Code distribution D) Program breakup
A
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked. A) record controller B) exclusive lock C) authorization rule D) shared lock
B
An application server A) provides basic functionality for receiving and responding to requests from browsers. B) provides the building blocks for creating dynamic web sites and web-based applications. C) provides storage logic. D) none of the above.
B
How the database results are read into memory is determined by: A) the program. B) the database driver. C) the operating system. D) none of the above
B
One major disadvantage of JSP is: A) it runs slow. B) HTML, Java cod,e and SQL code are mixed together. C) it is not popular. D) it does not use XML.
B
The W3C standard for Web privacy is called: A) the Web privacy act. B) Platform for Privacy Preferences. C) Freedom of Web Information Act. D) the Magna Carta.
B
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions. A) logging B) concurrency control C) transaction authorization D) multiple management
B
The architecture that most applications use that separates the business logic, presentation logic, and database logic is called: A) model-value-controller. B) model-view-controller. C) JSP. D) frameworks.
B
Which of the following is NOT a common distribution logic for two-tiered server environments? A) Fat client B) Tall client C) Thin client D) Distributed
B
________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved. A) User interface enhancers B) Middleware C) Interface managers D) MPP
B
All of the following are key components of a web application EXCEPT: A) database server. B) web server. C) processing-logic server. D) web browser
C
All of the following are well-accepted characteristics of transactions EXCEPT: A) Atomicity. B) Consistency. C) Persistence. D) Durability.
C
Security measures for dynamic Web pages are different from static HTML pages because: A) dynamic Web pages are built "on the fly." B) static Web pages contain more sensitive data. C) the connection requires full access to the database for dynamic pages. D) HTML is more complex than dynamic Web pages
C
The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers. A) memory B) files C) application logic components D) query logic components
C
Which of the following is not a basic step to accessing a database from an application: A) register database driver. B) open a connection. C) define physical storage. D) query the database.
C
Which of the following threats involves outside parties using information to embarrass a company? A) Accidental loss B) Theft and fraud C) Loss of confidentiality D) Loss of data integrity
C