Database Chapter 7

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ is the process of assigning pieces of application code to clients or servers.

Application partitioning

An API is a set of routines that a database server uses to access database objects.

False

An application server provides basic functionality for receiving and responding to requests from browsers.

False

The LAMP stack consists of all of the following EXCEPT:

IIS.

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.

Middleware

All .html files can be processed by the web server itself.

True

Since dynamic Web pages require full access to the database, security is different from static HTML pages

True

The Magna Carta is the W3C standard for Web privacy.

False

When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated.

True

In order for a transaction to be consistent:

any database constraints that must be true before the transaction must also be true after the transaction.

All of the following are well-accepted characteristics of transactions EXCEPT:

Persistence.

The LAMP stack consists of Apache, PHP and MySQL.

True

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

API

Random password guessing is a type of network security.

False

Two-tier architectures are much more scalable than three-tier architectures.

False

When developing an application, one must decide where it will be placed when it is developed.

False

A data-interchange format easily for humans to read and machines to parse and process is called:

JavaScript Object Notation (JSON).

Which of the following threats involves outside parties using information to embarrass a company?

Loss of confidentiality

A common encryption method to secure data traveling between a client and a server is called:

Secure Sockets Layer (SSL).

A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client

True

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

True

In some three-tier architectures, most application code is stored on the application server.

True

The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.

True

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

True

A computer that provides database storage and access in a client/server environment is called a(n):

database server.

Which of the following is not a basic step to accessing a database from an application:

define physical storage.

A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

exclusive lock

Which of the following is a component of processing logic?

Business rules

Many Python web applications use:

Django.

A database is a sequence of steps that constitute a well-defined business activity.

False

A transaction is durable if it can resist failure.

False

Geolocation logic is the application logic component responsible for data storage and retrieval.

False

Loss of data integrity means that someone has stolen data from the database server.

False

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

True

Database administrators are responsible for administering database security.

True

ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.

True

Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

True

Restricting access to the Web server is one method of Web security.

True

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

concurrency control

A mechanism in a ResultSet object in Java that points to the current row of data is called a:

cursor

All of the following are advantages of stored procedures EXCEPT:

portability.

All of the following are key components of a web application EXCEPT:

processing-logic server.

Security measures for dynamic Web pages are different from static HTML pages because:

the connection requires full access to the database for dynamic pages.

How the database results are read into memory is determined by:

the database driver.

A PC configured to handle user interfaces with limited local storage is called a(n):

thin client.

A sequence of steps that constitute a well-defined business activity is called a:

transaction.

An optimistic approach to concurrency control is called:

versioning.

The role responsible for administering database security is:

Database Administration.

Which of the following is NOT a common distribution logic for two-tiered server environments?

Tall client

Which Java method retrieves the next row of a cursor?

next()

An application server

provides the building blocks for creating dynamic web sites and web-based applications.

The role that is responsible for developing overall policies and procedures for database security is:

Data Administration.

A fat client does most of its processing on the server.

False

A shared lock prevents another transaction from reading a record.

False

ABET is a common encryption method used to secure data traveling between a client and a server.

False

Database administrators are responsible for developing overall policies and procedures for database security.

False

During multiple simultaneous transactions data integrity is maintained by logging.

False

Storage logic is provided by an application server.

False

The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers.

application logic components

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):

fat client.


Set pelajaran terkait

PSYC: Unit 8: Psychological Disorders

View Set

New Deal: Relief, Recovery, Reform

View Set

Lecture Test One: (Ch. 1- Ch. 3)

View Set

Chapter 51: Sexually Transmitted Infections

View Set