Section 7-2 True/Flase
Business rules logic includes such activities as data validation and identification of processing errors.
Flase
Storage logic is provided by an application server.
Flase
The process of assigning parts of an application to a client or server is called application partitioning. Select one:
Flase
All transactions must have the ACID characteristics.
True
A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.
True
The LAMP stack consists of Apache, PHP and MySQL.
True
A database is a sequence of steps that constitute a well-defined business activity.
False
Three-tier architectures generally result in higher long-term costs.
False
Two-tier architectures are much more scalable than three-tier architectures.
False
A business transaction requires several actions against a database.
True
A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.
True
All .html files can be processed by the web server itself.
True
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.
True
The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.
True
When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated. Select one:
True
The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.
True1
A transaction is consistent if it always runs with the same amount of memory.
fALSE
A fat client does most of its processing on the server.
False
A shared lock prevents another transaction from reading a record.
False
A transaction is durable if it can resist failure.
False
ABET is a common encryption method used to secure data traveling between a client and a server.
False
An API is a set of routines that a database server uses to access database objects.
False
An application server provides basic functionality for receiving and responding to requests from browsers.
False
Database administrators are responsible for developing overall policies and procedures for database security.
False
During multiple simultaneous transactions data integrity is maintained by logging.
False
Geolocation logic is the application logic component responsible for data storage and retrieval.
False
Loss of data integrity means that someone has stolen data from the database server. Select one:
False
In some three-tier architectures, most application code is stored on the application server. Select one:
TRUE
Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.
True
Database administrators are responsible for administering database security.
True
Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.
True
ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.
True
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.
True
Since dynamic Web pages require full access to the database, security is different from static HTML pages.
True
Two-phase locking is a procedure for acquiring locks for a transaction before any are released.
True
Random password guessing is a type of network security.
fALSE
Versioning is a pessimistic approach to concurrency control.
fALSE
When developing an application, one must decide where it will be placed when it is developed.
false
Level of lock granularity is the extent of a database resource include with each lock.
tRUE
Restricting access to the Web server is one method of Web security.
tRUE
A web server is a key component of web applications.
true