Section 7-2 True/Flase

Ace your homework & exams now with Quizwiz!

Business rules logic includes such activities as data validation and identification of processing errors.

Flase

Storage logic is provided by an application server.

Flase

The process of assigning parts of an application to a client or server is called application partitioning. Select one:

Flase

All transactions must have the ACID characteristics.

True

A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.

True

The LAMP stack consists of Apache, PHP and MySQL.

True

A database is a sequence of steps that constitute a well-defined business activity.

False

Three-tier architectures generally result in higher long-term costs.

False

Two-tier architectures are much more scalable than three-tier architectures.

False

A business transaction requires several actions against a database.

True

A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.

True

All .html files can be processed by the web server itself.

True

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

True

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

True

When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated. Select one:

True

The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.

True1

A transaction is consistent if it always runs with the same amount of memory.

fALSE

A fat client does most of its processing on the server.

False

A shared lock prevents another transaction from reading a record.

False

A transaction is durable if it can resist failure.

False

ABET is a common encryption method used to secure data traveling between a client and a server.

False

An API is a set of routines that a database server uses to access database objects.

False

An application server provides basic functionality for receiving and responding to requests from browsers.

False

Database administrators are responsible for developing overall policies and procedures for database security.

False

During multiple simultaneous transactions data integrity is maintained by logging.

False

Geolocation logic is the application logic component responsible for data storage and retrieval.

False

Loss of data integrity means that someone has stolen data from the database server. Select one:

False

In some three-tier architectures, most application code is stored on the application server. Select one:

TRUE

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

True

Database administrators are responsible for administering database security.

True

Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.

True

ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.

True

Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

True

Since dynamic Web pages require full access to the database, security is different from static HTML pages.

True

Two-phase locking is a procedure for acquiring locks for a transaction before any are released.

True

Random password guessing is a type of network security.

fALSE

Versioning is a pessimistic approach to concurrency control.

fALSE

When developing an application, one must decide where it will be placed when it is developed.

false

Level of lock granularity is the extent of a database resource include with each lock.

tRUE

Restricting access to the Web server is one method of Web security.

tRUE

A web server is a key component of web applications.

true


Related study sets

7.o. Kémia 6 - Az atom felépítése

View Set

PNU 133 PassPoint PrepU School-age Child

View Set

Strategic Management ch.12 Corporate Governance and Business Ethics

View Set

Nutrition Practice questions - Final

View Set

Accounting Exam 3 Chapter 8 study areas

View Set

8.1 Loss Grief Dying and End of Life Care

View Set

Chapter 9: The Impact Divorce on Children

View Set