Exam 7: Databases in Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.

Free
(True/False)
4.9/5
(30)
Correct Answer:
Verified

True

What threats to data security must be addressed in a comprehensive data security plan?

Free
(Essay)
5.0/5
(32)
Correct Answer:
Verified

A comprehensive data security plan must address the following threats:
1. Accidental losses, which could be caused by human error, software and hardware-caused breaches
2. Theft and fraud
3. Loss or privacy or confidentiality
4. Loss of data integrity
5. Loss of availability

________ is the process of assigning pieces of application code to clients or servers.

(Multiple Choice)
4.8/5
(37)

The Magna Carta is the W3C standard for Web privacy.

(True/False)
4.9/5
(35)

A data-interchange format easily for humans to read and machines to parse and process is called:

(Multiple Choice)
4.8/5
(33)

An application server

(Multiple Choice)
4.9/5
(38)

ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.

(True/False)
4.9/5
(27)

The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers.

(Multiple Choice)
4.8/5
(36)

How the database results are read into memory is determined by:

(Multiple Choice)
4.9/5
(34)

A fat client does most of its processing on the server.

(True/False)
4.7/5
(31)

Which of the following is a component of processing logic?

(Multiple Choice)
4.8/5
(34)

Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.

(True/False)
4.8/5
(42)

What are the most important security features for data management software?

(Essay)
5.0/5
(26)

Security measures for dynamic Web pages are different from static HTML pages because:

(Multiple Choice)
4.9/5
(37)

Durability means that:

(Multiple Choice)
4.8/5
(37)

Loss of data integrity means that someone has stolen data from the database server.

(True/False)
4.7/5
(33)

Since dynamic Web pages require full access to the database, security is different from static HTML pages.

(True/False)
4.9/5
(31)

Discuss some of the key benefits of three-tier applications.

(Essay)
4.9/5
(37)

A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):

(Multiple Choice)
4.8/5
(25)
Showing 1 - 20 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)