Exam 7: Databases in Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A transaction is consistent if it always runs with the same amount of memory.

(True/False)
4.8/5
(34)

All transactions must have the ACID characteristics.

(True/False)
4.8/5
(41)

A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

(Multiple Choice)
4.8/5
(41)

Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.

(True/False)
4.8/5
(39)

Two-tier architectures are much more scalable than three-tier architectures.

(True/False)
4.8/5
(39)

Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.

(True/False)
4.8/5
(37)

Which of the following is NOT a common distribution logic for two-tiered server environments?

(Multiple Choice)
5.0/5
(34)

The LAMP stack consists of Apache, PHP and MySQL.

(True/False)
4.9/5
(25)

A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.

(True/False)
4.9/5
(33)

All of the following are key components of a web application EXCEPT:

(Multiple Choice)
5.0/5
(33)

A web server is a key component of web applications.

(True/False)
4.7/5
(34)

A computer that provides database storage and access in a client/server environment is called a(n):

(Multiple Choice)
4.7/5
(37)

Level of lock granularity is the extent of a database resource include with each lock.

(True/False)
4.8/5
(41)

Geolocation logic is the application logic component responsible for data storage and retrieval.

(True/False)
4.9/5
(36)

The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.

(True/False)
4.8/5
(40)

A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

(Multiple Choice)
4.8/5
(31)

Which of the following is a type of network security?

(Multiple Choice)
5.0/5
(30)

All of the following are advantages of stored procedures EXCEPT:

(Multiple Choice)
4.8/5
(38)

A common encryption method to secure data traveling between a client and a server is called:

(Multiple Choice)
4.9/5
(34)

The role responsible for administering database security is:

(Multiple Choice)
4.7/5
(32)
Showing 21 - 40 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)