Exam 7: Databases in Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Three-tier architectures generally result in higher long-term costs.

(True/False)
4.8/5
(29)

Which of the following threats involves outside parties using information to embarrass a company?

(Multiple Choice)
4.8/5
(35)

A PC configured to handle user interfaces with limited local storage is called a(n):

(Multiple Choice)
4.7/5
(36)

An optimistic approach to concurrency control is called:

(Multiple Choice)
5.0/5
(31)

All of the following are well-accepted characteristics of transactions EXCEPT:

(Multiple Choice)
4.8/5
(25)

The process of assigning parts of an application to a client or server is called application partitioning.

(True/False)
4.9/5
(51)

One major disadvantage of JSP is:

(Multiple Choice)
4.7/5
(34)

A transaction is durable if it can resist failure.

(True/False)
4.8/5
(38)

The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:

(Multiple Choice)
4.8/5
(26)

Business rules logic includes such activities as data validation and identification of processing errors.

(True/False)
4.9/5
(32)

Which Java method retrieves the next row of a cursor?

(Multiple Choice)
4.8/5
(46)

A business transaction requires several actions against a database.

(True/False)
4.8/5
(41)

Many Python web applications use:

(Multiple Choice)
4.8/5
(34)

The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

(Multiple Choice)
4.8/5
(36)

What are the components of a Web application?

(Essay)
4.8/5
(35)

A mechanism in a ResultSet object in Java that points to the current row of data is called a:

(Multiple Choice)
4.9/5
(34)

An API is a set of routines that a database server uses to access database objects.

(True/False)
4.9/5
(40)

When developing an application, one must decide where it will be placed when it is developed.

(True/False)
4.9/5
(37)

All of the following are additional methods of Web security EXCEPT:

(Multiple Choice)
4.9/5
(37)

ABET is a common encryption method used to secure data traveling between a client and a server.

(True/False)
4.9/5
(39)
Showing 41 - 60 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)