Exam 7: Databases in Applications

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.

(Multiple Choice)
4.9/5
(41)

A transaction is considered isolated when:

(Multiple Choice)
4.9/5
(34)

Explain how middleware is used in a two-tier application.

(Essay)
4.9/5
(34)

When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated.

(True/False)
4.9/5
(38)

The LAMP stack consists of all of the following EXCEPT:

(Multiple Choice)
4.8/5
(42)

Java servlets execute from within another program and reside on the server.

(True/False)
4.8/5
(37)

A database is a sequence of steps that constitute a well-defined business activity.

(True/False)
4.9/5
(38)

Two-phase locking is a procedure for acquiring locks for a transaction before any are released.

(True/False)
4.8/5
(34)

The role that is responsible for developing overall policies and procedures for database security is:

(Multiple Choice)
4.8/5
(31)

Random password guessing is a type of network security.

(True/False)
4.9/5
(33)

Restricting access to the Web server is one method of Web security.

(True/False)
4.9/5
(26)

A business transaction requires:

(Multiple Choice)
4.8/5
(41)

Discuss the differences between two-tier and three-tier architectures.

(Essay)
4.9/5
(36)
Showing 81 - 93 of 93
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)