Deck 7: Databases in Applications

ملء الشاشة (f)
exit full mode
سؤال
________ is the process of assigning pieces of application code to clients or servers.

A) Application partitioning
B) Modularizing programs
C) Code distribution
D) Program breakup
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

A) API
B) MOM
C) RPC
D) LAN
سؤال
The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:

A) model-value-controller.
B) model-view-controller.
C) JSP.
D) frameworks.
سؤال
One major disadvantage of JSP is:

A) it runs slow.
B) HTML, Java cod,e and SQL code are mixed together.
C) it is not popular.
D) it does not use XML.
سؤال
________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.

A) User interface enhancers
B) Middleware
C) Interface managers
D) MPP
سؤال
Many Python web applications use:

A) iPython.
B) Django.
C) jQuery.
D) stored procedures.
سؤال
The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers.

A) memory
B) files
C) application logic components
D) query logic components
سؤال
A mechanism in a ResultSet object in Java that points to the current row of data is called a:

A) stored procedure.
B) trigger.
C) table.
D) cursor.
سؤال
Which of the following is a component of processing logic?

A) Input
B) Output
C) Retrieval
D) Business rules
سؤال
A PC configured to handle user interfaces with limited local storage is called a(n):

A) fat client.
B) thin client.
C) light client.
D) overweight client.
سؤال
A data-interchange format easily for humans to read and machines to parse and process is called:

A) Java Oriented Notation (JON).
B) HTML.
C) XML.
D) JavaScript Object Notation (JSON).
سؤال
The LAMP stack consists of all of the following EXCEPT:

A) Apache.
B) MySQL.
C) PHP or Python.
D) IIS.
سؤال
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:

A) file server.
B) file processor.
C) database server.
D) fat client.
سؤال
Which Java method retrieves the next row of a cursor?

A) next()
B) first()
C) get()
D) load()
سؤال
Which of the following is NOT a common distribution logic for two-tiered server environments?

A) Fat client
B) Tall client
C) Thin client
D) Distributed
سؤال
Which of the following is not a basic step to accessing a database from an application:

A) register database driver.
B) open a connection.
C) define physical storage.
D) query the database.
سؤال
All of the following are key components of a web application EXCEPT:

A) database server.
B) web server.
C) processing-logic server.
D) web browser.
سؤال
A computer that provides database storage and access in a client/server environment is called a(n):

A) database server.
B) file server.
C) cloud data store.
D) info server.
سؤال
An application server

A) provides basic functionality for receiving and responding to requests from browsers.
B) provides the building blocks for creating dynamic web sites and web-based applications.
C) provides storage logic.
D) none of the above.
سؤال
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):

A) server.
B) fat client.
C) thin client.
D) workstation.
سؤال
All of the following are well-accepted characteristics of transactions EXCEPT:

A) Atomicity.
B) Consistency.
C) Persistence.
D) Durability.
سؤال
All of the following are additional methods of Web security EXCEPT:

A) restrict the number of users on the Web server.
B) restrict access to the Web server.
C) remove unneeded programs.
D) blacklist bad users.
سؤال
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
سؤال
Which of the following is a type of network security?

A) Authentication of the client workstation
B) Password naming conventions
C) Guidelines for frequency of password changes
D) Random password guessing
سؤال
A sequence of steps that constitute a well-defined business activity is called a:

A) transaction.
B) transfixture.
C) database.
D) table.
سؤال
Durability means that:

A) transactions can't be erased.
B) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.
C) transactions can withstand failure.
D) transactions never finish on time.
سؤال
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) HappyControl.
سؤال
A common encryption method to secure data traveling between a client and a server is called:

A) Secure Sockets Layer (SSL).
B) Secure Synchronization Layer (SSL).
C) RSA.
D) ITT.
سؤال
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
سؤال
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
سؤال
How the database results are read into memory is determined by:

A) the program.
B) the database driver.
C) the operating system.
D) none of the above.
سؤال
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly."
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) HTML is more complex than dynamic Web pages.
سؤال
A transaction is considered isolated when:

A) it runs in a vacuum.
B) any changes in the database are not revealed to the user until the transaction is complete.
C) it can only be run on one server.
D) users can see changes to tables before the transaction is complete.
سؤال
All of the following are advantages of stored procedures EXCEPT:

A) performance improves for compiled SQL statements.
B) network traffic deceases.
C) portability.
D) thinner client.
سؤال
A business transaction requires:

A) a trigger.
B) a stored procedure.
C) several actions against the database.
D) human intervention.
سؤال
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) TIO.
سؤال
The role responsible for administering database security is:

A) Data Administration.
B) Database Administration.
C) Security.
D) Developers.
سؤال
The role that is responsible for developing overall policies and procedures for database security is:

A) Data Administration.
B) Database Administration.
C) Database Development.
D) Accounting.
سؤال
In order for a transaction to be consistent:

A) it must run the same way all the time.
B) it must tell the truth.
C) it must run using the same amount of memory.
D) any database constraints that must be true before the transaction must also be true after the transaction.
سؤال
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
سؤال
The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.
سؤال
Two-tier architectures are much more scalable than three-tier architectures.
سؤال
Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.
سؤال
An API is a set of routines that a database server uses to access database objects.
سؤال
In some three-tier architectures, most application code is stored on the application server.
سؤال
Java servlets execute from within another program and reside on the server.
سؤال
Three-tier architectures generally result in higher long-term costs.
سؤال
Business rules logic includes such activities as data validation and identification of processing errors.
سؤال
Geolocation logic is the application logic component responsible for data storage and retrieval.
سؤال
A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.
سؤال
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.
سؤال
A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.
سؤال
The process of assigning parts of an application to a client or server is called application partitioning.
سؤال
ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.
سؤال
The W3C standard for Web privacy is called:

A) the Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) the Magna Carta.
سؤال
When developing an application, one must decide where it will be placed when it is developed.
سؤال
A web server is a key component of web applications.
سؤال
A fat client does most of its processing on the server.
سؤال
The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.
سؤال
An application server provides basic functionality for receiving and responding to requests from browsers.
سؤال
The LAMP stack consists of Apache, PHP and MySQL.
سؤال
A transaction is durable if it can resist failure.
سؤال
Loss of data integrity means that someone has stolen data from the database server.
سؤال
Database administrators are responsible for administering database security.
سؤال
Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.
سؤال
Storage logic is provided by an application server.
سؤال
All .html files can be processed by the web server itself.
سؤال
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.
سؤال
Versioning is a pessimistic approach to concurrency control.
سؤال
ABET is a common encryption method used to secure data traveling between a client and a server.
سؤال
A shared lock prevents another transaction from reading a record.
سؤال
All transactions must have the ACID characteristics.
سؤال
Level of lock granularity is the extent of a database resource include with each lock.
سؤال
A transaction is consistent if it always runs with the same amount of memory.
سؤال
A database is a sequence of steps that constitute a well-defined business activity.
سؤال
During multiple simultaneous transactions data integrity is maintained by logging.
سؤال
Two-phase locking is a procedure for acquiring locks for a transaction before any are released.
سؤال
When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated.
سؤال
Database administrators are responsible for developing overall policies and procedures for database security.
سؤال
A business transaction requires several actions against a database.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/93
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 7: Databases in Applications
1
________ is the process of assigning pieces of application code to clients or servers.

A) Application partitioning
B) Modularizing programs
C) Code distribution
D) Program breakup
A
2
A(n) ________ is a set of application routines that programs use to direct the performance of procedures by the computer's operating system.

A) API
B) MOM
C) RPC
D) LAN
A
3
The architecture that most applications use that separates the business logic, presentation logic, and database logic is called:

A) model-value-controller.
B) model-view-controller.
C) JSP.
D) frameworks.
B
4
One major disadvantage of JSP is:

A) it runs slow.
B) HTML, Java cod,e and SQL code are mixed together.
C) it is not popular.
D) it does not use XML.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
5
________ is/are any of several classes of software that allow an application to interoperate with other software without requiring the user to understand all software involved.

A) User interface enhancers
B) Middleware
C) Interface managers
D) MPP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
6
Many Python web applications use:

A) iPython.
B) Django.
C) jQuery.
D) stored procedures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
7
The client/server architectures that have evolved can be distinguished by the distribution of ________ across clients and servers.

A) memory
B) files
C) application logic components
D) query logic components
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
8
A mechanism in a ResultSet object in Java that points to the current row of data is called a:

A) stored procedure.
B) trigger.
C) table.
D) cursor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is a component of processing logic?

A) Input
B) Output
C) Retrieval
D) Business rules
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
10
A PC configured to handle user interfaces with limited local storage is called a(n):

A) fat client.
B) thin client.
C) light client.
D) overweight client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
11
A data-interchange format easily for humans to read and machines to parse and process is called:

A) Java Oriented Notation (JON).
B) HTML.
C) XML.
D) JavaScript Object Notation (JSON).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
12
The LAMP stack consists of all of the following EXCEPT:

A) Apache.
B) MySQL.
C) PHP or Python.
D) IIS.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
13
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, as well as many DBMS functions is called a:

A) file server.
B) file processor.
C) database server.
D) fat client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which Java method retrieves the next row of a cursor?

A) next()
B) first()
C) get()
D) load()
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the following is NOT a common distribution logic for two-tiered server environments?

A) Fat client
B) Tall client
C) Thin client
D) Distributed
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not a basic step to accessing a database from an application:

A) register database driver.
B) open a connection.
C) define physical storage.
D) query the database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
17
All of the following are key components of a web application EXCEPT:

A) database server.
B) web server.
C) processing-logic server.
D) web browser.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
18
A computer that provides database storage and access in a client/server environment is called a(n):

A) database server.
B) file server.
C) cloud data store.
D) info server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
19
An application server

A) provides basic functionality for receiving and responding to requests from browsers.
B) provides the building blocks for creating dynamic web sites and web-based applications.
C) provides storage logic.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
20
A client PC that is responsible for processing presentation logic, extensive application and business rules logic, and many DBMS functions is called a(n):

A) server.
B) fat client.
C) thin client.
D) workstation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
21
All of the following are well-accepted characteristics of transactions EXCEPT:

A) Atomicity.
B) Consistency.
C) Persistence.
D) Durability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
22
All of the following are additional methods of Web security EXCEPT:

A) restrict the number of users on the Web server.
B) restrict access to the Web server.
C) remove unneeded programs.
D) blacklist bad users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
23
A(n) ________ prevents another transaction from reading and therefore updating a record until it is unlocked.

A) record controller
B) exclusive lock
C) authorization rule
D) shared lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following is a type of network security?

A) Authentication of the client workstation
B) Password naming conventions
C) Guidelines for frequency of password changes
D) Random password guessing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
25
A sequence of steps that constitute a well-defined business activity is called a:

A) transaction.
B) transfixture.
C) database.
D) table.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
26
Durability means that:

A) transactions can't be erased.
B) once a transaction is committed, no subsequent failure of the database can reverse the effect of the transaction.
C) transactions can withstand failure.
D) transactions never finish on time.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
27
An optimistic approach to concurrency control is called:

A) versioning.
B) denormalization.
C) deadlock resolution.
D) HappyControl.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
28
A common encryption method to secure data traveling between a client and a server is called:

A) Secure Sockets Layer (SSL).
B) Secure Synchronization Layer (SSL).
C) RSA.
D) ITT.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
29
Which of the following threats involves outside parties using information to embarrass a company?

A) Accidental loss
B) Theft and fraud
C) Loss of confidentiality
D) Loss of data integrity
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
30
The actions that must be taken to ensure data integrity is maintained during multiple simultaneous transactions are called ________ actions.

A) logging
B) concurrency control
C) transaction authorization
D) multiple management
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
31
How the database results are read into memory is determined by:

A) the program.
B) the database driver.
C) the operating system.
D) none of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
32
Security measures for dynamic Web pages are different from static HTML pages because:

A) dynamic Web pages are built "on the fly."
B) static Web pages contain more sensitive data.
C) the connection requires full access to the database for dynamic pages.
D) HTML is more complex than dynamic Web pages.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
33
A transaction is considered isolated when:

A) it runs in a vacuum.
B) any changes in the database are not revealed to the user until the transaction is complete.
C) it can only be run on one server.
D) users can see changes to tables before the transaction is complete.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
34
All of the following are advantages of stored procedures EXCEPT:

A) performance improves for compiled SQL statements.
B) network traffic deceases.
C) portability.
D) thinner client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
35
A business transaction requires:

A) a trigger.
B) a stored procedure.
C) several actions against the database.
D) human intervention.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
36
The extent of the database resource that is included with each lock is called the level of:

A) impact.
B) management.
C) lock granularity.
D) TIO.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
37
The role responsible for administering database security is:

A) Data Administration.
B) Database Administration.
C) Security.
D) Developers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
38
The role that is responsible for developing overall policies and procedures for database security is:

A) Data Administration.
B) Database Administration.
C) Database Development.
D) Accounting.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
39
In order for a transaction to be consistent:

A) it must run the same way all the time.
B) it must tell the truth.
C) it must run using the same amount of memory.
D) any database constraints that must be true before the transaction must also be true after the transaction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
40
A(n) ________ is a procedure for acquiring the necessary locks for a transaction where all necessary locks are acquired before any are released.

A) record controller
B) exclusive lock
C) authorization rule
D) two-phase lock
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
41
The storage component of a client/server architecture is responsible for data storage and retrieval from the physical storage devices associated with the application.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
42
Two-tier architectures are much more scalable than three-tier architectures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
43
Client/server describes a networked computing model that distributes processes between computers that request services and computers that provide services.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
44
An API is a set of routines that a database server uses to access database objects.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
45
In some three-tier architectures, most application code is stored on the application server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
46
Java servlets execute from within another program and reside on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
47
Three-tier architectures generally result in higher long-term costs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
48
Business rules logic includes such activities as data validation and identification of processing errors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
49
Geolocation logic is the application logic component responsible for data storage and retrieval.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
50
A client PC that is responsible for presentation logic, application logic, and many DBMS functions is called a fat client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
51
Application partitioning gives developers the opportunity to write application code that can later be placed on either a client workstation or a server, depending upon which location will give the best performance.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
52
A client/server configuration that has three layers (one client and two servers) has a three-tier architecture.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
53
The process of assigning parts of an application to a client or server is called application partitioning.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
54
ODBC is an application programming interface that provides a common language for application programs to access and process an SQL database independent of the particular RDBMS that is accessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
55
The W3C standard for Web privacy is called:

A) the Web privacy act.
B) Platform for Privacy Preferences.
C) Freedom of Web Information Act.
D) the Magna Carta.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
56
When developing an application, one must decide where it will be placed when it is developed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
57
A web server is a key component of web applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
58
A fat client does most of its processing on the server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
59
The presentation logic component of a client/server system is responsible for formatting and presenting data on the user's screen.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
60
An application server provides basic functionality for receiving and responding to requests from browsers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
61
The LAMP stack consists of Apache, PHP and MySQL.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
62
A transaction is durable if it can resist failure.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
63
Loss of data integrity means that someone has stolen data from the database server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
64
Database administrators are responsible for administering database security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
65
Loss of confidentiality is a threat that involves outside parties using information to embarrass a company.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
66
Storage logic is provided by an application server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
67
All .html files can be processed by the web server itself.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
68
Open Database Connectivity is an application programming interface that provides a common language for application programs to access and process SQL databases independent of the particular RDBMS that is accessed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
69
Versioning is a pessimistic approach to concurrency control.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
70
ABET is a common encryption method used to secure data traveling between a client and a server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
71
A shared lock prevents another transaction from reading a record.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
72
All transactions must have the ACID characteristics.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
73
Level of lock granularity is the extent of a database resource include with each lock.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
74
A transaction is consistent if it always runs with the same amount of memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
75
A database is a sequence of steps that constitute a well-defined business activity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
76
During multiple simultaneous transactions data integrity is maintained by logging.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
77
Two-phase locking is a procedure for acquiring locks for a transaction before any are released.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
78
When changes to the database that a transaction imposes are not revealed to the user until the transaction is completed then it is considered isolated.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
79
Database administrators are responsible for developing overall policies and procedures for database security.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
80
A business transaction requires several actions against a database.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 93 في هذه المجموعة.