Regarding the three-tier architecture of a web design?

Assignment Help Web Project
Reference no: EM13851928

1. Which part in a computer system is described as a brain of the system?

A. RAM

B. Main memory

C. CPU

D. ROM

Question 2.2. 2. The ______________________ technology uses the Internet to create the appearance of private point-to-point connections.

A. three-tier

B. virtual private network

C. hypervisor

D. domain name system

 

Question 3. Which are the three major components in a three-tier architecture for Web development?

A. first tier - second tier -third tier

B. Web tier - Logistics tier - Management tier

C. User tier - Server tier - Database tier

D. Mobile tier - Cloud tier - Security tier

 

Question 4. What is the main function of meta data?

A. Create rows in a data table

B. Describe the attributes of data in a database

C. Create dates in a data table

D. Query databases

 

Question 5. ____________________ is the process of converting a poorly structured table into two or more well-structured tables.

A. Screening

B. Description

C. Normalization

D. Reduction

Question 6. What feasibility assessments should be performed in the system definition step in a system development life cycle?


A. cost, schedule, technical, and structure

B. income, outcome, readiness, and back-up plan

C. Web server, clients computer, and cyber security

D. cost and supplier relationship

Question 7. A __________________ system is an information system that supports business processes by consolidating and analyzing data in a large database to help users create information.

A. value chain

B. manufacturing

C. logistics


D. business intelligence

Question 8. A __________________ is a column or group of columns that identifies a unique row in a table.

A. foreign key

B. primary key

C. metadata

D. query

Question 9. A __________________ is a column or group of columns that identifies a unique row in another table.


A. foreign key

B. primary key

C. metadata

D. query

Question 10. Which column could be the primary key of the table below?

A. CustomerID


B. OrderID


C. ProductName

D. Price

 

Question 11. Which columns could be primary keys (Table names are Student and Student_Account)?

A. ID and StudentID

B. StudentID and ReceiptID

C. ID and ReceiptID

D. StudentID and Amount

 

Question 12. Which column could be the primary key of the table below?

A. CustomerID

B. RepresentativeID

C. TransactionID

D. Comment

Question 13. What makes a relational connection between two tables in an entity-relationship database design?

A. Metadata

B. Query

C. Foreign key

D. Primary key

Question 14. Which column could be the primary key of the table below?
 
A. ID701
B. ID402

C. ID056

D. Status

Question 15. What are the options of implementing a new system in a company?

A. prototype and actual model

B. preliminary and advanced design

C. pilot installation, phased installation, parallel installation, and plunge installation

D. testing, implementation, and collecting feedback

Question 16. _________ is the ability to model the components of the system and to connect the inputs and outputs among those components into a sensible whole, one that explains the phenomenon observed.

A. Abstraction

B. System thinking

C. Collaboration

D. Experimentation

Question 17. ___________ refer to transforming inputs into final products in a value chain.

A. Inbound logistics

B. Manufacturing /Operations

C. Outbound logistics

D. Sales and marketing activities

Question 18. ___________ refer to inducing buyers to purchase products and providing a means for them to do so in a value chain.

A. Inbound logistics

B. Manufacturing / Operations

C. Outbound logistics

D. Sales and marketing activities

Question 19. Company A is manufacturing an Android smartphone. It is facing several competitions from other brands such as Samsung, HTC, and Motorola. Company A's smartphone displays completely come from Samsung. Which statement is correct?

A. Customers have low bargaining powers over Company A's smartphone.

B. Samsung have high bargaining powers over Company A.

C. The substitute threat to Company A's smartphone is low.

D. The new entrant threat to Company A is low.

Question  20. Which statement is correct regarding the three-tier architecture of a Web design?

A. The data are processed in the client tier.

B. The three-tier architecture increases the workload of the client tier.

C. The three-tier architecture reduces the workload of the server tier.

D. All data are stored in the client tier.

Reference no: EM13851928

Questions Cloud

Analyze the current trends affecting the evolution hit : Analyze the current trends affecting the evolution of health information technology (HIT) - Determine a significant trend that you believe is having the most significant impact on the expansion of HIT.
Concepts of operations management with a schematic diagram : Define Operations management. Explain the key concepts of Operations management with a schematic diagram.
What is the npv of kohwes investment : What is the NPV of Kohwes investment and what is Kohwes share price today - What is Kohwe's share price today if the investment is financed with debt?
According to foundation of economics by robin bade : According to foundation of economics by Robin Bade, in chapter page 80 the multiple choice question in table 1. Table 1 shows the PPF of an island community. Choose the best statement. Mary makes 10 pies and 20 cakes a day and her opportunity cost of..
Regarding the three-tier architecture of a web design? : regarding the three-tier architecture of a Web design?
Microbiology- principles and explorations : After reading Ch. 11 in Microbiology: Principles and Explorations,complete the following matrices to compare and contrast different parasitic organisms. You may need to use the index to help you locate some of the information needed
Essay - justice and civic life 200 : Define ‘eugenics' in your introductory paragraph. Stipulate that you will be talking only about state-sponsored eugenics and that you are making the assumptions - Difficulties of fair and impartial administration of a state-sponsored eugenics progr..
Warning about use of magic-spells : Warning about use of magic/spells (by whom?) Death of Pelias (how?) Death of Glauce (how?) Death of children (how/ by whom?)
Identify the constituencies these ibm task forces represent. : Identify the constituencies these IBM task forces represent.

Reviews

Write a Review

Web Project Questions & Answers

  Evaluating an ecommerce website

Create a check list that contains key point for evaluating an ecommerce website - Write a short, reflective report about website

  Gpc and runtime magic quotes

Create a script that lets you know whether Zeus or Helios has the GPC and Runtime Magic Quotes turned on or off. The output should have appropriate labels that define what output signified and should display 'ON' or 'OFF' depending on the setting.

  Creating functions through conditional operator

Use the conditional operator and the cal_days_in_month function, determine the number of days in the current month and output to browser whether it is normal month or a leap month.

  Web development projects with database

Since the vast majority of web-development projects involve a database, do you think that computational activities should be performed there, or do you think they belong in the XML page or stylesheet?

  Comparing shelf software packages

Required assistance with comparing and contrasting two main off the shelf software packages that could be implemented in an organization.

  Web based scams

Web phishing, pharming and vishing are popular web based scams. Talk about currently used tools and recommended measures to defeat this kind of attacks efficiently?

  Explanation of contextual links

The most powerful hypertext capabilities is the the contextual link. Wikipedia . com is a great example of a site that utilizes contextual links.

  How architectural and protocol changes occur

Discuss how architectural and protocol changes happen, the administrative organization that oversees the technical development of the Internet,

  Traditional approaches for training professionals

Webinars and other web conferencing techniques have proved most beneficial for the provision of affordable quality corporate training.

  Internet for business

Discuss how can a business use the Internet and give at least three examples with web links demonstrating your answer.

  It influences the behavior of organizations

Information technology influences the behavior of organizations. Name one effect of Information technology implementation and long-term usage you suppose having a positive contribution and one having a negative consequence.

  Importance of a guided navigation system

Explain the use and importance of a guided navigation system and shopping cart for a website designed for e-commerce and business purpose.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd