Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Internship final MGT430 Report & Presentation

Description Course Name: Internship Student’s Name: Course Code: MGT430 Student’s ID Number: Semester: CRN: Academic Year: 2022-2023 For Instructor’s Use only Instructor’s Name: Students’ Grade: Restricted – ‫مقيد‬ Level of Marks: Secondary address separator Restricted – ‫مقيد‬ Restricted – ‫مقيد‬ Secondary address Restricted – ‫مقيد‬ Text Text Text Text Restricted

ACCT 405 Accounting for financial institutions

Description You are advised to make the work clear and well presented. You must mention question number clearly in their answer. Avoid plagiarism, the work should be in your own words, copying from other resources without proper referencing is not accepted.. All answers must be typed using Times New Roman

HERE 5 ASS

Description # You should not copy from any website # References must be written # The assignment must be delivered on time # The agreed number of words must be adhered to # Give examples and write a perfect answer ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of

alaa301,,,

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

mng311,alaa

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

mng401,alaa

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

Financial Accounting /ACCT201

Description THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD (WORD FORMAT ONLY) VIA ALLOCATED FOLDER. • ASSIGNMENTS SUBMITTED THROUGH EMAIL WILL NOT BE ACCEPTED. • STUDENTS ARE ADVISED TO MAKE THEIRWORK CLEAR AND WELL PRESENTED;MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLING YOUR INFORMATION ON THE COVER PAGE. •

Principle Of Accounting 101

Description College of Administration and Finance Sciences Assignment (2) Deadline: November 27th 2025 Time 23:59 Course Name: Principle Of Accounting Course Code: ACCT 101 Student’s Name: Student’s ID Number: CRN: Semester: 1st Academic Year: 1447 H For Instructor’s Use only Instructor’s Name: Students’ Grade: /15 Level of Marks: High/Middle/Low Instructions

Management Question

Description hi Please find attached assignment 3 for mgt 301, do the needful as per instructed in the cover page. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Organizational Behaviour (MGT 301)

Mgt430-final report+presesntation

Description https://ngha.med.sa Major:Business Administration Training Organization: Prince Mohammed Bin Abdulaziz Hospital – Ministry of National Guard health Affairs – Al Address: Ad Dar Dist., Prince Naif Street Training Supervisor Contact Details: Saleh Al Saiari Designation: Director Department: Logistics Services Email: [email protected] Trainee Responsibilities: 1-Provide administrative support. 2. Support in vehicle

mgt430-final report+presentation

Description https://samaya.sa/ Major:Business Administration Training Supervisor Contact Details/ Name: HASSAN ALI YAHYA AL ARESHI Designation: Head of Recruitment and Government Relations Department Department: Human Resources Email: [email protected] Trainee Responsibilities: 2. Recruitment, onboarding 3. Employee relations 4. Employee engagement Per Week: 35 Hours Total Work Hours: 280 hours Joining date:24-08-2025 Faculty

Project 475

Description see College of Computing and Informatics Project Deadline: Sunday 30/11/2025 @ 23:59 [Total Mark for this Project is 14] Group Details: CRN: 14845 Name: DEEQA AHMED Name: NORAH ALDOSSARI Name: JUMARA ALABBAD Name: AMJAD ALSHAHRANI Name: NOURH AL-MARRAR ID: s210031140 ID: s220017802 ID: s200173248 ID: s210024897 ID: s220036429 Instructions:

research New solve

Description I need the answer to the question attached to the required lectures, a correct answer without plagiarism. King Khalid University College of Applied Medical Sciences Department of Radiological Sciences Course Title: Research Methodology in Radiology Course No. RAD 6101 Credit Hours 2 Pre-requirements N/A Lecture No. 6 Developing Research

DB-Module 14: Summary Thoughts on Organizational Change

Description DB-Module 14: Summary Thoughts on Organizational Change Throughout this course, we have learned that change is inevitable. As things change, we have less ability to control exactly where they will change and how quickly they will change. Organizations can, however, take some action to address change. In this module,

DB- Module 14: Waiting Lines

Description DB- Module 14: Waiting Lines in this module, you will learn about the management of waiting lines. The focus will be on the managerial implications of waiting lines to include the cost of providing waiting space and the costs of not providing adequate waiting space to customers. In addition,

Presentation just question 4 and 10

Description The presentation is about alhabibshop https://alhabibshop.com/ar/about-us/page-138028171… ‏please use your own words don’t copy and paste (no plagiarism) ‏- Please use keyboard (don’t use handwriting) ‏- All answered must be typed using Times New Roman (size 12, double-spaced) ‏- I want answer with APA reference, references at least 5 ‏##The

new solve

Description Based on what I understand, the requirements are: – Assignment Report – Presentation The presentation should be excellent and not have a specific length requirement. We are interested in the content, the scientific nature of the material, and ensuring it is original and does not incorporate artificial intelligence. Report

Management Question

Description It’s an assignment and a presentation . See the instructions in the picture. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University Department of Finance College of Administrative and Financial Sciences Assignment 3 Course Name: Macroeconomics Student’s Name: Course Code: