Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Introduction to Operations Management (MGT 311)

Description 1-please plagiarism not acceptable 2-references are required 3-number of words as required ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Introduction to Operations Management (MGT 311) Due Date: 02/11/2024 @ 23:59

Decision Making and Problem Solving (MGT 312)

Description 1-please plagiarism not acceptable 2-references are required 3-number of words as required ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Decision Making and Problem Solving (MGT 312) Due Date: End of

questions in mgt 402

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Entrepreneurship and small business (MGT 402) Due Date: 02/11/2024 @ 23:59 Course Name: Entrepreneurship and small business Course Code: MGT402 Student’s Name: Semester:

1 Ct.

Description Case Study: Creating a culture of safety in response to an adverse event in healthcare (110 points) For this assignment, you will access the Saudi Digital Library to research a specific case of an adverse event that occurred in healthcare. Using the case that you have identified, you will

Management Question

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Entrepreneurship and small business (MGT 402) Due Date: 02/11/2024 @ 23:59 Course Name: Entrepreneurship and small business Course Code: MGT402 Student’s Name: Semester:

Organizational Behaviour (MGT 301)

Description 1-please plagiarism not acceptable 2-references are required 3-number of words as required ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Organizational Behaviour (MGT 301) Due Date: 02/11/2024 @ 23:59 Course Name:

2 questions in mgt

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Communications Management (MGT 421) Due Date: 2/11/2024 @ 23:59 Course Name: Communication Management Student’s Name: Course Code: MGT421 Student’s ID Number: Semester: 1st

Management Question

Description Hello everyone , I have an assignment about the subject Strategic Management i will attach the assignment file and the case the assignment based on. and here the instructions : Avoid plagiarism, the work should be in your own words, copying from students or other resources without proper referencing

Business Question

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2 Management of Technology (MGT 325) Due Date: 02/11/2024 @ 23:59 Course Name: Management of Technology Student’s Name: Course Code: MGT325 Student’s ID Number:

5 questions in mgt 425

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment-2 MGT425-Spreadsheet Decision Modeling Due Date: 02/11/2024 (End of Week-10) @ 23:59 Course Name: Spreadsheet Decision Modeling Course Code: MGT425 Student’s Name: Semester: First CRN:

Business Question

Description # Please I need this assignment within 24 hours, # Should not have a plagiarism, # Follow the “General Instructions” in the Assignment Because learning changes everything.® Chapter 1 Overview of Marketing Copyright 2022 © McGraw Hill LLC. All rights reserved. No reproduction or distribution without the prior written

Business Question

Description # Please I need this assignment within 24 hours, # Should not have a plagiarism, # Follow the “General Instructions” in the Assignment ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2

Business Question

Description # Please I need this assignment within 24 hours, # Should not have a plagiarism, # Follow the “General Instructions” in the Assignment ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2

Business Question

Description # Please I need this assignment within 24 hours, # Should not have a plagiarism, # Follow the “General Instructions” in the Assignment ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 2

Business Question

Description Please read the Case-5.2 “Post-Graduation Adventure.” from Chapter 5 “Estimating Project Times and Costs” given in your textbook – Project Management: The Managerial Process 8th edition by Larson and Gray page no: 164 also refer to specific concepts you have learned from the chapter to support your answers. Answer

331 ass 40

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: Chronic Disease Epidemiology and Prevention Course number: PHC 331 CRN Assignment title or task: Students Name: Name ID Submission date: Instructor name: Dr Shaima Miraj Grade: …..out of 10 Assignment guidelines: • • • •

313 ass 26

Description See College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: Road Traffic Injuries and Disability Prevention Course number: PHC 313 CRN 10140 Discuss the key strategies for preventing road traffic injuries and disabilities. Assignment title or task: Evaluate the effectiveness of these strategies in different

311 ass 31

Description See College of Health Sciences Department of Public Health Assignment Cover Sheet Course name: GLOBAL HEALTH Course number: PHC 311 CRN 10083 Please answer the following 2 questions in an essay format (15 marks) Assignment title or task: 1. What does a growth-mediated model of development look like? What