Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Management Question

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Due Date: 23/11/2025 @ 23:59 Course Name: Corporate Finance Course Code: FIN201 Assignment Title: Capital Structure and Cost of CRN: Capital (Group Project

hci 316 ass 4

Description citation with all paragraphs College of Health Sciences Department of Health Informatics HCI-316-ASSIGNMENT Course name: E-Health Course number: HCI316 CRN XXXX Assignment title or task: Student name: Students ID Number: Submission date: The Applications of Virtual Reality in Healthcare: from a Provider’s Perspective in Saudi Arabia. In this 600-word

Accounting Question

Description I want the answer without similarity at all, and Conceptual and professional, they’re important. College of Administration and Finance Sciences Assignment (2) Deadline: Thursday 27/11/2025 @ 23:59 Course Name: Introduction to AIS Student’s Name: Course Code: ACCT402 Student’s ID Number: Semester: 1st CRN: Academic Year: 1447 H For Instructor’s

Managerial Accounting – Using Microsoft Excel only

Description 1- Please use ‘Friend 1 Solution’ and ‘Friend 2 Solution’ only as references for the final answers, since both received full marks, unless you believe there is a better approach to any part of the solution. I need you to solve the assignment in your own style and fully

Computer Organization (0102240) Group Project

Description 2025 Student ID Student Name 1 2 3 4 Instructions: 1. Each group can have 2 to 4 students. 2. The report should be 5-10 pages only with Times New Roman font of size 12. 3. Provide screenshots and figures in your report. 4. Use references and citation in

Project cs 350

Description see College of Computing and Informatics Project Deadline: Thursday 04/12/2025 @ 23:59 [Total Mark is 14] Student Details: CRN: Name: Name: Name: ID: ID: ID: Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated

Project 352 cs

Description see College of Computing and Informatics CS352 – Systems Analysis and Design Project Deadline: Tuesday 02/12/2025 at 23:59 Students Details: [Total Mark is 14] CRN: ### Name: Student1 (Leader) Name: Student2 Name: Student3 Name: Student4 Name: Student5 ID: 123456789 ID: 123456789 ID: 123456789 ID: 123456789 ID: 123456789 General Instructions:

mRNA vaccine ( Pfizer ) solve

Description Tobic: mRNA vaccine ( Pfizer ) The immunity assignment has been uploaded to Blackboard. Each group should choose only one vaccine and create a Word document about it, as outlined in the assessment table: – Vaccine name, description, and type – How does it work? – Where is it

ppt solve new

Description Title : Post-translational processing of proteins, modifications, targeting & sorting * The endomembrane system and secretory pathway. Transport through the endomembrane system. Targeting to non-endomembrane organelles.* Sorting of proteins; Mitochondria and Peroxisomes* Proteolytic post-translational processing of adhesins in a pathogenic bacterium

Management Question

Description Please provide answers to the questions from pages 8–12 of the Personal Action Plan. The answers should be written from a personal perspective, and no quotations should be used. Additional Notes: Word count of 1000 for the whole report should be fine for the action plan. Please disregard the

Management 301

Description Learning Goal: I’m working on a (mgt301) multi-part question and need support to help me learn. Students are advised to make their work clear and well presented; marks may be reduced for poor presentation. This includes filling your information on the cover page. Students must mention question number clearly

Project Data Structure CS240

Description Please only complete stages one and two; they are for me. Please do not use artificial intelligence or plagiarism, as the course instructor emphasizes these points. Please solve the project using only the material slides, without any external sources. College of Computing and Informatics Project Deadline: Tuesday 02/12/2025 @

Logistics Management (MGT 322)

Description College of Administrative and Financial Sciences Logistics Management ASSIGNMENT –3 Submission Date by students: 06/12/2025 Place of Submission:Students Grade Centre Weight:10 Marks Learning Outcome: 1. Demonstrate an understanding of how global competitive environments are changing supply chain management and logistics practice. 2. Apply essential elements of core logistic and

361 ASS 15

Description SEE College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: Fundamentals of Safety Course number: PHC 361 CRN: Paper Assignment Assignment title or task: (You can write a question) 1. What is the difference between Risk and Hazard? 2. What is the role of Promotion

An e-mail is sent to Party B, in order to form a contract

Description LAW-402: Law of E-Commerce LAW 402 Case Study Assignment Instructions Action Items An e-mail is sent to Party B, in order to form a contract. Party A is the sender of the email. Party A’s identification is located at the top of the e-mail and is sufficient to show

515 ct group

Description The Role of Human Rights in Global Health Ethics Your paper should meet the following structural requirements: Three to six pages in length, not including the cover sheet and reference page. Formatted according to APA 7th edition and Saudi Electronic University writing standards. Provide support for your statements with

MGT – 401 (Strategic Management)

Description Below are the conditions for completing the assignment. Additionally, there are further requirements inside the file that must be followed: -Make sure to avoid plagiarism as much as possible . -Use font Times New Roman , 12 font sizes. -Use 1.5 line spacing with adjust to all paragraphs (

Healthcare Leadership – Critical Literature Review

Description write like a family medicine resident in jeddah, Saudi Arabia with out mentioning that. The task you do: Write a 2,000-word critical review of the literature on leadership, culture, motivation and feedback and its application within your professional environment. In relation to the literature in healthcare leadership: 1- Critique