Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

i want ppt husain

Description 12 slides without plagiarism, covering the topic shown in the image and marked in green. The solution must be correct and include some images and scientific references. Group distribution & topics Group’s members 1-FAISAL AL HUTAYLAH 2-ABEER AL JABIR 3-AMAL AL SHALWAN Group’s topic 1. the steps before a

MGT430 – FINAL REPORT AND PRESENTATION

Description I HAVE FINAL REPORT AND PRESENTAION TO BE SUBMIT IT. I WILL UPLOAD FIRST, SECOND AND THIRD REPORT I HAVE BEEN DONE. FROM THOSE REPORT DO THE FINAL REPORT ”WORD” AND PRESENTATION ”POWERPOINT” AS INSTURCTED. PLEASE FOLLOW THE INSTRUCTION. IF YOU NEED ANY QUESTION ABOUT THE FACILTY OR MY

Decision Making and Problem Solving (MGT 312)

Description I want the answer for Q 1 and 8 For Q1 the answer from EBSCO file 100 word for Q 8 the answer you can take the idea from the file i sent and write less than 100 word please use simple words HBR’s fictionalized case studies present problems

MGT521 M13-Discussion Forum: Measuring Change

Description I need help completing a discussion board post for my Management course (Managing Dynamic Environment). Below are the exact requirements provided by my instructor: Description: The change management process can be viewed as a three-step process: planning, implementation, and evaluation. In this module, we concentrate on the last step

324,mohammmed

Description I want a correct and complete solution for all paragraphs. I must adhere to the instructions. I don’t want plagiarism. I don’t want similarities. I don’t want a solution using artificial intelligence. I want a correct solution. Put the solution inside the file. Include all requirements. Errors are not

MGT402 -402: Entrepreneurship and small busnies

Description hi help eme with my homework with case study Case 1 Panda Sunglasses How Should a Start-Up Business with a Social Mission Market Its Sunglasses with Bamboo Frames? V incent Ko showed his entrepreneurial potential in high school in Rockville, Maryland, when, as a young hockey player, he invented

Critical Thinking: BoP Dynamics & Currency Depreciation

Description Critical Thinking: BoP Dynamics & Currency Depreciation Task #1 Saudi Arabia’s Exchange Rate Policy and BoPDynamics. Saudi Arabia has maintained a fixed exchange rate (SAR 3.75/USD) since 1986. a) Analyze how oil price volatility impacts Saudi Arabia’s BoP under this peg. b) What are the risks of maintaining the

Management Question

Description Critical Thinking Assignment 3 Course Name: Academic Writing and Research Skills Student’s Name: Course Code: RES–500 Student’s ID Number: Semester: 1st CRN: Academic Year: 2025/2026, 1st Term For Instructor’s Use only Instructor’s Name: Students’ Grade: / 15 Level of Marks: High/Middle/Low Regulations: ✓ This assignment is an individual assignment.

Business Question

Description Critical Thinking: BoP Dynamics & Currency Depreciation Task #1 Saudi Arabia’s Exchange Rate Policy and Bop Dynamics. Saudi Arabia has maintained a fixed exchange rate (SAR 3.75/USD) since 1986. Analyze how oil price volatility impacts Saudi Arabia’s BoP under this peg. What are the risks of maintaining the peg

MGT 101 – The concept of management functions, roles, skills of a manager, and the different theories of management

Description ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 MGT101 (1st Term 2025-2026) Duedate: 06/12/2025 @ 23:59 (To be released to students on BB in Week 10) Course Name: Principles of Management

Management Question

Description CAREFULLY • THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD (WORD FORMAT ONLY) VIA ALLOCATED FOLDER. • ASSIGNMENTS SUBMITTED THROUGH EMAIL WILL NOT BE ACCEPTED. • STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED, MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLING YOUR INFORMATION ON

Management Question

Description two assignments for MGT 301 and MGT 311 ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Organizational Behaviour (MGT 301) Due Date: 60/12/2025 @ 23:59 Course Name: Organizational Behaviour Student’s Name:

Strategic Management (MGT 401)

Description CAREFULLY • THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD (WORD FORMAT ONLY) VIA THE ALLOCATED FOLDER. • ASSIGNMENTS SUBMITTED THROUGH EMAIL WILL NOT BE ACCEPTED. • STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED;MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLING IN YOUR INFORMATION

Management Question

Description 1. Identify the main problem and subproblems of the case? [Mark 1] 8. Write the conclusion and overall assessment.[Marks 1] I want the answer for Q 1 and 8 For Q1 the answer from EBSCO file 100 word for Q 8 the answer you can take the idea from

Intro to Operations Management

Description The Assignment must be submitted on Blackboard (WORD format only) viaallocated folder.• Assignments submitted through email will not be accepted.• Students are advised to make their work clear and well presented, marks may bereduced for poor presentation. This includes filling your information on thecover page.• Students must mention question