Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Information Economics Question

Description Global Foreign Exchange Market Analysis Conduct a comprehensive analysis of the global foreign exchange market, addressing the following points: Describe the structure and key participants of the foreign exchange market, including banks, dealers, and non-bank intermediaries. How has the market evolved over the past two decades! Explain the concept

CT-Module 12: Engaging the Organization in the Change Process

Description CT-Module 12: Engaging the Organization in the Change Process This module offers several fundamental lessons that can determine an organization’s and an employee’s success, beginning with the notion and practice of ethics. Ethics is a sense of right and wrong conduct, and organizations that develop strategic and change management

Insurance Accounting / Acct 424

Description Insurance Accounting Student’s Name: Course Code: ACCT 424 Student’s ID Number: Semester: First CRN: 13971 Academic Year: 1447 H (2025-26) For Instructor’s Use only Instructor’s Name: Habiba Moabber Students’ Grade: /15 Level of Marks: High/Middle/Low Instructions – PLEASE READ THEM CAREFULLY • THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD

Spreadsheet Decision Modelling / MGT425

Description MGT425 Student’s ID Number: Semester: First CRN: Academic Year: 2025-2026 (First Semester) For Instructor’s Use only Instructor’s Name: Dr.Mansour Alsharman Students’ Grade: / out of 10 Level of Marks: High/Middle/Low Instructions – PLEASE READ THEM CAREFULLY ❖ THE ASSIGNMENT MUST BE SUBMITTED ON BLACKBOARD (WORD FORMAT ONLY) VIA ALLOCATED

Business Question

Description Students are advised to make their work clear and well presented, marks may be reduced for poor presentation. This includes filling your information on the cover page. Students must mention question number clearly in their answer. Late submission will NOT be accepted. Avoid plagiarism, the work should be in

Business Question

Description Directions: ✓ Begin with a short introduction about agile development and Cisco’s situation. ✓ Use headings for each question. ✓ Write in clear, simple English with logical flow. ✓ Focus on critical analysis, not just description. ✓ Add examples or short comparisons (from Cisco or Saudi context). ✓ Include

Business Question

Description STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED,MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLINGYOUR INFORMATION ON THE COVER PAGE. • STUDENTS MUST MENTION QUESTION NUMBER CLEARLY IN THEIR ANSWER. • LATE SUBMISSION WILL NOT BE ACCEPTED. • Avoid plagiarism, the work should be

Business Question

Description STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED,MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLINGYOUR INFORMATION ON THE COVER PAGE. • STUDENTS MUST MENTION QUESTION NUMBER CLEARLY IN THEIR ANSWER. • LATE SUBMISSION WILL NOT BE ACCEPTED. • Avoid plagiarism, the work should be

Business Question

Description STUDENTS ARE ADVISED TO MAKE THEIR WORK CLEAR AND WELL PRESENTED,MARKS MAY BE REDUCED FOR POOR PRESENTATION. THIS INCLUDES FILLINGYOUR INFORMATION ON THE COVER PAGE. • STUDENTS MUST MENTION QUESTION NUMBER CLEARLY IN THEIR ANSWER. • LATE SUBMISSION WILL NOT BE ACCEPTED. • Avoid plagiarism, the work should be

project acuting

Description General Instructions Submit the assignment through Blackboard (Word format only) via the designated folder. • Submissions via email or late submissions will not be accepted. • Make sure your work is clear, well‑structured, and includes your complete details on the cover page. • Plagiarism or use of AI-generated content

353 solve alaa

Description This is a group project. Individual submissions will not be accepted. Each group must consist of at least 3 students and no more than 5 students. Each group must appoint a Group Leader who will: Submit the project files on Blackboard. Coordinate the distribution of tasks among members. Monitor

Powerpoint Question

Description Hello i want profissanal presantion for part 3 of ECOM425 Assignment Part 3: Presentation -Group Submission. This is a group presentation (2 or 3 students). Based on the Questions of Assignment Part-2, the presentation slides need to be prepared. 1. goldenscent.com 2. e-procure.net 3. spotcube.com 4. mapp.sa 5. gasable.com

Writing Question

Description Critical Thinking Assignment Provisional Questions for Data CollectionBy this time, you will have a good knowledge of data collection techniques and themeasurement questions and instruments. Develop a good questionnaire based on thechapters from the textbook (module 5-8). The questionnaire must have all types ofquestions you studied in the chapters,

Writing Question

Description Instructions Support your submission with course material concepts, principles, and theoriesfrom the textbook along with few scholarly, peer-reviewed journal articles.✓ Use Saudi Electronic University academic writing standards and APA styleguidelines, citing references as appropriate.✓ Submit your findings in a 3–4-page document, excluding the title page,abstract and required reference page,

Introduction to e-Management

Description Assignment Activity What are the main causes of unemployment? Do you agree that technological advancement in an industry may cause unemployment in that industry? Support your opinion with one example. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University Department

372 ass 13

Description swwwwwwwwwzxzx College of Health Sciences Department of Health Informatics ASSIGNMENT COVER SHEET Course name: Public health outbreak and disaster management Course number: PHC 372 Assignment title The Role of Technology in Public Health Disaster Management “Natural disasters have always been a significant threat to human lives and infrastructure, causing