Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Tuesday 11/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Tuesday 11/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Tuesday 11/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

321 ass 4

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name Applied Biostatistics Course number PHC 321 CRN 10785 Fasting Blood Glucose Levels in Diabetic and Non-Diabetic Adults: A hypothetical dataset of sample size 120 has been generated to explore differences in fasting blood glucose levels

321 ass 5

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name Applied Biostatistics Course number PHC 321 CRN 10785 Fasting Blood Glucose Levels in Diabetic and Non-Diabetic Adults: A hypothetical dataset of sample size 120 has been generated to explore differences in fasting blood glucose levels

hci 213 pre 2

Description Topic: What are the benefits, uses, and challenges of medical coding systems?

PH solve new

Description General Guide / Instructions: Write your name and University ID at the top of your report. Read the assignment instructions and rubrics carefully. Do not copy and paste directly from slides or textbooks. Provide at least Two scientific reference for each question (textbook, journal, or reliable website). Plagiarism or

111 ass 2

Description zeee College of Health Sciences Department of Health Informatics ASSIGNMENT COVER SHEET Course name Introduction to Health Informatics Course number HCI 111 Assignment 1 Assignment questions 1. Describe at least three reasons why health information systems implementation fails and discuss how to overcome these pitfalls. (6 marks) 2. Examine

111 ass 3

Description See College of Health Sciences Department of Health Informatics ASSIGNMENT COVER SHEET Course name Introduction to Health Informatics Course number HCI 111 Assignment 1 Assignment questions 1. Describe at least three reasons why health information systems implementation fails and discuss how to overcome these pitfalls. (6 marks) 2. Examine

Management Question

Description Students are supposed to read the attached Case -Panda Sunglasses. Based on your understanding of the case and basic concepts of Entrepreneurship. Answer the following question: 1. How can social entrepreneurs such as the founders of Panada Sunglasses use their companies’ social missions to attract customers and promote their

321 ass 1

Description seebbxvvb PatientID Group 1 Diabetic 2 Diabetic 3 Diabetic 4 Diabetic 5 Diabetic 6 Diabetic 7 Diabetic 8 Diabetic 9 Diabetic 10 Diabetic 11 Diabetic 12 Diabetic 13 Diabetic 14 Diabetic 15 Diabetic 16 Diabetic 17 Diabetic 18 Diabetic 19 Diabetic 20 Diabetic 21 Diabetic 22 Diabetic 23 Diabetic

Corporate Finance

Description Corporate Finance Course Code: FIN201 CRN: Assignment Title: Capital Structure and Cost of Capital (Group Project – Simulated Activity) Semester: Second Academic Year: 2025-26th Suggested Role Division Student Name Student ID Assigned Part Section Title Part A Part B Part C Part D For Instructor’s Use only Instructor’s Name:

Principles of Management 101

Description This assignment is an individualassignment. • THE DUE DATE FOR ASSIGNMENT 3 IS 06/12/2025. • THE ASSIGNMENT MUST BE SUBMITTED ON BB ONLY IN WORD FORMATVIA THE ALLOCATEDFOLDER. PDF IS NOT ACCEPTABLE, AND IT WILL LEAD TO ZERO GRADE. • ASSIGNMENTS SUBMITTED THROUGH EMAIL WILL NOT BE ACCEPTED. •

241 PRE 1

Description 5. Nutrition for Fitness and Athletic Performance Topic: Eating to Fuel Performance Subtopics: Pre-, during-, and post-workout nutrition Protein and supplements Hydration strategies Nutrition for specific sports (endurance vs strength) Focus: Evidence-based advice vs fads

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Monday 10/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Monday 10/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ### ID: ### CRN: ### Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard

Computer Science Question

Description see College of Computing and Informatics Assignment 2 Deadline: Tuesday 10/11/2025 @ 23:59 [Total Mark for this Assignment is 8] Student Details: Name: ID: CRN: Instructions: • You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated

MGT530 M10-Discussion Forum: Inventory Management and Aggregate Planning

Description I need help completing a discussion board post for my Management course (Operation Management). Below are the exact requirements provided by my instructor: Description: In this module, you will learn about inventory management and aggregate planning. The focus of aggregate planning is intermediate-range capacity planning. Usually, the intermediate-range covers