Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

271 ass 9

Description sww College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: Introduction to Disease Course number: PHC271 CRN Answer the following questions: Assignment title or task: Q1- What are life style induced diseases? Explain [2 Marks] Q2- Choose any life style induced disease and explain it

515 dis 14

Description Assume your healthcare facility has gone bankrupt due to mismanaged funds by the Board of Directors. Examine the legal and ethical ramifications of this, including care for the community. How could healthcare reform have prevented this from happening? Embed course material concepts, principles, and theories (which require supporting citations)

520 dis 13

Description In this week’s discussion: Discuss how the COVID-19 pandemic has influenced the healthcare safety and quality initiatives set forth in KSA’s Vision 2030. Describe the barriers that the COVID-19 pandemic has created. Analyze the role of the healthcare quality improvement specialist to mitigate these barriers and drive quality in

520 dis 14

Description In this week’s discussion, you will analyze hospital readmission rates and the role of quality improvement to achieve desired outcomes. Describe the importance of reducing hospital readmissions. Explain how healthcare quality improvement science can be used to guide reducing hospital readmission rates. Provide an example of a quality improvement

351 ass 15

Description see ASSIGNMENT COVER SHEET Course name: Health and Environmental Risk Assessment Course number: PHC 351 CRN: XXXX Assignment title or task: (You can write a question) Discuss the steps and methods of risk communication and community engagement and support your answer with examples. Student name: xxxx Student ID: xxxx

Help-mgt324

Description No Plagiarism , No Matching will be acceptable .clear and presented using APA Style Reference . ✨Add 6 references✨ All answers must be typed using Times New Roman ( Size12 , Double-space)font . No pictures containing text will be acceptable and will be considered plagiarism. proper examples and explanations

Module 11: Critical thinking in ECN-500

Description Global Foreign Exchange Market Analysis Conduct a comprehensive analysis of the global foreign exchange market, addressing the following points: Describe the structure and key participants of the foreign exchange market, including banks, dealers, and non-bank intermediaries. How has the market evolved over the past two decades? Explain the concept

Management Question

Description SEE ATTACHMENTS LIKE USUAL STICK WITH INSTRUCTION AND DONT USE AI PLEASE. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Entrepreneurship and small business (MGT 402) Due Date: 06/12/2025@ 23:59 Course

Management Question

Description SEE ATTACHMENTS LIKE USUAL STICK WITH INSTRUCTION AND DONT USE AI PLEASE. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 MGT403 (1st. Term 2025-2026) Deadline:6th December 2025 @ 23:59 Course Name:

Management Question

Description SEE ATTACHMENTS LIKE USUAL STICK WITH INSTRUCTION AND DONT USE AI PLEASE. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Organization Design and Development (MGT 404) Due Date: 06/12/2025 @ 23:59

Management Question

Description SEE ATTACHMENTS LIKE USUAL STICK WITH INSTRUCTION AND DONT USE AI PLEASE. ‫المملكة العربية السعودية‬ ‫وزارة التعليم‬ ‫الجامعة السعودية اإللكترونية‬ Kingdom of Saudi Arabia Ministry of Education Saudi Electronic University College of Administrative and Financial Sciences Assignment 3 Quality Management (MGT 424) Due Date: 06/12/2025 @ 23:59 Course Name:

Economics Question

Description Global Foreign Exchange Market Analysis Conduct a comprehensive analysis of the global foreign exchange market, addressing the following points: Describe the structure and key participants of the foreign exchange market, including banks, dealers, and non-bank intermediaries. How has the market evolved over the past two decades? Explain the concept

FIN-500 Discussion

Description Capital Budgeting and Investment Decisions As we have explored capital budgeting techniques such as Net Present Value (NPV), Internal Rate of Return (IRR), and Payback Period, and how they guide business investment decisions. Assume you are the financial manager of a small manufacturing company considering the purchase of new

Management Question

Description Nocoping HBR’s fictionalized case studies present problems faced by leaders in real companies and offer solutions from experts. This one is based on the HBS case study “AT&T, Retraining, and the Workforce of Tomorrow” (HBP Product 9-820-017) by William R. Kerr, Joseph B. Fuller, and Carl Kreitzberg, which is

Case study LAW402

Description Nocoping LAW 402 Case Study Assignment Instructions Action Items An e-mail is sent to Party B, in order to form a contract. Party A is the sender of the email. Party A’s identification is located at the top of the e-mail and is sufficient to show authentication. Will use

313 ass 13

Description see ASSIGNMENT COVER SHEET Course name: Road Traffic Injuries and Diseases Course number: PHC313 CRN: 11021 Write a short essay to discuss risk factors associated with road crashes and injury severity in the Kingdom of Saudi Arabia Assignment title or task: (You can write a question) ➢ What is

TM 103 SOLVE

Description As per AOU rules and regulations, all students are required to submit their own TMA work and avoid plagiarism. The AOU has implemented sophisticated techniques for plagiarism detection. You must provide all references in case you use and quote another person’s work in your TMA. You will be penalized