Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Discussion Board one question

Description

Q1. Discuss three tier Client-Server DBMS architecture in relation with the functionality of each
layer. How does it improve the security of a database?
2. Respond to two other classmates’ postings by critically reviewing your classmate’s answer
and stating which points you agree or disagree with.
*An example of unacceptable replies: “I agree with you”, “good post I like it”, “I think your post
it good” or any similar are not acceptable replies.
Respond to two other classmates:
1. Maryam Almarzoog:
Three tier Client-Server DBMS architecture and their functionality of each layer:
Presentation tier:
The application’s user interface and communication layer, or presentation tier, is where users
interact with the program. Information presentation and data collection from the user are its
primary goals. This top layer can be used with a graphical user interface (GUI), a desktop
program, or a web browser.
Application tier:
Is the application’s key component. This layer uses business logic, or a particular set of business
rules, to handle data that was gathered in the presentation tier. This processing may involve
comparing the obtained data to other data from the data tier.
Data tier:
A database and a software for controlling read and write access to a database make up the data
tier. This layer, which can be hosted in the cloud or on-premises, is also known as the storage
tier.
It’s Security:
It is possible to apply several security tiers at different levels. Additionally, this reduces possible
attack surfaces by isolating the logic layer from the sensitive data layer. As an example, the logic
Confidential – ‫مقيد‬
layer may be used to cleanse incoming data and impose field-level validation on a form. Due to
the ability to do two checks on the data, security flaws like SQL injection are avoided.
2. SAHAR ALFARAJ:
The three-tier client-server architecture is a systematic framework in database management
systems (DBMS) that improves the functionality and security of the system by partitioning the
application into three separate layers: the display layer, the business logic layer, and the data
network. The presentation layer functions as the user interface, enabling users to engage with
the program by entering data and obtaining output, usually delivered through online forms or
graphical interfaces. The business logic layer serves as an intermediate component, handling
user requests, implementing business rules, and doing essential validations prior to any data
connection. This layer serves to encapsulate the fundamental functionality of the program,
therefore guaranteeing that actions such as computations and data manipulations strictly
conform to predetermined business logic. Ultimately, the data layer has the responsibility of
overseeing all interactions with the database, running queries, and managing the storage and
retrieval of data. The use of this architectural separation greatly enhances database security in
several aspects. Firstly, it facilitates a distinct separation of duties, thereby enabling
autonomous security policies for each layer. For example, confidential database activities might
be limited to the data layer, while user interactions are handled in the presentation layer.
Furthermore, it is possible to incorporate access control techniques at the business logic layer in
order to enforce authentication and permission prior to any request reaching the data layer.
This guarantees that only those with proper authority are able to access privileged information.
Furthermore, the fact that clients do not directly engage with the database server, but rather
through the business logic layer, serves to minimize vulnerability to possible attacks like SQL
injection. Further limiting risks connected with harmful data, the business logic layer also plays a
critical role in verifying user input before it is processed or saved in the database. In summary,
this three-tier design improves both scalability and maintainability, while also providing a strong
foundation for protecting sensitive data and implementing rigorous access controls across the
program.
REFERENCES
Fong, J., & Hui, R. (1999). Application of middleware in the three tier client/server database
design methodology. Journal of the Brazilian Computer Society, 6, 50-64.
Confidential – ‫مقيد‬
Pudichery, J. (2000). 3-Tier Client/Server System In Web-based E-Business Applications.
BUSINESS AND BEHAVIORAL SCIENCES TRACK SECTION OF COMPUTER INFORMATION SYSTEMS
AND MANAGEMENT INFORMATION SYSTEMS, 7(5), 84.
Answer 1:
Respond:
1.
2.
Confidential – ‫مقيد‬

Purchase answer to see full
attachment

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

MGT675 – Project Proposal

Description Hello Doc, I kindly need your help to create the project proposal: The topic is: The Impact of Digital Transformation on Small and Medium Enterprises (SMEs): A Case Study of Saudi Arabia This topic explores how digital technologies (e.g., cloud computing, AI, and e-commerce) influence the growth, efficiency, and

I am working in multi questions about Internship Report

Description College of Administration and Finance Sciences Form No 4- Internship Report Cover Page Student`s Name: Student`s ID: Trainee Department: Training Organization: Field Instructor Signature: Field Instructor Name: Course Title: MGT 430 Internship Start Date: CRN Internship End Date: Academic Year/Semester: For Instructor’s Use only Instructor’s Name: Total Training Hours

375 ass 4

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: PHC375 Promoting Physical Activity and Health Course number: PHC375 CRN Search the Saudi Digital Library for two articles addressing the importance .of physical activity promotion for public health 1. Compose a 300-500-word essay in which

dis

Description Module 02: Discussion 2 file Research two electronic records management vendors. Discuss the retention recommendations made by the vendors? Why do they make these recommendations? Discuss the services or solutions each vendor offers. Why are these important to a business manage . . dis one file How does globalization

project E-commerce101 part 1,2 and presentation

Description noo coping plea College of Administrative and Financial Sciences ECOM101 – E-commerce E-commerce Project Second Semester/ 2024-2025 Restricted – ‫مقيد‬ Guidelines for the assignment (part A & B): The answer sheet must include the following: • Cover page • Questions • Answers Make sure to include the cover page

DB – Module 01: Introduction to Leadership

Description In this module, we will begin our exploration of the concepts of leadership and the leadership process. The distinction between the roles of managers and the roles of leaders is clarified, and examples of the skills needed for each are presented. Leadership will be conceptualized in various ways. We

I need editing the reference.

Description It was this question. Ppt 1. analysis the secondary characters, Mrs. Joe Gargery and Joe Gargery, in Charles Dickens’ novel Great Expectations. (No themes, only deep dive in these characters) Title 4-5 slides The content should be in the form of points not paragraphs Ppt 2 Comparison between Jane

ct s

Description hc info 570 CT 7 file Create a PowerPoint presentation that reviews four articles written in the last five (5) years on sharing patient information in a cloud-based Health Information Exchange (HIE) in the Kingdom of Saudi Arabia. Your presentation should cover the following concepts: * Discuss how data

375 ass 3

Description see College of Health Sciences Department of Public Health ASSIGNMENT COVER SHEET Course name: PHC375 Promoting Physical Activity and Health Course number: PHC375 CRN Search the Saudi Digital Library for two articles addressing the importance .of physical activity promotion for public health 1. Compose a 300-500-word essay in which

Discussion – Managing Performance for Results

Description – I want original text, no plagiarism. – You can find the instructions in the file. Please read it carefully. – APA Style Thanks – Textbook: Aguinis, H. (2023). Performance management (5th ed.). Chicago Business Press. ISBN: 978-1-948426-48-0 Textbook: Aguinis, H. (2023). Performance management (5th ed.). Chicago Business Press.

hci 314 act 2

Description provide 5 different answers and each answer has different references Describe what are the standards for public health information services?

I need editing the reference

Description It was this question. Ppt 1. analysis the secondary characters, Mrs. Joe Gargery and Joe Gargery, in Charles Dickens’ novel Great Expectations. (No themes, only deep dive in these characters) Title 4-5 slides The content should be in the form of points not paragraphs Ppt 2 Comparison between Jane

i need just editing the comment

Description Master of Healthcare Administration HCM 600 Research Project The Impact of Technology on Enhancing the Quality of Outpatient Care Services after COVID-19 in Saudi Arabia: A Systematic Review Submitted in Partial fulfillment of the Requirements for the Degree of MSc of Healthcare Administration Prepared by Jamal Khaled S Aljamal

Business Ethics and Social Responsibility ( project + presentation)

Description Avoid plagiarism Note: The project shall be for 08-10 pages A4 size, Times New Roman, font-12, single spacing, margins – normal BUSE 619 – Business Ethics and Social Responsibility Project Rubric Spring – 2025 Graded: 15 Marks Submission Date: The Assignment shall be graded according to the following standards:

Management Question

Description Reflective Journal Assignment Assignment Title: Reflective Journal Assignment Grade: 10 marks Description: The purpose of this assignment is to enhance your critical thinking and self-reflection skills. You are required to write three reflective journals during the semester, each approximately 300 words. Each journal should reflect your personal experience or

ct s

Description Policy and Supply and Demand (110 Points) Various programs to increase employment in the healthcare sector have recently been introduced in the Kingdom of Saudi Arabia. As a result, an increasing number of foreigners have been provided with the opportunity work in the Kingdom. Studies show that 30% of

leadership – Questions

Description -Think about a position you have held in an organization. -To what extent were you a leader? -To what extent were you a follower? -Did the managers exhibit managerial or leadership behaviors? Explain. -Do you believe that managers and leaders reflect fundamentally different personality types? c Avoid plagiarism please