The Internet Database Environment A proxy server is used for which of the following? To process client requests for Web pages To process client requests for database access To provide security against unauthorized users To provide TCP/IP To process client requests for Web pages To process client requests for database access To provide security against unauthorized users To provide TCP/IP ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Websites without a database attached to them have which of the following characteristics? The inability to use a browser to display Web pages. The need to use TCP/IP as the network protocol. The ability to generate data via SQL. Static information using HTML or JavaScript. The inability to use a browser to display Web pages. The need to use TCP/IP as the network protocol. The ability to generate data via SQL. Static information using HTML or JavaScript. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Which of the following is true about Microsoft Active Server Pages (ASP)? It is stored in .cfm files. It is executed on the client. It allows for coding of custom tags in an HTML file. It does not use tags. It is stored in .cfm files. It is executed on the client. It allows for coding of custom tags in an HTML file. It does not use tags. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. True False True False ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Client-side extensions: add functionality to the firewall. add functionality to the network. add functionality to the server. add functionality to the browser. add functionality to the firewall. add functionality to the network. add functionality to the server. add functionality to the browser. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Web servers should be configured in which of the following ways? unauthorized access is restricted. unauthorized access is possible. unauthorized access is unrestricted. unauthorized access is impossible. unauthorized access is restricted. unauthorized access is possible. unauthorized access is unrestricted. unauthorized access is impossible. ANSWER DOWNLOAD EXAMIANS APP