The Internet Database Environment Common Gateway Interface (CGI) is which of the following? A small program that executes within another application and is stored on the server. An interface that accepts and returns data that may be written in any language that produces an executable file. A small program that executes within another application and is stored on the client. An interface that accepts and returns data that may be written in SQL. A small program that executes within another application and is stored on the server. An interface that accepts and returns data that may be written in any language that produces an executable file. A small program that executes within another application and is stored on the client. An interface that accepts and returns data that may be written in SQL. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment What is Hypertext Transfer Protocol (HTTP)? The database access protocol for SQL statements The hardware/software protocol that limits access to company data The protocol to copy files between computers The transfer protocol to transfer Web pages to a browser The database access protocol for SQL statements The hardware/software protocol that limits access to company data The protocol to copy files between computers The transfer protocol to transfer Web pages to a browser ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment A proxy server is used for which of the following? To provide security against unauthorized users To provide TCP/IP To process client requests for database access To process client requests for Web pages To provide security against unauthorized users To provide TCP/IP To process client requests for database access To process client requests for Web pages ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment An intrusion detection system does not perform which of the following? May monitor packets passing over the network. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. Tries to identify attempts to hack into a computer system. May monitor packets passing over the network. Set up deception systems that attempt to trap hackers. May transmit message packets to the correct destination. Tries to identify attempts to hack into a computer system. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment A load-balancing approach where requests to one IP address are distributed among the multiple servers hosting the Website at the TCP/IP routing level is DNS (domain name server) balancing. True False True False ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Which of the following is true about Microsoft Active Server Pages (ASP)? It allows for coding of custom tags in an HTML file. It does not use tags. It is stored in .cfm files. It is executed on the client. It allows for coding of custom tags in an HTML file. It does not use tags. It is stored in .cfm files. It is executed on the client. ANSWER DOWNLOAD EXAMIANS APP