The Internet Database Environment
Web servers should be configured in which of the following ways?

unauthorized access is impossible.
unauthorized access is possible.
unauthorized access is restricted.
unauthorized access is unrestricted.

ANSWER DOWNLOAD EXAMIANS APP

The Internet Database Environment
What is Hypertext Transfer Protocol (HTTP)?

The protocol to copy files between computers
The hardware/software protocol that limits access to company data
The database access protocol for SQL statements
The transfer protocol to transfer Web pages to a browser

ANSWER DOWNLOAD EXAMIANS APP

The Internet Database Environment
Common Gateway Interface (CGI) is which of the following?

An interface that accepts and returns data that may be written in SQL.
A small program that executes within another application and is stored on the server.
A small program that executes within another application and is stored on the client.
An interface that accepts and returns data that may be written in any language that produces an executable file.

ANSWER DOWNLOAD EXAMIANS APP