logo

CuriousTab

CuriousTab

Discussion


Home Database The Internet Database Environment Comments

  • Question
  • Client-side extensions:


  • Options
  • A. add functionality to the server.
  • B. add functionality to the browser.
  • C. add functionality to the firewall.
  • D. add functionality to the network.

  • Correct Answer
  • add functionality to the browser. 


  • The Internet Database Environment problems


    Search Results


    • 1. Websites without a database attached to them have which of the following characteristics?

    • Options
    • A. The ability to generate data via SQL.
    • B. The inability to use a browser to display Web pages.
    • C. Static information using HTML or JavaScript.
    • D. The need to use TCP/IP as the network protocol.
    • Discuss
    • 2. An intrusion detection system does not perform which of the following?

    • Options
    • A. Tries to identify attempts to hack into a computer system.
    • B. May monitor packets passing over the network.
    • C. May transmit message packets to the correct destination.
    • D. Set up deception systems that attempt to trap hackers.
    • Discuss
    • 3. Which of the following is true concerning Web services standards?

    • Options
    • A. Led by only one group.
    • B. Helped by cooperation between companies.
    • C. Not necessary at this time.
    • D. Important so that the web can flourish.
    • Discuss
    • 4. A server-side extension is needed to do what?

    • Options
    • A. Allow a request from a client to access the database.
    • B. Allow a request from a client to access a HTML-formatted page.
    • C. Allow a request from a client to access Web pages.
    • D. All of the above.
    • Discuss
    • 5. An intranet provides which of the following?

    • Options
    • A. Connectivity to all customers
    • B. Connectivity to selected customers
    • C. Connectivity to no customers
    • D. Connectivity to all of the above
    • Discuss
    • 6. Web servers should be configured in which of the following ways?

    • Options
    • A. unauthorized access is restricted.
    • B. unauthorized access is unrestricted.
    • C. unauthorized access is impossible.
    • D. unauthorized access is possible.
    • Discuss
    • 7. XML is which of the following?

    • Options
    • A. A scripting language that states the rules for tagging elements.
    • B. A programming language that states the rules for tagging elements.
    • C. A programming language that allows the creation of customized tags.
    • D. A scripting language that allows the creation of customized tags.
    • Discuss
    • 8. Which of the following is true about Microsoft Active Server Pages (ASP)?

    • Options
    • A. It is stored in .cfm files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 9. Which of the following is true about ColdFusion Markup Language (CFML)?

    • Options
    • A. It is stored in .asp files.
    • B. It is executed on the client.
    • C. It does not use tags.
    • D. It allows for coding of custom tags in an HTML file.
    • Discuss
    • 10. A proxy server is used for which of the following?

    • Options
    • A. To provide security against unauthorized users
    • B. To process client requests for Web pages
    • C. To process client requests for database access
    • D. To provide TCP/IP
    • Discuss


    Comments

    There are no comments.

Enter a new Comment