FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

TYPES OF COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Which application delivery method is considered to be in a two-tier pattern in which the presentation is stored on your computer and the code and data are stored on a server?
A
Local Installation
B
Local Network Hosted
C
Cloud Hosted
D
n-tier
Explanation: 

Detailed explanation-1: -Expert-Verified Answer. Local Installation is stored on your computer and the code and data are stored on a server.

Detailed explanation-2: -Two-tier architecture. In a two-tier architecture, the client is on the first tier. The database server and web application server reside on the same server machine, which is the second tier. This second tier serves the data and executes the business logic for the web application.

Detailed explanation-3: -A two-tier architecture is a software architecture in which a presentation layer or interface runs on a client, and a data layer or data structure gets stored on a server. Separating these two components into different locations represents a two-tier architecture, as opposed to a single-tier architecture.

Detailed explanation-4: -In the two-tier model, a Java applet or application talks directly to the data source. This requires a JDBC driver that can communicate with the particular data source being accessed. A user’s commands are delivered to the database or other data source, and the results of those statements are sent back to the user.

Detailed explanation-5: -Firewalls. A firewall is a software program or piece of hardware that blocks hackers from entering and using your computer. Hackers search the internet the way some telemarketers automatically dial random phone numbers.

There is 1 question to complete.