The Internet Database Environment A proxy server is used for which of the following? To process client requests for Web pages To process client requests for database access To provide TCP/IP To provide security against unauthorized users To process client requests for Web pages To process client requests for database access To provide TCP/IP To provide security against unauthorized users ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Common Gateway Interface (CGI) is which of the following? A small program that executes within another application and is stored on the server. A small program that executes within another application and is stored on the client. An interface that accepts and returns data that may be written in any language that produces an executable file. An interface that accepts and returns data that may be written in SQL. A small program that executes within another application and is stored on the server. A small program that executes within another application and is stored on the client. An interface that accepts and returns data that may be written in any language that produces an executable file. An interface that accepts and returns data that may be written in SQL. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Client-side extensions: add functionality to the browser. add functionality to the server. add functionality to the firewall. add functionality to the network. add functionality to the browser. add functionality to the server. add functionality to the firewall. add functionality to the network. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Which of the following is true about Microsoft Active Server Pages (ASP)? It does not use tags. It allows for coding of custom tags in an HTML file. It is executed on the client. It is stored in .cfm files. It does not use tags. It allows for coding of custom tags in an HTML file. It is executed on the client. It is stored in .cfm files. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Web servers should be configured in which of the following ways? unauthorized access is unrestricted. unauthorized access is restricted. unauthorized access is possible. unauthorized access is impossible. unauthorized access is unrestricted. unauthorized access is restricted. unauthorized access is possible. unauthorized access is impossible. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment XML is a rapidly developing scripting language that may, in conjunction with XHTML, replace HTML. True False True False ANSWER DOWNLOAD EXAMIANS APP