Access over 20 million homework & study documents

Week 4 Db

Content type
User Generated
Subject
Software Development
School
American InterContinental University
Type
Homework
Rating
Showing Page:
1/3
Week 4 DB
Question 1
Communication and operational policies are found in all tiers. These policies, in the first
tier, provide a method or a way in which a user can connect with the application. These policies
reorganize data, along with rendering it for display. Furthermore, these policies are accountable
for passing information from the components of UI located in the client tier to the application or
business layer with the intention that this data can be used for performing the command given to
it prior to taking it to the 3
rd
tier for storing the information. Components of business workflow
located in the 2
nd
layer are amid these policies and defining, and coordinating multi-step, long-
running processes of business is its main function. These are the policies that are accountable for
making sure that every tier is secured that cannot be easily hacked. To handle performance
counters and commands There are also additional components accountable (Q Wang, 2013).
Question 2
An application’s all layers have dissimilar components that make sure that the application
functions as expected. In the n-tier software, this is the case. There are fundamental components
help to resolve issues and relays of commands. These elements instance include:
Components for security implementation: They essentially only perform validation,
authorization, and authentication. They are accountable to keep the information safe from
being misused.
Components for data access: They allow the user for accessing data that was stored
previously. This makes sure that it is easy to configure the application.

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
Business components: Usually, it implements the second tier’s business logic. Basically,
this component makes sure that business commands are working.
Components for User Interface: The main work for this component comprises the
formation of data, making it accessible for displaying, obtaining and data validation that
the user enters.
Question 3
Substantial concerns that take place when there are no communications and operational
policies are discussed below:
1. Deadlock: There would be a conflict between the resources in case of the absence of
proper policies. Ultimately, a situation of deadlock will be created where a task cannot be
completed because there would be no usage of the resources.
2. Latency: In case of the absence of proper policies, there would be performance lag
suffered at the side of the end-user for the reason that the location of database servers is
different than the location of Application servers.
In the middle of the network performance and resources’ tradeoff, only operational and
communications policies can remove the latency and the situation that may arise due to deadlock

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up
Unformatted Attachment Preview
Week 4 DB Question 1 Communication and operational policies are found in all tiers. These policies, in the first tier, provide a method or a way in which a user can connect with the application. These policies reorganize data, along with rendering it for display. Furthermore, these policies are accountable for passing information from the components of UI located in the client tier to the application or business layer with the intention that this data can be used for performing the command given to it prior to taking it to the 3rd tier for storing the information. Components of business workflow located in the 2nd layer are amid these policies and defining, and coordinating multi-step, longrunning processes of business is its main function. These are the policies that are accountable for making sure that every tier is secured that cannot be easily hacked. To handle performance counters a ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Goes above and beyond expectations!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4