____ applications are designed to monitor external requests that are sent to obtain access to the database, and the database environment's responses to these requests.

A. Mixed mode
B. Middleware
C. Communicator
D. Logical


Answer: B

Computer Science & Information Technology

You might also like to view...

When using the Windows 8 Search box, keep in mind that you can alter the search for all of the following specific categories, EXCEPT _____.

A. Apps B. Settings C. Pinned applications D. Files

Computer Science & Information Technology

In the equation x = y/z if all of the variables are int and the values are y = 25 and z = 11, what will be the value of the variable x?

A. 2 B. 3 C. 2.27272727 D. 2.3

Computer Science & Information Technology

Jane, the security administrator for a company, needs to assign permissions for users on her network. Which of the following would allow Jane to give ONLY the appropriate permissions necessary?

A. Separation of duties B. Job rotation C. Privilege escalation D. Least privilege

Computer Science & Information Technology

Biometrics includes the use of which of the following authentication methods?

A. Single sign-on B. Retinal scan C. Common access card D. ACLs

Computer Science & Information Technology