The client tier interacts with the ________ tier to access information from the ________ tier

a) middle; information
b) information; middle
c) information; bottom
d) bottom; information


a) middle; information

Computer Science & Information Technology

You might also like to view...

A Web address consists of a ____, a domain name, sometimes the path to a specific Web page or location in a Web page, and the Web page name.

A. protocol B. format C. storage D. B2C

Computer Science & Information Technology

A(n) ____ selector is a name preceded by a period.

A. elemental B. concatenated C. class D. active

Computer Science & Information Technology

The Work Product Doctrine is a legally defined category of privileged information

a. True b. False

Computer Science & Information Technology

The ____ operation is used to add an element onto the stack.

A. push B. pop C. add D. insert

Computer Science & Information Technology