Data validation refers to checking the content

Assignment Help Computer Networking
Reference no: EM13168541

Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater than) the order date.

Any interactive application, whether for opening a bank account, registering an online complaint, or filing income tax, has a form, web page, or static page that interacts with the user, and, typically, with a database. The form or web page is the front-end application, and the database is a back-end application.

The application can validate data either at the front end or at the back end. At the front end, you write code specific to controls in the form. For example, to enforce the rule that the employee name is required, you can disable the form's submit button when the value in the employee name text box is empty or blank. At the back end, you can apply a NOT NULL constraint to the employee name field in the employee table.

Consider the following:

What are the advantages and disadvantages of front-end and back-end validation?

In which specific situations would one technique of validation be preferred over the other?

Reference no: EM13168541

Questions Cloud

Will compute the value of each piece of clothing. : write a script in MATLAB that will compute the value of each piece of clothing.
Write a c program using the fork() system : Write a C program using the fork() system call that generates this sequence in the child process. The starting number will be provided from the command line. For example, if 8 is passed as a parameter on the command line, the child process will ou..
Work out from the molar mass : An antacid tablet contains 0.1 g of magnesium hydrogencarbonate, Mg(HCO3)2. What mass of stomach acid, HCl, will it neutralise? The reaction between Mg(HCO3)2 and HCl is: Mg(HCO3)2 + 2HCl → MgCl2 + 2CO2 + H2O
What mass of carbon monoxide in grams is present : What mass of carbon monoxide in grams is present in a room measuring 8.5 12.0 18.4 ft ?
Data validation refers to checking the content : Data validation refers to checking the content of data to ensure that it satisfies certain rules, known as constraints. For example, the employee name should never be omitted in the employee table, and the delivery date should be after (greater th..
Which volume of gas decomposition one mole of sodium azide. : Sodium azide, NaN3 , is made for use in car 'air bags'. When this compound is heated to 300 degrees celsius, it rapidly decomposes into its elements.
Create a function that will determine the total resistance : Create a function that will determine the total resistance of a number of resistors that are connected in parallel. This function should accept a row vector for input,
Write an assembly program in mips that get the array size : Write an assembly program in mips that get the array size from the keyboard, then reads a list of integers from the keyboard and writes the sorted list in ascending order to the console screen.
Calculates the product of the following sequence : Write a java code that calculates the product of the following sequence of numbers using for/loop and do/while/loop

Reviews

Write a Review

Computer Networking Questions & Answers

  Describe concept of subnetting and subnet mask

Describe the concept of subnetting and concept of subnet masks. Why do we utilize subnetting? How do we know which bits are used to recognize network?

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Technical means to guarantee data confidentiality

Assess illustrate why technical means to guarantee data confidentiality depend upon trust.

  Describe advantages of having a componentized system

Describe some of the advantages of having a componentized system. For example, what happens if the microwave breaks?

  Developments in adsl broadband technologies

Show practical and theoretical knowledge of LAN/Internet technologies

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Strategy planning for corporate

In another year, after all assignments are completed, you consider to convert back to a volunteer basis with AllTechComm, and to discover more profitable employment, preferably with a major company.

  How to increase capacity if-fiber-optic line reach capacity

England and lies on ocean floor. This fiber-optic line has reached capacity. What alternatives can telephone company consider to increase capacity?

  Explain the purposes of poe in wlan design

Explain the purposes of POE in WLAN design. Provide at least 3 scenarios of POE being used as the prime element in WLAN design to address the projects cost

  Solution for biometric device in the office and at home

Write a narrative describing the advantages of each option recommending a solution. Include web references to each to each of the solution alternatives

  Give advice about use of cryptography to the developer

You have been hired to give advice about use of cryptography to the developer of new two products within a company. Group A is developing a product which will encrypt each user's data before storing it on the hard disk,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd