TutorMe homepage
Subjects
PRICING
COURSES
SIGN IN
Start Free Trial
Brian R.
Instructor and Senior Programmer in SQL databases MS access and VISIo
Tutor Satisfaction Guarantee
SQL Programming
TutorMe
Question:

Corporate bank ABC’s design team has come up with a new, user-friendly design of an online loan application. You have been asked to analyze the new design. What metrics/data would you want to track in order to evaluate the success of the redesign?

Brian R.
Answer:

In order to evaluate the success of the design, it should be evaluated that the data requested through the application are not redundant and are standardized according to the relational database design; therefore it is expected to have the appropriate entities such as the following: • Personal data of the Customer • Customer work data • Customer financial data • Loans offered by the bank • Request tracking table In addition to these entities we can mention some attributes such as the following: • Name, Last name, address, zip code, date of birth, social security number, • Company name, Role, salary, time in the company. • Debts payable, debts receivable, savings. • Type of loan, loan amount, number of installments, the percentage of interest. • Request number, date of the request.

Information Technology
TutorMe
Question:

What is an XSS (Cross Site Scripting) attack? What should be done on a server to prevent this type of attack?

Brian R.
Answer:

It is a script attack between web pages, are attacks directed at web pages that dynamically display the content of users without checking or encoding the information entered by them. This attack seeks to introduce a harmful script and attack its own system, starting from a reliable context for the user. To prevent this attack on a server application you must design a site without vulnerabilities. To do this, the designer must verify the format of the data entered by the users, it is also necessary to encode the user's visible data by replacing the special characters with their HTML equivalents by textual references so that the Meta characters are read as text and potentially infected files cannot be run. For this, most programming languages like Perl, JavaScript or PHP contain predefined functions for the substitution or masking of characters that you can use without problems.

Databases
TutorMe
Question:

What’s the most popular genre of music style in the database of entertainers?

Brian R.
Answer:

select StyleName,max(popular) from ( select count(ea_entertainer_styles.StyleID) as popular,ea_music_styles.StyleName from ea_entertainer_styles,ea_music_styles where ea_entertainer_styles.StyleID=ea_music_styles.StyleID group by ea_entertainer_styles.StyleID ) as t;

Send a message explaining your
needs and Brian will reply soon.
Contact Brian
Ready now? Request a lesson.
Start Session
FAQs
What is a lesson?
A lesson is virtual lesson space on our platform where you and a tutor can communicate. You'll have the option to communicate using video/audio as well as text chat. You can also upload documents, edit papers in real time and use our cutting-edge virtual whiteboard.
How do I begin a lesson?
If the tutor is currently online, you can click the "Start Session" button above. If they are offline, you can always send them a message to schedule a lesson.
Who are TutorMe tutors?
Many of our tutors are current college students or recent graduates of top-tier universities like MIT, Harvard and USC. TutorMe has thousands of top-quality tutors available to work with you.