Enable contrast version

Tutor profile: Brian R.

Inactive
Brian R.
Instructor and Senior Programmer in SQL databases MS access and VISIo
Tutor Satisfaction Guarantee

Questions

Subject: SQL Programming

TutorMe
Question:

Corporate bank ABC’s design team has come up with a new, user-friendly design of an online loan application. You have been asked to analyze the new design. What metrics/data would you want to track in order to evaluate the success of the redesign?

Inactive
Brian R.
Answer:

In order to evaluate the success of the design, it should be evaluated that the data requested through the application are not redundant and are standardized according to the relational database design; therefore it is expected to have the appropriate entities such as the following: • Personal data of the Customer • Customer work data • Customer financial data • Loans offered by the bank • Request tracking table In addition to these entities we can mention some attributes such as the following: • Name, Last name, address, zip code, date of birth, social security number, • Company name, Role, salary, time in the company. • Debts payable, debts receivable, savings. • Type of loan, loan amount, number of installments, the percentage of interest. • Request number, date of the request.

Subject: Information Technology

TutorMe
Question:

What is an XSS (Cross Site Scripting) attack? What should be done on a server to prevent this type of attack?

Inactive
Brian R.
Answer:

It is a script attack between web pages, are attacks directed at web pages that dynamically display the content of users without checking or encoding the information entered by them. This attack seeks to introduce a harmful script and attack its own system, starting from a reliable context for the user. To prevent this attack on a server application you must design a site without vulnerabilities. To do this, the designer must verify the format of the data entered by the users, it is also necessary to encode the user's visible data by replacing the special characters with their HTML equivalents by textual references so that the Meta characters are read as text and potentially infected files cannot be run. For this, most programming languages like Perl, JavaScript or PHP contain predefined functions for the substitution or masking of characters that you can use without problems.

Subject: Databases

TutorMe
Question:

What’s the most popular genre of music style in the database of entertainers?

Inactive
Brian R.
Answer:

select StyleName,max(popular) from ( select count(ea_entertainer_styles.StyleID) as popular,ea_music_styles.StyleName from ea_entertainer_styles,ea_music_styles where ea_entertainer_styles.StyleID=ea_music_styles.StyleID group by ea_entertainer_styles.StyleID ) as t;

Contact tutor

Send a message explaining your
needs and Brian will reply soon.
Contact Brian

Request lesson

Ready now? Request a lesson.
Start Lesson

FAQs

What is a lesson?
A lesson is virtual lesson space on our platform where you and a tutor can communicate. You'll have the option to communicate using video/audio as well as text chat. You can also upload documents, edit papers in real time and use our cutting-edge virtual whiteboard.
How do I begin a lesson?
If the tutor is currently online, you can click the "Start Lesson" button above. If they are offline, you can always send them a message to schedule a lesson.
Who are TutorMe tutors?
Many of our tutors are current college students or recent graduates of top-tier universities like MIT, Harvard and USC. TutorMe has thousands of top-quality tutors available to work with you.
BEST IN CLASS SINCE 2015
TutorMe homepage
Made in California by Zovio
© 2020 TutorMe, LLC
High Contrast Mode
On
Off