This page contains detailed notes on Web Architecture, PHP programming syntax, Network Layers, and E-commerce models. Part A covers 5-mark concepts, and
Part B 8,9,10 are short for full marks; expand the context.
The architecture of a web browser consists of several distinct components that work together to retrieve, interpret, and display web content. The main components are:
A function in PHP is a block of statements that can be used repeatedly in a program. It does not execute automatically when a page loads but is executed by a call to the function.
A user-defined function declaration starts with the keyword function, followed by the name. Function names are not case-sensitive.
Information can be passed to functions through arguments, which act like variables.
You can define a default parameter. To let a function return a value, use the return statement.
To pass by reference (allowing the function to change the variable), use the & operator.
The TCP/IP (Transmission Control Protocol/Internet Protocol) model is the foundational framework for the internet. It is divided into four distinct layers:
E-commerce operations must adhere to specific ethical standards and legal frameworks to maintain consumer trust and avoid litigation.
Definition: An information system specially designed to automate human resource activities in an organization is known as Human Resource MIS (or HRIS). It is concerned with all activities related to the organization's staff and future employees.
Functional Areas Supported:
Servers are the backbone of network architecture, handling specific tasks to manage network resources and data. There are three primary categories of servers: Web Servers, Database Servers, and Application Servers.
Definition: Web servers are computers that deliver (or "serve up") Web pages. Every Web server has an IP address and possibly a domain name.
Fundamental Operation: A client (browser) enters a URL. This sends a request to the Web server. The server fetches the page (e.g., index.html) and sends it back to the browser.
Functions of a Web Server:
Examples: Apache Web Server (Open-source), IIS Web Server (Microsoft), Google Web Server (GWS).
Definition: A Database Server is a computer in a LAN dedicated to database storage and retrieval. It holds the DBMS and the databases themselves.
How it Works: Upon requests from client machines (via SQL), the database server searches the database for selected records and passes the results back over the network.
Key Features:
Examples: Oracle, MySQL, SQL Server, DB2.
Definition: An application server is a server program in a distributed network that provides the business logic for an application program. It is part of the three-tier architecture.
The Three-Tier Architecture:
Examples: Jboss, Glassfish, Weblogic (Oracle), Websphere (IBM).
Variables are "containers" for storing information. A variable is created the moment you first assign a value to it.
Rules:
$ sign, followed by the name.$age and $AGE are different).Data Types: String, Integer, Float, Boolean, Array, Object, NULL, Resource. You can use var_dump() to inspect types.
global keyword.
static to preserve the value.
Constants are identifiers for simple values that cannot be changed. Unlike variables, they do **not** use the $ sign and are automatically **global**.
1. Using define():
2. Using const keyword:
3. Array Constants:
Communication media refers to the means by which data is transmitted in a network.
Physical cables connecting devices. More stable and secure.
Uses electromagnetic waves without physical conductors. Offers mobility but can suffer from interference.
B2C involves the sale of products or services directly from a business to individual consumers (e.g., Amazon, Walmart).
Key Elements:
B2C Models:
B2B models focus on transactions between businesses (Manufacturers, Wholesalers, Retailers).
Primary B2B Models:
Definition: A Transaction Processing System (TPS) is an information processing system used for business transactions involving the collection, modification, and retrieval of transaction data. It ensures data availability, security, and integrity.
Features: Controlled Access, Fast Response, Reliability, Inflexibility (Standard format), Connection with external environments.
Advantages & Disadvantages: