Network Applications

High school
Assignment
Technology
Pages 4 (1004 words)
Download 0
The assignment is about demonstrating any online services and is concerned with the use of any popular server-based programming languages such as servlets/PHP. IN more detailed words, the assignment is concerned with demonstrating the popular concept of 3-tier client-server applications, with the third application being the use of the services provided by a database…

Introduction

This server was the unanimous choice because it was an open source server that was free in addition to being the most popular server, as it required minimal knowledge and effort for the purpose of using it to provide services to the client.
The proposed design was decided to be done in MySQL and the PHP server side scripting language. Under the design, it was also decided that all the required functionalities that accessed the database would be carried out using regular SQL expressions. PHP stands for Hypertext Pre-processor. The initial interface was composed of a web page that listed the various branches where the hotel had its current operations. Next to it was a login system that the user could access by typing the authentic user name & password. Upon entering a valid username & password and upon clicking on the submit button, the PHP used a built in function that executed a SQL query for the purpose of matching the details provided by the user with the user details that were previously present in the web site.
Upon authentication, the user was then allowed to access a web page where there were requisite text fields and lists for allowing the user to initiate a booking transaction that would present the selected details pertaining to the choice of location and the choice of the size of ...
Download paper
Not exactly what you need?

Related papers

Network Management
There does not appear to be a comprehensive IT strategy in place with emphasis on driving the business forward and creating a positive impact on the bottom line. This is reflected in the current network architecture, which is somewhat piecemeal reflecting a 'fire-fighting' approach in its design.…
Network Localization
As such, modern information technology has been considered the result of a crucial connection between digital and communication technologies. It has been declared as the fundamental core of an information system, which involves various interactions between data, the users, software, hardware, business corporations and their environment.…
Computer system Network Security
The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technology advanced in computing, computer systems became targets as well. The need for computer network security system raised when a couple of incidents occurred in the USA. The Federal Bureau of Investigation (FBI) made one of its first arrests related to computer hacking in the…
Computer Network Principles
In order to design or upgrade a computer network for business, we need to consider the goals for the network design and the possible problems that will exist in the network after the design is finished or the problems that already exists in the system. Network designer needs to cooperate with the client completely and find out their business and technical goals. For instance, the network designer…
Network Applications
This server was the unanimous choice because it was an open source server that was free in addition to being the most popular server, as it required minimal knowledge and effort for the purpose of using it to provide services to the client.…
Neural Network
In general a biological neural network is composed of a group or groups of chemically connected or functionally associated neurons. A single neuron may be connected to many other neurons and the total number of neurons and connections in a network may be extensive. These connections are called synapses, are usually formed from axons to dendrites, though dendrodendritic microcircuits and other…
Network Infrastructure
The Internet access is limited to a shared ISDN line in each of the headquarters and a dial-up access in the point of sales, the web presence and e-mail support are outsourced to Yahoo Small Business Services. All users suffer from having numerous usernames and passwords to access various IT systems/applications they have in use. There is no remote access to the company's data. The both…