One tier architecture: In this model, the entire application runs on a single machine, with the user interface, business logic, and data storage all located on the same system. This is the simplest architecture model, but it has limitations in terms of scalability and security.
Two tier architecture: This model separates the application into two parts: the user interface and the database. The user interface is responsible for presenting information to the user and accepting input, while the database stores the application data. This architecture is commonly used for client-server applications.
Three tier architecture: In this model, the application is divided into three layers: the presentation layer, the application layer, and the data layer. The presentation layer handles the user interface, the application layer contains the business logic, and the data layer manages the storage and retrieval of data.
n-tier architecture: This model is an extension of the three-tier architecture, with additional tiers added for increased scalability and flexibility. It allows for the distribution of functionality across multiple systems, making it ideal for large and complex applications.
3.5 Given a scenario, configure and use web browsers
Caching/clearing cache
When a web browser loads a webpage, it stores some of the page's data, such as images and HTML files, in a cache. This is done to speed up the loading of pages that have already been visited.
However, over time, this cached data can take up a lot of space, slow down the browser, and even cause errors when loading certain pages. Clearing the cache is the process of deleting this stored data. This can be done by accessing the browser's settings and finding the option to clear browsing data.
Deactivate client-side scripting:
Client-side scripting refers to the use of programming languages such as JavaScript to create interactive elements on a webpage, such as dropdown menus or pop-up windows. While these can be useful features, they can also be used maliciously to inject harmful code into a user's browser. Disabling client-side scripting can help protect against these types of attacks. This can usually be done by accessing the browser's settings and finding the option to disable JavaScript.
Browser add-ons/extensions:
Browser add-ons or extensions are small software programs that add functionality to a web browser. They can range from simple tools like ad-blockers to more complex programs like password managers. Add-ons can be installed from the browser's app store or downloaded from third-party websites. They can be managed by accessing the browser's settings and finding the option to manage add-ons. From here, users can add, remove, enable, or disable add-ons.
Private browsing
Private browsing is a feature available in most web browsers that allows users to browse the web without saving any browsing history, cookies, or form data. It is also sometimes referred to as "incognito mode" or "private mode." When a user enables private browsing, the browser will not save any data related to their online activity, including URLs visited, cookies, form data, and temporary files. This can be useful for maintaining privacy, as well as for testing and troubleshooting purposes.
Proxy settings
Proxy settings are a set of configuration options in a web browser or other network-enabled application that determine how the application connects to the internet. A proxy server acts as an intermediary between the user's device and the internet, allowing users to access content that may be blocked or restricted by their local network or ISP. Proxy settings typically include options for configuring the proxy server address and port, as well as authentication credentials if required.
Certificates
Certificates are digital documents that are used to establish trust between two parties in an online transaction. In the context of web browsing, certificates are used to verify the identity of a website and to establish a secure encrypted connection between the user's device and the website's server. When a user visits a secure website, such as one that uses HTTPS, the browser checks the website's certificate to ensure that it is valid and has been issued by a trusted certificate authority (CA). If the certificate is invalid or untrusted, the browser will display a warning message to the user.
Valid: A valid certificate is one that has been issued by a trusted certificate authority and is currently within its validity period. A valid certificate indicates that the website has been authenticated and that the connection between the user's device and the website's server is secure.
Invalid: An invalid certificate is one that has not been issued by a trusted certificate authority or is outside of its validity period. An invalid certificate may indicate that the website is not who it claims to be, or that the connection between the user's device and the website's server is not secure. When a user encounters an invalid certificate, they should exercise caution and consider whether it is safe to proceed with the connection.