php?数据的读取
上课形式有很多种,不同的上课形式对应不同的科目,不同的科目对应不同的课程......
这些数据要怎么读取比较合适??
打算用的做法(
当用户点击下拉按钮时,通过ajax将上课形式的的值填充进去.
点击科目下拉按钮时,根据上课形式的选择,在通过ajax将科目的值填充进去
点一次,查一次
)
回复讨论(解决方案)
查表呗,每个上课形式都对应相应的科目
查表呗,每个上课形式都对应相应的科目
那些数据要一次性读出来,还是根据前一次选择,读取下一个??
你的 科目隶属于上课形式,课程隶属于科目
科目还没选定,你怎么取课程?
你的 科目隶属于上课形式,课程隶属于科目
科目还没选定,你怎么取课程?
你的 科目隶属于上课形式,课程隶属于科目
科目还没选定,你怎么取课程?
读取数据时把所有的上课形式和对应的科目一次性取出来,这个就不用一次又一次的访问数据库
都读出来,又用不上,不是浪费吗?
如果还要自己缓存起来,不嫌麻烦吗?
缓存到文件和直接访问数据库有什么区别呢?数据表也是文件
缓存到内存,要运行相关服务和加载相应扩展,不一样增加系统开销吗

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Alipay PHP...

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.
