php mysql我是新手 网上找不到 不要模板和框架
超市 服务 电视机 手机, 这些数据如何分别放进数组里然后存进数据库的一个字段,
每个店后台更新这数据
然后怎么读取出来放到导航里
或者给个可以通过后台数据库更改数据的导航菜单,二级导航里的数据不限;
每个店的商品的种类是不同的输出二级导航的内容也不同
能正常显示
能正常操作
能正常跳转店铺
数据不丢失
回复讨论(解决方案)
楼主要这个干嘛,是完成老师的作业?如果自己想学php的话,自己通过实践可以学到很多东西的哦。
先mark一下,晚上晚上回去帮你弄一个。
二级导航为数组
我很笨,我不会猜谜语
假设有100个店,每个店铺的商品数量不同的,怎样把这些店铺的商品分类名称用数组放到他们放商品分类名称的字段里,并且能在导航菜单里显示商品分类名称,通过点击商品分类名称显示对应的商品类别。就是未注册的用户登录网站点击a店铺a的导航里显示a的商品分类名称,点击b店铺b的导航里显示b的商品分类名称。
好几天了怎么做
tb_member(表)
字段:mid(id) shopname(店铺名) ShangPinFenLei(商品分类)
1 a店铺 这里放有10件商品分类名称
2 b店铺 这里放有13件商品分类名称
3 c店铺 这里放有6件商品分类名称
4 d店铺 这里放有12件商品分类名称、
...............................

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

Alipay PHP...

Session hijacking can be achieved through the following steps: 1. Obtain the session ID, 2. Use the session ID, 3. Keep the session active. The methods to prevent session hijacking in PHP include: 1. Use the session_regenerate_id() function to regenerate the session ID, 2. Store session data through the database, 3. Ensure that all session data is transmitted through HTTPS.

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

Article discusses essential security features in frameworks to protect against vulnerabilities, including input validation, authentication, and regular updates.
