Explain the purpose and functions of a web browser, including URL structure, the HTTP/HTTPS request‑response cycle, DNS resolution, caching, cookies, and basic security features. Relate each point to the relevant IGCSE assessment objectives (AO1–AO3).
www.example.com) into a numeric IP address (e.g., 93.184.216.34) that computers use to locate each other on the Internet.A web browser is a software application that acts as the user’s gateway to the WWW. It:
A Uniform Resource Locator (URL) tells the browser where a resource is located and how to obtain it.
| Component | Purpose | Example |
|---|---|---|
| Protocol | Specifies the communication method (http or https) | https:// |
| Domain name | Identifies the host server (looked‑up via DNS) | www.example.com |
| Path | Location of the file on the server | /articles/index.html |
| Query string (optional) | Passes data to the server | ?id=25&type=article |
Full example: https://www.example.com/articles/index.html?id=25&type=article
| Function | Description | Typical User Action |
|---|---|---|
| URL Resolution (DNS) | Looks up the domain name in a DNS server and obtains the corresponding IP address. | Enter a web address and press Enter. |
| HTTP/HTTPS Request | Sends a request line (e.g., GET /index.html HTTP/1.1) plus header fields. HTTPS adds an SSL/TLS handshake that encrypts the traffic. |
Click a link, submit a form, or press Enter after typing a URL. |
| Response Handling | Receives a status line (e.g., HTTP/1.1 200 OK or 404 Not Found) and response headers, then the body containing the requested data. |
Browser displays the page or an error message. |
| Rendering Engine | Parses HTML, CSS and JavaScript, builds the Document Object Model (DOM), applies styles and paints the visual layout. | Page appears on the screen automatically after data is received. |
| Cache Management | Stores copies of frequently used resources locally; decides whether to reuse them based on Cache‑Control, Expires and ETag headers. |
Loads a cached image instead of downloading it again. |
| Cookie Handling | Accepts Set‑Cookie headers, stores session or persistent cookies, and sends them back in subsequent requests. |
Log in once and stay logged in on later visits. |
| Security Checks | Validates SSL certificates, blocks known malicious scripts, and shows warnings for deceptive or unsafe sites. | Padlock icon for a secure site; warning page for a flagged site. |
| Bookmarking | Allows users to save and organise favourite URLs for quick access. | Click the star icon to add the current page to bookmarks. |
GET /index.html HTTP/1.1) followed by header fields such as Host, User‑Agent, Accept, and Cookie.HTTP/1.1 200 OK or HTTP/1.1 404 Not Found) and response headers (Content‑Type, Cache‑Control, Set‑Cookie, etc.).Example of a Set‑Cookie header sent by a server:
Set-Cookie: userId=abc123; Expires=Wed, 10 Jan 2027 12:00:00 GMT; Path=/; Secure; HttpOnly
Trace‑table practice (exam‑style):
| Step | Server Response Header | Result in Browser |
|---|---|---|
| 1 | Set‑Cookie: session=xyz; Path=/; HttpOnly | Session cookie stored in memory. |
| 2 | Set‑Cookie: theme=dark; Expires=Fri, 01 Feb 2026 00:00:00 GMT; Path=/ | Persistent cookie saved to disk. |
| 3 | (No Set‑Cookie header) | No change to stored cookies. |
When the user revisits the site, the browser automatically includes the stored cookies in the Cookie request header, e.g.:
Cookie: session=xyz; theme=dark
Cache‑Control, Expires and ETag to decide freshness.Digital currency, also known as cryptocurrency, is a form of electronic money that uses cryptographic techniques to secure transactions and control the creation of new units. The most widely known example is Bitcoin, which operates on a public ledger called a blockchain. A blockchain is a chain of blocks, each containing a list of transactions; once a block is added, it cannot be altered without changing every subsequent block, making fraud extremely difficult.
In the context of the Internet, digital currencies enable peer‑to‑peer payments without a central bank or intermediary. They rely on public‑key cryptography: a user’s “public key” (the address) is shared openly, while the “private key” (known only to the owner) signs transactions to prove ownership. Although not part of the core web‑browser syllabus, understanding digital currency helps learners appreciate emerging web‑based services such as online wallets, smart contracts and decentralized applications (dApps).
A web browser is the gateway to the World‑Wide‑Web. It resolves URLs to IP addresses via DNS, establishes TCP or TLS connections, sends HTTP/HTTPS requests, interprets status codes, manages caches and cookies, renders HTML/CSS/JavaScript, and enforces security through SSL/TLS validation, safe‑browsing warnings and sandboxing. Mastery of these concepts satisfies the Cambridge IGCSE Computer Science requirements for explaining how information travels from a remote server to a user’s screen and for evaluating the security measures that protect that process.
Create an account or Login to take a Quiz
Log in to suggest improvements to this note.
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.