You should definitely consider them as entry points. The url query string mentioned in the question
is just a custom scheme for requests but the purpose is the same. Some other example of customized schemas are:
To know more join our Ethical Hacking Course Online today.