Create a web page that has a form

Assignment Help Computer Engineering
Reference no: EM132188696

Workshop Seven - 7.5 Dropbox

Create A Survey Form

Introduction and Alignment

Forms on the web are used in many different ways. One common use of forms is for a survey. For this assignment you will create a survey form that has the following input attributes: text, radio button, and check box group. The form must also have a text area element as well as a select box. Last of all, the form will need submit and reset buttons. A table should be used to organize the form.

Upon completion of this assignment you should be able to:

Create a web page that has a form

Use CSS to style a form

Resources

Textbook: Web Development and Design Foundations with HTML5

Background Information

Survey forms are a way for visitors to interact with a site. There are many types of input elements that can be used to collect the data from the user. Text inputs allow the user to enter free text items such as a name or email address. Radio buttons are for single selection choices. Check box groups allow the user to select multiple options.

Select lists provide a list of items that the user can scroll through to make a selection. Text areas hold text that requires multiple lines rather than a single line.

Forms always need a submit button. When users press this button the form is submitted to the web server. A reset button allows the user to reset the form in case of a mistake. All of the elements and attributes on a form work together to format data that can be sent back to the server for processing.

ws7_graphic.jpg

Figure 9.34

Instructions

Complete #5 in the ‘Hands-On Exercises' on pp. 437-438 of Chapter 9.

Review the example in Figure 9.34 which is shown above, to get you started.

Complete the form per the instructions.

Put your web page survey form into a zip file. If you used an external style sheet for your form, then include it in the zip file.

Do Not attach the web page without putting it into zip file as your code will be stripped out of it.

When you have completed your assignment, save a copy for yourself and submit your zip file to your instructor using the Dropbox by the end of the workshop.

Reference no: EM132188696

Questions Cloud

Configure and stylize hyperlinks in web pages : This is the second phase of the website project. For this phase you will add a 4th page to your site, and this page must contain a table.
Create a web page using a four-column table : Attributes in the table elements allow for styling without the need for CSS. Table headers appear in bold by default, thus emphasizing the text in these cells.
Draw the gantt charts for these processes under the two : Can you also calculate these three metrics at the completion of all processes: average waiting time, average latency, and the system throughput?
Draw a picture of the linkedlist after the insertion of one : Draw a picture of an initially empty LinkedList, including the two sentinels. Draw a picture of the LinkedList after the insertion of one value.
Create a web page that has a form : Survey forms are a way for visitors to interact with a site. There are many types of input elements that can be used to collect the data from the user.
What is the worst-case asymptotic running time : What is the worst-case asymptotic running time of the method mthd, assuming that the parameter n is a positive integer?
When would you choose to use a binary tree over any other : When would you choose to use a Binary Tree over any other data structure?
What are three different areas where policy would differ : What are three different areas where policy would differ between granting a person access (hiring directly or indirectly) to your IT systems.
Create and returns a new arraylist of wizard objects : The World class has an attribute named creatures, which is an ArrayList of objects of type Creature.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  What is a good all-purpose sorting algorithm for arrays

What determines whether you should use a quadratic sort or a logarithmic sort? What is a good all-purpose sorting algorithm for medium-sized arrays?

  How graph theory has advanced the knowledge in your area

Examine how these applications are being used in your specialization. Determine how graph theory has advanced the knowledge in your area of specialization.

  Define a database can still be modified without detection

Show that if longitudinal parity is used as an error detection code, values in a database can still be modified without detection

  Reflect the proposed process specification

You are a process consultant for Pit Power. Model the process captured in the proposed scenario as a Workflow net.

  Create a while loop that will start deducting each purchase

In this problem you are going to keep buying items until you reach your maximum credit limit. You will ask the user for their credit limit first.

  Describes a set of firewall rules

Section 9.10.1 describes a set of firewall rules that limit outside access to only three services. Describe another set of rules that you can add to this firewall to further restrict access to these services.

  How many different 8-bit block ciphers can there be

In this scenario, how many different ciphertexts are there? How many different 8-bit block ciphers can there be?

  Write a program that prints the calendar for a given year

Write a program that prints the calendar for a given year. The user will be promoted to choose the calendar for the month or the year.

  Discuss establish a ranking of vulnerabilities in a system

Why is it important to establish a ranking of vulnerabilities in a system? Use examples to show vulnerability priorities in action

  Implement the simple methods get-num and get-den

Implement the simple methods get_num and get_den that will return the numerator and denominator of a fraction.

  What is the key domain if an additive cipher is used

What is the key domain if an additive cipher is used? What is the key domain if a multiplicative cipher is used? What is key domain if an affine cipher is used?

  Questionexecute a class person with two fields name and age

questionexecute a class person with two fields name and age and a class car with three fields-1. the model2. a pointer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd