Incident report to the database, Database Management System

The Form input elements are:

            Reporter name                                                text type input

            Password                                                        password type input element

            Description of the incident                              textarea element

            Category for incident                                      menu

            Checkbox to request email report copy          checkbox

            Optional email address if requested               text type input

No inputs for time, date, or incident number,

Lay out the form in a visually effective way using HTML elements and style rules to control the appearance of the elements including the font-family, font-size, background colors, and text color.

All the elements mentioned must belong to (one) form - not multiple forms - since only one form can be transmitted at a time (that is, triggered or fired by a form submit).

Posted Date: 3/29/2013 5:53:24 AM | Location : United States

Related Discussions:- Incident report to the database, Assignment Help, Ask Question on Incident report to the database, Get Answer, Expert's Help, Incident report to the database Discussions

Write discussion on Incident report to the database
Your posts are moderated
Related Questions
Depending upon the rules we have found, we can classify the locks into two types. Shared Lock: A transaction might be acquiring shared lock on a data item in order to read it

Probelm: a) In the context of OODBMS, define the following terms with appropriate examples. (i) Object class. (ii) Abstract class. (iii) Aggregation. (iv)

Design a gennalization and specialization hierarchy for an automobile sales company

What are the components of storage manager? The storage manager components include a) Authorization and integrity manager b) Transaction manager c) Buffer manager d

What is the function of a Domain? A domain defines the technical settings of a table field. A domain describes a value range, which sets the permissible data values for the

State your technical objectives for mining the data. Data Understanding. Describe the data For each attribute, give its description and data type. For numeric attributes

After the completion of the logical model the physical model is to be made. The oracle 10 G will be used as a database server and all the tables with their column are created and i

What is a Data Flow Diagram?  Data Flow Diagram: A data flow diagram is the graph that shows flow of data values from their sources in objects in the course of processes whic

What is the use of keyword ISA? The use of keyword ISA is to show that a class is a specialization of another class.

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4