javascript validarion, JAVA Programming

Assignment Help:
1. Obtaining the new script: Download and save the attached comment CGI mailer script form-mail2.pl to your server''s cgi-bin directory, and change the permissions on the script to make it executable (not writable). You need not know how it works complete the next step; however, as a Perl CGI script you may be interested in seeing what it does.

2. Setting up the form page: In this part, you will create a form interface to the CGI program that will accept comments on your web site, as well as some information about the sender and send them to you via email. Create the form interface in a file called mailer.html. The form should include some brief instructions and a request for comments. Include the following input elements:

o The form used for gathering the input has a NAME parameter set to usercomments.

o The form uses the POST method and references the a script called form-mail2.pl on your server for the action.

o The form includes some brief instructions and a request for comments.

o The form includes the following input elements:

o A text box, called realname for the person''s name.

o A text box, called email for the person''s email address.

o A text area called message for the comments. Make this a bit larger than the default size.

o A group of at least 3 radio buttons called rating with a rating scale of your choosing for your web site.

o A text box called phone for the person''s phone number.

o A text box called bday for the person''s birthday.

Make sure that the input elements are organized in a clear and usable fashion, and make sure that the function of each input element is clearly identified.

3. JavaScript validation: In this part, you will add JavaScript validation to the fields on the form. You can base your validation routines on any form validation on the Internet. There is a lot out there already written and there is no need to reinvent the wheel. However, make sure you give credit. The following validations should be checked both when the value of the field changes (onChange) and before the form can be submitted (onSubmit). If a field does not validate, an appropriate message should be displayed on the webpage (not in an alert), and the focus and select should be set to the offending field.

o realname (must be non-blank, must begin with a capital letter, and must contain at least one vowel and one consonant)

o email (email format: )

o message (must be non-blank)

o phone (telephone format: (###) ###-#### ), but do not allow extra parentheses, spaces, or dashes within the phone number.

o bday (date format: MM/DD/YY)

4. Adding a SSI footer: In this part, you will add a header, using SSI (server side includes), to the mailer page.

o Re-name your mailer.html file to mailer.shtml, so that the server will check for includes.

o Include any previous HTML file at the TOP of your file

o Include an SSI command to display the "last modified" date of the mailer.html file.

Related Discussions:- javascript validarion

Tasks with the classes Currency, In this assignment you work on a set of ta...

In this assignment you work on a set of tasks with the classes Currency, Money and Bank. Money and Currency You have been given a template for the Currency and Money classes (Lab1.

Bluej program, program to find the frequency of a digit in a number

program to find the frequency of a digit in a number

How to draw polygons in java, How to draw Polygons in java? In Java rec...

How to draw Polygons in java? In Java rectangles are defined through the position of their upper left hand corner, their height, and their width. Therefore it is implicitly sup

Gps and gprs fleet management system, GPS and GPRS fleet management system ...

GPS and GPRS fleet management system Project Description: I want to develop fleet management system Skills required: HTML, PHP, Java, Website Design

Bluej program, program to find the frequency of a digit in a number

program to find the frequency of a digit in a number

Confidentiality and privacy - security, The confidentiality and privacy may...

The confidentiality and privacy may be accomplished through encryption. Encryption may be: Private-key or symmetric: This is based on a single key. This needs the sender and the

Enumerate the java program development and execution steps, Java Program De...

Java Program Development and Execution Steps Java program normally go through five phases. These are 1. Edit, 2. Compile, 3. Load, 4. Verify and 5. Execute Co

Difference between composition and aggregation, Aggregation Comp...

Aggregation Composition Aggregation :  An   association   in  which  one  class refers to collection or a another class. This is a part of  a  who

Explain what is constructors, Explain what is constructors ? It is freq...

Explain what is constructors ? It is frequent the case in which overloaded techniques are essentially the similar except that one supplies default values for a few of the argum

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd