Hidden input, Computer Engineering

Assignment Help:

Yet another type of input is HIDDEN input.

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Friend Form 1">

A HIDDEN input is a value/name pair which is returned to you but doesn't show up anywhere on web page. The hidden input above is required for use with mailto Formatter (MTF). It's how MTF recognizes the forms it has to parse.

Assume you were a company trying to generate leads for a new product and there is a standard form for gathering information which has name, company, products, phone interested in, etc. Only problem is there are 6 slightly different versions of form in 6 different places. You need to know what's coming from where. What to do?

You can add a HIDDEN input to your forms like below:

<HTML>

<BODY>

<FORM METHOD=POST>

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 1"> ...for the first version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 2"> ...for the second version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 3"> ...for the third version

</FORM>

</HTML>

By the way, it doesn't matter what name/value pair in the hidden input is (or any input for that matter).

<INPUT TYPE=HIDDEN NAME="E" VALUE="Mc^2">HIDDEN

Inputs are also useful for cgi scripts. For instance, many ISP's have a script you can have your forms sent to. It then sends form back to you properly formatted. Hidden input can be used to tell cgi script who you are, where to send parsed data and so on.


Related Discussions:- Hidden input

Explain that lost acknowledgement in packet retransmission, Explain that th...

Explain that the lost acknowledgement does not necessarily enforce retransmission of the packet . To guarantee reliable transfer, protocols utilize positive acknowledgement al

Compiler software difficulty, IA-64 instead depends on the compiler for thi...

IA-64 instead depends on the compiler for this task. Even before the program is fed into the CPU, the compiler studies the code and makes the similar sorts of decisions that would

Authorization bypass, Authorization Bypass is a frighteningly easy process ...

Authorization Bypass is a frighteningly easy process which can be employed with poorly designed applications or content management frameworks. You know how it is... you run a small

Significance of having less memory references, Q. What is the significance ...

Q. What is the significance of having less memory references? As the time needed for memory reference is more than that of a register reference so increased number of memory r

Which TTL logic gate is used for wired anding, Which TTL logic gate is used...

Which TTL logic gate is used for wired ANDing ? Ans. Open collector output, TTL logic gate is used.

What is drag, Move the mouse pointer over the object you wish to drag, and ...

Move the mouse pointer over the object you wish to drag, and then hold down the left mouse button. Whereas holding the mouse button, move the mouse pointer (and the object) to the

What is managed bean or mbean, A managed bean - sometimes simply referred t...

A managed bean - sometimes simply referred to as an MBean - is a type of JavaBean, developed with dependency injection. Managed Beans are particularly used in the Java Management E

Assembly Language, Write an assembly program to simulate a microwave

Write an assembly program to simulate a microwave

Array, list advantages of array

list advantages of array

protects against transcription, The last digit of a credit card number is ...

The last digit of a credit card number is the check digit, which protects against transcription errors like an error in a single digit or switching two digits. The following method

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd