Hidden input, Computer Engineering

Assignment Help:

Yet another type of input is HIDDEN input.

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Friend Form 1">

A HIDDEN input is a value/name pair which is returned to you but doesn't show up anywhere on web page. The hidden input above is required for use with mailto Formatter (MTF). It's how MTF recognizes the forms it has to parse.

Assume you were a company trying to generate leads for a new product and there is a standard form for gathering information which has name, company, products, phone interested in, etc. Only problem is there are 6 slightly different versions of form in 6 different places. You need to know what's coming from where. What to do?

You can add a HIDDEN input to your forms like below:

<HTML>

<BODY>

<FORM METHOD=POST>

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 1"> ...for the first version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 2"> ...for the second version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 3"> ...for the third version

</FORM>

</HTML>

By the way, it doesn't matter what name/value pair in the hidden input is (or any input for that matter).

<INPUT TYPE=HIDDEN NAME="E" VALUE="Mc^2">HIDDEN

Inputs are also useful for cgi scripts. For instance, many ISP's have a script you can have your forms sent to. It then sends form back to you properly formatted. Hidden input can be used to tell cgi script who you are, where to send parsed data and so on.


Related Discussions:- Hidden input

How do you decide which integer type to use, It depends on our requirement....

It depends on our requirement. When we are needed an integer to be stored in 1 byte (means less than or equal to 255) we use short int, for 2 bytes we use int, for 8 bytes we use l

Handling a page in memory - computer architecture, Handling a Page: ...

Handling a Page: Typical page size today are 4 kb to 16 kb ,having tendency to use even larger page sized Organization that reduce the page fault rate are striking (comp

Indian standard code for information interchange, The ISCII is an 8-bit cod...

The ISCII is an 8-bit code which contains standard ASCII values till 127 from 128-225 it contains characters necessary in ten Brahmi-based Indian scripts. It is defined in IS 13194

What are the different kinds of lock modes, What are the different kinds of...

What are the different kinds of lock modes? There are three types of lock modes:- Shared lock Exclusive lock. Extended exclusive list.

What are the largest UDP messages, What are the largest UDP messages that c...

What are the largest UDP messages that can fit into single Ethernet frame? UDP utilizes IP for delivery. As ICMP UDP packet is encapsulated in IP datagram. Therefore entire UDP

Example multi-layer ann with sigmoid units, Example Multi-layer ANN with Si...

Example Multi-layer ANN with Sigmoid Units: However we will concern ourselves here that with ANNs containing only one hidden layer and as this makes describing the backpropaga

Define process for swapping into memory from the swap device, What are the ...

What are the criteria for choosing a process for swapping into memory from the swap device? The resident time of the processes in the change device, the priority of the process

Superscalar processors, Superscalar Processors In scalar processors, on...

Superscalar Processors In scalar processors, only one instruction is implemented per cycle. That means only single instruction is issued per cycle and only single instruction i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd