Hidden input, Computer Engineering

Assignment Help:

Yet another type of input is HIDDEN input.

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Friend Form 1">

A HIDDEN input is a value/name pair which is returned to you but doesn't show up anywhere on web page. The hidden input above is required for use with mailto Formatter (MTF). It's how MTF recognizes the forms it has to parse.

Assume you were a company trying to generate leads for a new product and there is a standard form for gathering information which has name, company, products, phone interested in, etc. Only problem is there are 6 slightly different versions of form in 6 different places. You need to know what's coming from where. What to do?

You can add a HIDDEN input to your forms like below:

<HTML>

<BODY>

<FORM METHOD=POST>

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 1"> ...for the first version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 2"> ...for the second version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 3"> ...for the third version

</FORM>

</HTML>

By the way, it doesn't matter what name/value pair in the hidden input is (or any input for that matter).

<INPUT TYPE=HIDDEN NAME="E" VALUE="Mc^2">HIDDEN

Inputs are also useful for cgi scripts. For instance, many ISP's have a script you can have your forms sent to. It then sends form back to you properly formatted. Hidden input can be used to tell cgi script who you are, where to send parsed data and so on.


Related Discussions:- Hidden input

What is computer to computer communication, Computer to computer communicat...

Computer to computer communication is: (A)  Simplex                                   (B)  Duplex (C)  Half Duplex                             (D)  Both Duplex and Half D

Block diagram of a microcomputer system, Q. Block Diagram of a Microcompute...

Q. Block Diagram of a Microcomputer System? Before going on to consider the I/O sub/systems of a computer, let's discuss how a digital computer system can be realized by a micr

Backward chaining, Backward Chaining: In generally given that we are o...

Backward Chaining: In generally given that we are only interested in constructing the path whether we can set our initial state to be the theorem statement and search backward

Dynamic address translation - computer architecture, Dynamic address transl...

Dynamic address translation :  If, when executing an instruction, a CPU fetches an instruction located at a specific virtual address, or fetches data from a particular virtual

Explain application and system software, Fundamentals of IT 1. Explain ...

Fundamentals of IT 1. Explain the Impact of Information Technology on governments and educational organizations. 2. Explain application and system software. 3. Briefly ex

Responsibilities of application layer, Application layer: It's the topmost...

Application layer: It's the topmost layer in OSI model, which allows the user to access network. This layer provides user interface for network applications like remote login, Wor

What are the requirements a dialog program must fulfill, What are the requi...

What are the requirements a dialog program must fulfill? A dialog program must fulfil the following requirements A user friendly user interface. - Format and consistency

Finest way to get a reference to the viewport, What is finest way to get a ...

What is finest way to get a reference to the viewport from anywhere in the code? Ans) You can use refs config to set a reference on the Application/Controllers

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd