Html 4.0 element, Computer Engineering

Assignment Help:

<LABEL>

<LABEL>, an HTML 4.0 element supported by Netscape6 and MSIE, defines a set of text which is associated with a specific form element. For illustration, code below indicates that phrase "send more information" is associated with "moreinfo" checkbox as checkbox is within the <LABEL> element:

<HTML>

<BODY>

<LABEL FOR="moreinfo">

Send more information

<INPUT NAME="moreinfo" TYPE=CHECKBOX ID="moreinfo">

</LABEL>

</HTML>

FOR attribute is required in above illustration. Value of FOR must be the same as value of ID in the form field that label applies to.

You can also associate a <LABEL> with a field which is not within its contents using the FOR attribute.

Attribute for <SELECT>

TABINDEX = integer

TABINDEX is supported by Netscape 6 and MSIE 4.x higher.

Usually, when user tabs from field to field in a form (in a browser which allows tabbing, not all browsers do) tab order is the order in which fields appear in HTML code.

Although, sometimes you want tab order to flow a little differently. In that scenario, you can number the fields using TABINDEX. Tabs then flow in order from one with the lowest TABINDEX to highest.

Code below explains this:

<HTML>

<BODY>

<TABLE BORDER CELLPADDING=3 CELLSPACING=5

BGCOLOR="#FFFFCC">

<TR>

<TD>name: <INPUT NAME="realname" TABINDEX=1></TD>

<TD ROWSPAN=3>comments<BR>

<TEXTAREA COLS=25 ROWS=5

TABINDEX=4></TEXTAREA></TD></TR>

<TR> <TD>email: <INPUT NAME="email" TABINDEX=2></TD></TR>

<TR> <TD>department: <SELECT NAME="dep" TABINDEX=3>

<OPTION VALUE="">...

<OPTION VALUE="mkt">Marketing

<OPTION VALUE="fin">Finance

<OPTION VALUE="dev">Development

<OPTION VALUE="prd">Production</SELECT></TD></TR>

</TABLE>

</HTML>

874_HTML 4.0 element.png

TABINDEX can be used with <A>, <INPUT>, <TEXTAREA>, and <BUTTON


Related Discussions:- Html 4.0 element

What is random access memory, What is random access memory(RAM or MAIN MEMO...

What is random access memory(RAM or MAIN MEMORY) and mention its types? The main memory in the central storage unit in a computer system. It is relatively large and fast memory

Strings made of left curly braces, In a logical system, a judgement is a st...

In a logical system, a judgement is a statement that is either true or false. So far, you are most familiar with the type of judgement "A is true", which is often simply abbreviate

Access to external identifiers, Access to External Identifiers: An external...

Access to External Identifiers: An external identifier is one which is referred in one module though defined in another. You can declare an identifier to be external by including i

Find the simplified function, Q. F' (A, B, C, D) = (A + B + D')(A + C' + D'...

Q. F' (A, B, C, D) = (A + B + D')(A + C' + D')(A + B' + C')        D' (A, B, C, D) = (A + B' + C + D')(A' + C' + D')(A' + B + D)        Find the simplified function F and imple

Hybrid model, The hybrid models are mostly tailormade models suiting to exa...

The hybrid models are mostly tailormade models suiting to exact applications. Actually these fall in the category of mixed models. Such type of application-oriented models keep cro

What is program annotation packages, Q. What is Program Annotation Packages...

Q. What is Program Annotation Packages? A quite renowned scheme in this field is OpenMP a newly designed industry standard for shared memory programming on architectures with u

Proof by contradiction, Proof by Contradiction: Now for forward chaini...

Proof by Contradiction: Now for forward chaining and backward chaining both have drawbacks. But another approach is to think about proving theorems by contradiction. So we can

Illustrate the benefits of functional model, Illustrate the benefits of Fun...

Illustrate the benefits of Functional model Functional model shows how values are computed. This model describes decisions or object structure without regard for sequencing. I

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

Why we use modem, Q. Why we use Modem? A Modem is one device which most...

Q. Why we use Modem? A Modem is one device which most computer users who have surfed Internet are aware of.  A modem is neededsincehowever most of telecommunications have becom

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd