Illustrate the text area, Computer Engineering

Assignment Help:

<TEXTAREA> specifies a form field where user can enter large amounts of text. In most respects, <TEXTAREA> works like an <INPUT> field. It can have a name as well as a default value. It has to be concerned that <TEXTAREA> is a container tag, so it has a start tag as well as an ending tag.

In its simplest form, <TEXTAREA> requires NAME, COLS and ROWS attributes and nothing between <TEXTAREA ...> and </TEXTAREA>. Look at the code fragment demonstrated below

<FORM ACTION="../cgi-bin/mycgi.pl" METHOD=POST>

your comments:<BR>

<TEXTAREA NAME="comments" COLS=40 ROWS=6></TEXTAREA>

<P><INPUT TYPE=SUBMIT VALUE="submit">

</FORM>

Gives us this form...

your comments:

Matter between <TEXTAREA ...> and </TEXTAREA> are used as the default value

<FORM ACTION="../cgi-bin/mycgi.pl">

your response:<BR>

<TEXTAREA NAME="comments" COLS=40 ROWS=6>

Kamal said

: I think it's a great idea

: but it needs more thought

</TEXTAREA>

<P><INPUT TYPE=SUBMIT VALUE="submit">

</FORM>

gives us your response:

278_Illustrate the TEXT AREA.png

Figure: Using the TEXTAREA Tag

Contents are interpreted as text only; HTML markup is ignored. Theoretically user can type unlimited amounts of text into textarea field. In practice browser sets a limit which is usually no more than 32 K. If you want users to send in their latest novel, consider using some file upload mechanism.


Related Discussions:- Illustrate the text area

Vliw architecture, Vliw Architecture Superscalar architecture was desig...

Vliw Architecture Superscalar architecture was designed to develop the speed of the scalar processor. But it has been realized that it is not easy to execute as we discussed pr

What is full trust, What is Full Trust? Your code is permitted to do an...

What is Full Trust? Your code is permitted to do anything in the framework, meaning that all (.Net) permissions are granted. The GAC has Full Trust because it's on the local HD

Calculate switching capacity in a two stage network, In a two stage network...

In a two stage network there are 512 inlets and outlets, r=s=24. If the probability that a given inlet is active is 0.8, calculate: Switching capacity Given: N =M =512, α

Difference between relocatable and self relocatable programs, Difference be...

Difference between relocatable and self relocatable programs. A relocatable program is one which can be processed to relocate it to a selected area of memory. For illustratio

Face scanning security system - biometric, Face Scanning Security System - ...

Face Scanning Security System - Biometric Computer Security Systems Finally, face scanning security system are also one of biometric technologies. Generally, the principle of

Vector processing with pipelining-vector processing, Vector Processing with...

Vector Processing with Pipelining: Since in vector processing, vector instructions perform the similar computation on dissimilar data operands repeatedly, vector processing is most

Authentication verses firewall, How does an authentication system be differ...

How does an authentication system be different from a firewall into functioning? Authentication verses firewall User Authentication and Authorization A significan

Describe about minicomputers, Q. Describe about Minicomputers? Minicomp...

Q. Describe about Minicomputers? Minicomputers, developed in the early 1960s, are high-performance, general-purpose multi user computers. These are also designed for real-tim

By which except ions of type error in java are handled, Except ions of type...

Except ions of type error in JAVA are handled by? Except ions of type error in the JAVA are handled through JAVA run time environment.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd