Incident report to the database, Database Management System

Assignment Help:

The Form input elements are:

            Reporter name                                                text type input

            Password                                                        password type input element

            Description of the incident                              textarea element

            Category for incident                                      menu

            Checkbox to request email report copy          checkbox

            Optional email address if requested               text type input

No inputs for time, date, or incident number,

Lay out the form in a visually effective way using HTML elements and style rules to control the appearance of the elements including the font-family, font-size, background colors, and text color.

All the elements mentioned must belong to (one) form - not multiple forms - since only one form can be transmitted at a time (that is, triggered or fired by a form submit).


Related Discussions:- Incident report to the database

What is a candidate key, What is a candidate key? Minimal super keys ar...

What is a candidate key? Minimal super keys are known as candidate keys.

Differentiate between b-tree and b+ tree, Differentiate between B-tree and ...

Differentiate between B-tree and B + tree    Ans:  A B-tree (or Balanced Tree) is a search tree along with additional constraints that makes sure that the tree is all the time

Define the concept of generalization, Define the concept of generalization ...

Define the concept of generalization A generalization is relationship between specific kind of thing and general thing. It is also known as "is-a-kind-of" relationship. Inher

What is functional dependency, What is Functional Dependency? A Functi...

What is Functional Dependency? A Functional dependency is shown by X Y among two sets of attributes X and Y that are subsets of R specifies a constraint on the possible tuple

Weak entity, Entity types that do not have any key attribute, and therefore...

Entity types that do not have any key attribute, and therefore cannot be identified independently, are known as weak entity types. A weak entity can be recognized uniquely only by

Modular growth, Modular growth: In distributed environments, it is simple t...

Modular growth: In distributed environments, it is simple to expand. Latest sites can be added to the network without affecting the operations of other sites, as they are somewhat

Explain i command in qbe, Explain I command in QBE ? I : It is the co...

Explain I command in QBE ? I : It is the command in QBE that is used to insert tuple (s) into the database

Security-data fragmentation, Security: Data not needed by local applicatio...

Security: Data not needed by local applications is not stored at the site, therefore no unnecessary security violations may exist. But how can we carry out fragmentation? Fragm

Deletion anomalies-data redundancy, Deletion Anomalies: Loss of important ...

Deletion Anomalies: Loss of important Information: In some cases, useful information may be lost when a tuple is deleted. For instance, if we delete the tuple corresponding to stu

Determine the advantage of object-orientation, Determine the advantage of o...

Determine the advantage of object-orientation Finally, object-orientation has advantage of continuity throughout analysis, persistent representation and design implementation.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd