Show the properties of text box, Computer Engineering

Assignment Help:

Q. Show the properties of Text Box?

The <INPUT> tag is used to specify where user input is expected. It has several attributes, of which TYPE attribute is used to specify the kind of input which is to be provided. The most common value of this attribute of <INPUT> tag is TEXT. As demonstrated in Figure, every INPUT needs a NAME. When user types in his address (for instance 1234 ABC), it will become input's value and be paired with NAME so end result after running it through Mailto Formatter would be ADDRESS=1234 ABC.

We can, if we want to, type in a VALUE.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ">

This would automatically pair the value 44 XYZ with name ADDRESS, unless user changes it. Take care to use quotes as specified in the illustration.

We can specify the size of text input box.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

Default value is 20. You already know that default value is the value that browser presumes if you haven't told it otherwise.

Go ahead and remove VALUE="44 XYZ".

If we want, we can specify how many characters a user can input.

Experiment with this and try to input more than 10 characters! MAXLENGTH attribute is used to restrict number of characters to be entered in textbox.

<INPUT TYPE=TEXT NAME="ADDRESS" SIZE=20 MAXLENGTH=10>

Very similar to TYPE=TEXT is the TYPE=PASSWORD. It is exactly same, except that for security it displays *** in place of the actual input. Text entered as password wouldn't be echoed on the page. So you can use this anytime you want to accept a password or some other sensitive information from the user.

<INPUT TYPE=PASSWORD>

Remember that every <INPUT> should have a NAME which gives the name of field.

<INPUT TYPE=PASSWORD NAME="USER PASSWORD">

SIZE, VALUE and MAXLENGTH attributes work here also similarly as they do with TEXT.


Related Discussions:- Show the properties of text box

Why must a modem be used to transmit binary data, Why must a modem be used ...

Why must a modem be used to transmit binary data through a PSTN? (1) Use sketches and additional text to describe the following modulation methods. (a) Amplitude shift keying (b) F

What is the advantage of caching in a web browser, What is the advantage of...

What is the advantage of caching in a web browser? Like other application browsers utilize a cache to enhance document access. The browser places a copy of all items it retriev

Targeting for new business, Assume you own your own small party supply and ...

Assume you own your own small party supply and rental business. You keep an Excel list of potential customers and clients who have rented or purchased from you in the past 2 years.

Calculate the propagation delay for output, Problem: (a) Consider the ...

Problem: (a) Consider the following combinational circuit: (i) Calculate the propagation delay for each output. Assume each gate has a delay of 10 ns. (ii) The abo

Auto increment mode and condition code flags, Described auto increment mode...

Described auto increment mode of addressing? Ans: Effective address of the operand is the contents of a register mention in the instruction. After finishing the accessing t

Remote-load latency problem, Remote-load Latency Problem:  When one process...

Remote-load Latency Problem:  When one processor requires some remote loading of data by other nodes, then the processor need to wait for these two remote load operations. The long

Elaborate protected mode memory addressing in brief, Elaborate protected mo...

Elaborate protected mode memory addressing in brief. Protected mode interrupt: In protected mode, interrupts have exactly the same assignments as in real mode though int

What is optical character recognition, What is Optical character recognitio...

What is Optical character recognition (OCR)  Information on paper is automatically read by a scanner and is then processed/analysed by OCR software and stored in an electronic

Explain types of micro-instructions, Q. Explain types of Micro-instructions...

Q. Explain types of Micro-instructions? In general micro-instruction can be classifiedin two general kinds. These are non-branching and branching. After execution of a non-bran

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd