What is enctype, Computer Engineering

Assignment Help:

ENCTYPE="application/x-www-form-urlencoded" and in its place use

ENCTYPE="text/plain".

The subsequent illustration displays a general form which includes some of the commonly used controls.

<HTML>

<HEAD>

<TITLE> Welcome to EXPERTSMIND.COM </TITLE>

</HEAD>

<BODY>

<FORM METHOD=POST>

Text box with name, value and size attributes

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

<BR>Text box with password and maxlength

<INPUT TYPE=PASSWORD MAXLENGTH=10>

<BR>Radio button with default checked<BR>

Who is your best friend?<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Ajay" CHECKED>

Ajay <BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Rohan"> Rohan

<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Tarun"> Tarun<P>

<BR>Checkbox<BR>

<INPUT TYPE=CHECKBOX NAME="AJAY" VALUE="YES"> Ajay <BR>

<INPUT TYPE=CHECKBOX NAME="Rohan" VALUE="YES"> Rohan <BR>

<INPUT TYPE=CHECKBOX NAME="BU" VALUE="YES"> Bunty<P>

<BR>Drop down list<BR>

<SELECT NAME="BEST FRIEND" SIZE=4>

<OPTION VALUE="Ajay">Ajay

<OPTION VALUE="Rohan">Rohan

<OPTION VALUE="Tarun">Tarun

<OPTION VALUE="Gagan">Gagan

<OPTION VALUE="Harish">Harish

<OPTION VALUE="Manjit">Manjit

</SELECT>

</FORM>

</HTML>

2148_What is ENCTYPE.png

Figure: A Web Page with a Form


Related Discussions:- What is enctype

Describe the various characteristics of udp protocol, Describe the various ...

Describe the various characteristics of UDP protocol. The characteristics of the UDP are as follows: End to end: UDP is transport protocols that can distinguish between

Explain priority encoder with an example, Explain Priority encoder with an ...

Explain Priority encoder with an example. Ans. Priority encoder- Basically an encoder is a combinational circuit which performs the inverse operation of a decoder. The inp

Explain the term- hacking, Explain the term- Hacking    Use of passwor...

Explain the term- Hacking    Use of passwords and ids to prevent illegal access to files. Also locking the computer itself or locking computer room can help here. Encryption s

Write an algorithm for deadlock detection, Write an algorithm for deadlock ...

Write an algorithm for deadlock detection. An algorithm for deadlock detection: 1. Assume that Work and Finish be vectors of length m and n, correspondingly. Initialize:

Draw the logic diagram of 4-bit odd parity checkers, Normal 0 f...

Normal 0 false false false EN-IN X-NONE X-NONE

Classes of experts system, 1. The Consultant : A consultant is an experts...

1. The Consultant : A consultant is an experts person who possesses a high level of expertise in the area. He guide and educate the executives regarding establishing the e

How do we save a selected sub-image to a file in gimp, Use "Edit->Paste As-...

Use "Edit->Paste As->New Image" menu command or press Ctrl-Shift-V key combination, then save newly created image.The script-fu-selection-to image can also be used to cut a selecti

What is hashing, What is Hashing? Hashing: Hashing gives the direct acc...

What is Hashing? Hashing: Hashing gives the direct access of record from the file no matter where the record is in the file. This is possible with the help of a hashing functio

Does weblogic jms support clustering, WebLogic JMS handles cluster-wide, tr...

WebLogic JMS handles cluster-wide, transparent access to destinations from any server in the cluster. A system administrator can set up cluster-wide, transparent access to destinat

What are the exceptions encountered for fp operation, What are the exceptio...

What are the exceptions encountered for FP operation? The exceptions encountered for FP operation are overflow, underflow. /0, inexact and invalid values.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd