Define about anchor tag, Computer Engineering

Assignment Help:

Q. Define about Anchor Tag?

Anchor tag is used to create links between various objects such as HTML pages, web sites, files etc. It is introduced by characters <A> and terminated by </A>. HREF is the most common attribute of ANCHOR tag. It defines destination of the link.

<HTML>

<HEAD>

<TITLE>Expertsmind</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://www.expertsmind.com/">Expertsmind!</A>

</BODY>

</HTML>

As demonstrated in Figure below, text "EXPERTSMIND.COM" present between <A> and </A> tags becomes the hyperlink. On clicking anywhere on this hyperlink, browser would attempt to connect to given URL and website https://www.expertsmind.us would open, if possible. An email link could be specified in the same way. We just have to specify email address rather than a page address as the value of HREF as demonstrated in following code. On clicking on the link, default mail program on the user's computer opens up with a "To:" address as specified in the hyperlink. You can then type your message and send e-mail to that particular address.

<BODY BGCOLOR="#FFFFFF">

Send me <A HREF="mailto:[email protected]">mail</A>

</BODY>

It's also possible to make an image a link if desired. This is achieved using <IMG> tag. Consider the below illustration.

<HTML>

<HEAD>

<TITLE>EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://expertsmind.com.com/"><IMG SRC="image.gif" WIDTH=130

HEIGHT=101></A>

</BODY>

</HTML>

So in the illustration demonstrated in Figure, image becomes the link. When user clicks on image, web site https://www.expertsmind.us opens up, if possible.


Related Discussions:- Define about anchor tag

Illustarte basic flip-flops, Q. Illustarte Basic Flip-flops? Let's firs...

Q. Illustarte Basic Flip-flops? Let's first see a ordinary latch. A latch or flip-flop can be created employing two NOR or NAND gates. Figure (a) presents logic diagram for S-R

Transaction that are programmed by the user, How the transaction that are p...

How the transaction that are programmed by the user can be protected? By executing an authority check.

Electrochemistry and batteries, differentiate between concentration cells a...

differentiate between concentration cells and electrolytic cells with suitable examples?

Comparison between risc and cisc - computer architecture, Comparison betwee...

Comparison between risc and cisc - computer architecture: CISC  Emphasis on hardware  Includes multi-clock complex instructions  Memory-to-memory

A subroutine can be terminated unconditionally using exit, A subroutine can...

A subroutine can be terminated unconditionally using EXIT. True.

State the features of pentium series of microprocessors, State the features...

State the features of Pentium series of microprocessors: Pentium is a 32-bit superscalar, CISC microprocessor.  The term superscalar is used for processor that contains more th

How many types memory mgt can divided, They are of two types. They are big ...

They are of two types. They are big endian and little endian. Memory is separated into two bank, 1:even bank 2:odd bank.

Write html code to accomplish the web page to insert frame, Write the HTML ...

Write the HTML code to accomplish the web page to insert the frame extending 300 pixels across the page from left side. The HTML code to accomplish the web page is given below

What is core dump, Raises when accessing an unassigned memory location acce...

Raises when accessing an unassigned memory location accessing a null pointer

Balanced trees and their operations, what is ment by avl tree n insertion n...

what is ment by avl tree n insertion n deletion ,2-3 tress insertion n deletion

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd