Define about anchor tag, Computer Engineering

Assignment Help:

Q. Define about Anchor Tag?

Anchor tag is used to create links between various objects such as HTML pages, web sites, files etc. It is introduced by characters <A> and terminated by </A>. HREF is the most common attribute of ANCHOR tag. It defines destination of the link.

<HTML>

<HEAD>

<TITLE>Expertsmind</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://www.expertsmind.com/">Expertsmind!</A>

</BODY>

</HTML>

As demonstrated in Figure below, text "EXPERTSMIND.COM" present between <A> and </A> tags becomes the hyperlink. On clicking anywhere on this hyperlink, browser would attempt to connect to given URL and website https://www.expertsmind.us would open, if possible. An email link could be specified in the same way. We just have to specify email address rather than a page address as the value of HREF as demonstrated in following code. On clicking on the link, default mail program on the user's computer opens up with a "To:" address as specified in the hyperlink. You can then type your message and send e-mail to that particular address.

<BODY BGCOLOR="#FFFFFF">

Send me <A HREF="mailto:[email protected]">mail</A>

</BODY>

It's also possible to make an image a link if desired. This is achieved using <IMG> tag. Consider the below illustration.

<HTML>

<HEAD>

<TITLE>EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://expertsmind.com.com/"><IMG SRC="image.gif" WIDTH=130

HEIGHT=101></A>

</BODY>

</HTML>

So in the illustration demonstrated in Figure, image becomes the link. When user clicks on image, web site https://www.expertsmind.us opens up, if possible.


Related Discussions:- Define about anchor tag

Define virtualisation and explain computer architecture, Rentrag has decide...

Rentrag has decided to replace all of the computers currently being used by all of the business and office staff. He has asked you to recommend a set of specification for computers

Describe about analysis, Analysis describes about the logical and statistic...

Analysis describes about the logical and statistical analysis needed for an efficient output. This involves writing of code and performing calculations, but most part of these lang

Matlab, Use the colon operation to create a vector x of numbers -10 through...

Use the colon operation to create a vector x of numbers -10 through 10 in steps of 1. Use matrix operations to create a vector y where each element is 5 more than 2 times the corre

Non-repudiation achieved in designing e-cash based system, How can non-repu...

How can non-repudiation be achieved into designing e-cash based system? E-cash is fundamentally an online solution. The buyer should validate the coins by the issuer so as to g

Explain the passive matrix in lcd technology, Q. Explain the Passive Matrix...

Q. Explain the Passive Matrix in lcd technology? In a passive matrix arrangement LCD panel has a grid of vertical and horizontal conductors and every pixel is positioned at an

m-files and the power point presentation, Power point presentation Arra...

Power point presentation Arrange a 20 minutes power point presentation showing the original and processed filters.  Discuss the methods used for processing and comment on each r

Floating point format, consider the 8 bit floating point format including s...

consider the 8 bit floating point format including support for normalised nimbers and nonnumeric values.it included 3 bits for mantissa and 4 bitys for excess 7 exponent

Boolean expression derived from this k-map, Let us see the pairs that can b...

Let us see the pairs that can be considered as adjacent in Karnaugh's here. The pairs are:  1)  The four corners  2)  The four 1's as in top and bottom in column 00 & 01

When a network uses a star topology, A Network uses a star topology if? ...

A Network uses a star topology if? A Network utilizes a star topology if all computers attach to a single central point.

Control traffic flowing in and out of the network, Firewalls use one or mor...

Firewalls use one or more of three methods to control traffic flowing in and out of the network:  Packet filtering - Packets (small chunks of data) are examined against a s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd