Define about anchor tag, Computer Engineering

Assignment Help:

Q. Define about Anchor Tag?

Anchor tag is used to create links between various objects such as HTML pages, web sites, files etc. It is introduced by characters <A> and terminated by </A>. HREF is the most common attribute of ANCHOR tag. It defines destination of the link.

<HTML>

<HEAD>

<TITLE>Expertsmind</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://www.expertsmind.com/">Expertsmind!</A>

</BODY>

</HTML>

As demonstrated in Figure below, text "EXPERTSMIND.COM" present between <A> and </A> tags becomes the hyperlink. On clicking anywhere on this hyperlink, browser would attempt to connect to given URL and website https://www.expertsmind.us would open, if possible. An email link could be specified in the same way. We just have to specify email address rather than a page address as the value of HREF as demonstrated in following code. On clicking on the link, default mail program on the user's computer opens up with a "To:" address as specified in the hyperlink. You can then type your message and send e-mail to that particular address.

<BODY BGCOLOR="#FFFFFF">

Send me <A HREF="mailto:[email protected]">mail</A>

</BODY>

It's also possible to make an image a link if desired. This is achieved using <IMG> tag. Consider the below illustration.

<HTML>

<HEAD>

<TITLE>EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

Go to <A HREF="https://expertsmind.com.com/"><IMG SRC="image.gif" WIDTH=130

HEIGHT=101></A>

</BODY>

</HTML>

So in the illustration demonstrated in Figure, image becomes the link. When user clicks on image, web site https://www.expertsmind.us opens up, if possible.


Related Discussions:- Define about anchor tag

What is called when a star connected intermediate exchange, A star connecte...

A star connected intermediate exchange is known as a? A star connected intermediate exchange is termed as a Hub exchange.

De morgans laws, De Morgan's Laws : With continuing the relationship b...

De Morgan's Laws : With continuing the relationship between ^ and ? , we can also needs De Morgan's Law to rearrange sentences involving negation in conjunction with these con

The number of control lines for a 8 – to – 1 multiplexer, What is the numbe...

What is the number of control lines for a 8 - to - 1 multiplexer ? Ans. There are 3 control lines, for an 8 to 1 Multiplexer. The control signals are utilized to steer any one

Propositional versions of resolution, Propositional versions of resolution:...

Propositional versions of resolution: Just because of so far we've only looked at propositional versions of resolution. However in first-order logic we require to also deal wi

What will be the output of JK flipflop for J = 0 and K=1, For JK flipflop J...

For JK flipflop J = 0, K=1, the output after clock pulse will be ? Ans. J=0 and K=1, such inputs will reset the flip-flop, after the clock pulse. Therefore whatever be the earlie

What are the data types of the abap/4 layer, What are the Data types of the...

What are the Data types of the ABAP/4 layer? Possible ABAP/4 data types: C: Character. D: Date, format YYYYMMDD. F: Floating-point number in DOUBLE PRECISION (8 bytes)

Why have companies gone ecommerce, One of these objectives is related to co...

One of these objectives is related to costs. By going e-commerce, consumers will be able to submit their purchase requests to the sellers without paying a visit to their place. Thi

Gantt chart, The Gantt chart shows the several activities of each processor...

The Gantt chart shows the several activities of each processor with respect to progress in time in idle-overhead -busy modes with respect to each processor. Kiviat diagram:  Th

Explain about mainframes computer, Q. Explain about Mainframes computer? ...

Q. Explain about Mainframes computer? Mainframes, capable of executing in excess of 53 MIPS, are high-performance, general- purpose computers supporting very large databases, r

Rsa encryption function- cryptography, The general method for constructing ...

The general method for constructing the parameters of the RSA cryptosystem can be described as follows: Select two primes p and q Let N = pq and determine ∅ (N) = (p - 1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd