Define checkbox in html, Computer Engineering

Assignment Help:

Q. Define Checkbox in html?

Checkboxes are used when one or more out of the group of options is to be chosen. Building Check boxes is very similar to radio buttons. Figure explains the use of Checkbox.

User can choose any number like 1, 2, none or all of the options. Choices would be returned to you as the name/value pairs

Tom=YES

Terry=YES

(Or whatever the user chooses. If nothing, nothing would be returned to you)

Following is the code for making a table which contains different options for 3 different questions. Try it yourself and see the result.

<CENTER>

<TABLE WIDTH=600 BORDER=1 CELLSPACING=1><TR>

<TD WIDTH=199>

Which of these guys are your friends?<BR>

<INPUT TYPE=CHECKBOX NAME="Friend?..Tom" VALUE="YES"> Tom

<BR>

<INPUT TYPE=CHECKBOX NAME="Friend?..Ricky" VALUE="YES"> Ricky

<BR>

<INPUT TYPE=CHECKBOX NAME="Friend?..Terry" VALUE="YES">

Terry<BR>

<INPUT TYPE=CHECKBOX NAME="Friend?..BU" VALUE="YES"> Bunty<P>

</TD>

<TD WIDTH=200>

Which of these guys would you lend money to?<BR>

<INPUT TYPE=CHECKBOX NAME="Lend money?...Tom" VALUE="YES">

Tom <BR>

<INPUT TYPE=CHECKBOX NAME="Lend money?...Ricky" VALUE="YES">

Ricky <BR>

<INPUT TYPE=CHECKBOX NAME="Lend money?...Terry" VALUE="YES">

Terry<BR>

<INPUT TYPE=CHECKBOX NAME="Lend money?...BU" VALUE="YES">

Bunty<P>

</TD>

<TD WIDTH=199>

Which of these guys would you trust with your sister?<BR>

<INPUT TYPE=CHECKBOX NAME="Date sister?...Tom" VALUE="YES"> Tom

<BR>

<INPUT TYPE=CHECKBOX NAME="Date sister?...Ricky" VALUE="YES">

Ricky <BR>

<INPUT TYPE=CHECKBOX NAME="Date sister?...Terry" VALUE="YES">

Terry<BR>

<INPUT TYPE=CHECKBOX NAME="Date sister?...BU" VALUE="YES">

Bunty<P>

</TD>

</TR></TABLE>

</CENTER>

1060_Define checkbox in html.png

Figure: A Form on a Web Page with Checkboxes


Related Discussions:- Define checkbox in html

Explain activities of an operating system, List the major activities of an ...

List the major activities of an operating system with respect to memory management, secondary storage management and process management. Operating system is causes for followin

Analysts in computer operations, Q. Analysts in Computer Operations? Co...

Q. Analysts in Computer Operations? Computer Operations: All of the shared computers comprising mainframes, minicomputers and other computers are put to operation and same is c

Example of ann - artificial intelligence, Example of ANN - artificial intel...

Example of ANN - artificial intelligence: ANNs look like this:   Notice that the x, w, z and y represent actual valued weights and that every the edges in this graph

Write a verilog code for synchronous and asynchronous reset, Write a Verilo...

Write a Verilog code for synchronous and asynchronous reset? Synchronous  reset, synchronous means clock dependent so reset must not be present in sensitivity disk eg: alway

Network for digital methods in the arts and humanities, Network for Digital...

Network for Digital Methods in the Arts and Humanities: Europe has seen a signifi cant investment in the digitisation of its cultural heritage as part of the worldwide establi

Explain message, Differentiate between message switching, packet switching ...

Differentiate between message switching, packet switching and circuit switching Message switching: Recourse computer sends data to switching office that stores the data in

Identify free memory areas in allocation and de-allocations, Name and expla...

Name and explain the popular techniques to identify free memory areas as a result of allocation and de-allocations in a heap. Two well-liked techniques to identify free memory

What is the relation between response time and throughput, The Throughput g...

The Throughput graph represents the amount of data in bytes that the Vusers received from the server in a second. When we evaluate this with the transaction response time, we will

What are digital signatures and its uses, What are Digital Signatures and i...

What are Digital Signatures and its uses? A digital signature is an electronic quite than a written signature which can be used through someone to authenticate the identity of

Explain how the different access methods work, Question: (a) Primary an...

Question: (a) Primary and secondary memory differs in their way they access data: (i) Mention the four generic access methods usually present in a computer system. (ii) E

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd