Describe _blank, _self, _parent and _top tags, Computer Engineering

Assignment Help:

Q. Describe _blank, _self, _parent and _top tags?

These all are attributes of <A> tag. The below example describes each of these attributes.

<HTML>

<BODY>

<UL>

<LI>TARGET = "_blank"</LI>

<A HREF="newwindow.html" TARGET="_blank">a new window</A> <BR>

<LI> TARGET = "_self"</LI>

go to <A HREF="selftarget.html" TARGET="_self">next</A> page<BR>

<LI>TARGET = "_top"</LI>

<A HREF="selftarget.html" TARGET="_top">top</A><BR>

</UL>

</HTML>

2421_Describe blank-self-parent and  top tags.png

Figure: Attributes of the Tag


Related Discussions:- Describe _blank, _self, _parent and _top tags

Computer graphics, what is boundary filling explain with example

what is boundary filling explain with example

Multiple instruction and single data stream (misd), Multiple Instruction an...

Multiple Instruction and Single Data stream (MISD) In this association, multiple processing elements are structured under the control of multiple control units. Each control un

Explain star topology, Explain Star topology. A network utilizes a star...

Explain Star topology. A network utilizes a star topology if each computer attach to a central point. The following figure demonstrates the concept: Star Topology

Safety argument for good design, So far we have considered the problems of ...

So far we have considered the problems of poor ID in terms of the loss of productivity and efficiency to business. There is another important aspect to consider: the issue of safet

Program in java, Write a program to display grade message according to the ...

Write a program to display grade message according to the marks

Fuzzy logic - artificial intelligence, Fuzzy Logic: In the logics we a...

Fuzzy Logic: In the logics we are here described above, what we have been concerned with truth: whether propositions and sentences are true. Moreover, with some natural langua

Name the popular security measures, Name the popular security measures ...

Name the popular security measures A number of security products covering a broad range of methods are available in the market. Most popular of all the security measures are th

Best method between linear and matrix addressing modes, Which of the best m...

Which of the best method between linear addressing and matrix addressing modes ? Ans: Best Method: Matrix Addressing is the suitable method, since this configuration on

Explain about interrupt procedure, Q. Explain about Interrupt Procedure? ...

Q. Explain about Interrupt Procedure? The interrupt procedure uses request header to conclude the function requested by DOS. It also performs all functions for device driver. T

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd