Describe _blank, _self, _parent and _top tags, Computer Engineering

Assignment Help:

Q. Describe _blank, _self, _parent and _top tags?

These all are attributes of <A> tag. The below example describes each of these attributes.

<HTML>

<BODY>

<UL>

<LI>TARGET = "_blank"</LI>

<A HREF="newwindow.html" TARGET="_blank">a new window</A> <BR>

<LI> TARGET = "_self"</LI>

go to <A HREF="selftarget.html" TARGET="_self">next</A> page<BR>

<LI>TARGET = "_top"</LI>

<A HREF="selftarget.html" TARGET="_top">top</A><BR>

</UL>

</HTML>

2421_Describe blank-self-parent and  top tags.png

Figure: Attributes of the Tag


Related Discussions:- Describe _blank, _self, _parent and _top tags

Can matchcode object contain ids with different update types, Can matchcode...

Can matchcode object contain Ids with different update types? Yes.

Routines which handle dynamic processes, Q. Routines which handle dynamic p...

Q. Routines which handle dynamic processes? number of routines which handle dynamic processes:  int pvm_joingroup( char *group ) Enrolls calling process in a na

What does a lock object involve, What does a lock object involve? The t...

What does a lock object involve? The tables. The lock argument.

Stata about the magnetic stripes, Stata about the Magnetic stripes  Th...

Stata about the Magnetic stripes  These comprise information/data stored on magnetic material often on the back of a credit/debit card; the information is automatically read b

Displaying the list of files with dir, Q. Displaying the List of Files with...

Q. Displaying the List of Files with DIR? You can display the list of files kept in a diskette or hard disk with the DIR commend. This Commends list files and sub directories i

What is metropolitan area network, Q. What is Metropolitan Area Network? ...

Q. What is Metropolitan Area Network? Metropolitan Area Network (MAN):  It is privately or public owned communication system that naturally covers a complete city. Speed is abo

Discuss about constrained-random verification methodology, Discuss about Co...

Discuss about Constrained-Random Verification Methodology Advent  of  constrained-random  verification  gives  verification  engineers  an  effective  method  to achieve covera

What is the function of an ip packet screening router, Function of an IP Pa...

Function of an IP Packet Screening Router: A screening router is the most basic type of firewall and uses only the packet filtering capability to control and monitor network tr

Dimensionality of interconnection network, Dimensionality of Interconnectio...

Dimensionality of Interconnection Network Dimensionality signify the arrangement of nodes or processing elements in an interconnection network. In linear network or one dimensi

Write a program to find 2''s complement of a binary number, Q. Write a pro...

Q. Write a program to find 1's and 2's complement of a Binary number. Perform necessary checking that if entered number is not a valid number, ask user to enter valid Binary n

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd