Explain the post and get methods, Programming Languages

Assignment Help:

Question:

(a)  An HTML file "decor.html" uses an external Cascading Style Sheet file name  "nicedesign.css". Users are viewing the Web page making use of different kinds of  browsers. The version for those browsers also varies. Give the appropriate Browser Sniffer codes which enable you to use the file "nicedesign.css" within the file "decor.html" only if the browser is Internet Explorer 5 or above.

(b)  Give extract codes about how  Cascading Style Sheets can be used to control the appearance of hyperlinks.

(c)  (i) Describe fully how the CGI architecture operates. Illustrate your answer using a diagram. 

(ii) Explain the POST and GET methods with respect to the above architecture.

(d) Explain and illustrate with the aid of an annotated sketch what will be the output when the following codes are loaded into a browser:

< script language="JavaScript">
    var valX = 5,  valY ;
            while ( valX >= 1 ) {
     valY = 1 ;
            while ( valY <= 5 ) {
         document.write( valX % 2 == 1 ? "?" : "@" );
           ++ valY;
      }
            -- valX;
      document.writeln( "
" );
      }
< /script>


Related Discussions:- Explain the post and get methods

Characteristics of object-oriented programming, Characteristics of object-o...

Characteristics of object-oriented programming: •   Emphasis is on data rather than procedure. •   Programs are divided into what are known as objects. •

Asp.net and c#, The method should call getAllCities() and return the index ...

The method should call getAllCities() and return the index of the City that has the shortest (euclidian) distance to the. longitude and latitude passed as parameters

Create procedures for accessing the root, (a)  Create procedures for access...

(a)  Create procedures for accessing the root, left subtree and right subtree, and also mutators for changing the root, left subtree and right subtree of an avl argument. (b) Wr

Write a program to decrypt encrypted messages, You are working for a crypto...

You are working for a cryptography department, where one of your jobs is to decipher intercepted messages that have been encrypted using a book cipher. The messages are sent by dif

We need help for build a price quote generator, We need help for build a Pr...

We need help for build a Price Quote Generator I am interested in two things (A) a web based system that will allow a user to enter the parameters of their contests (there are o

Determine that the processes are iterative or recursive, Each of the follow...

Each of the following two procedures defines a method for adding two positive integers in  terms of the procedures inc, which increments its argument by 1, and dec, which decrement

To print total no.of ordinary files, Normal 0 false false f...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

Program for a simple search engine, Introduction A search engine (like ...

Introduction A search engine (like Google) has three main components: a crawler that finds and stores copies of files on the web, an indexer that creates a data structure that

Vbs, Add macros to MS word 2010 according to A PARTICULAR FORMAT

Add macros to MS word 2010 according to A PARTICULAR FORMAT

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd