Explain the post and get methods, Programming Languages

Assignment Help:

Question:

(a)  An HTML file "decor.html" uses an external Cascading Style Sheet file name  "nicedesign.css". Users are viewing the Web page making use of different kinds of  browsers. The version for those browsers also varies. Give the appropriate Browser Sniffer codes which enable you to use the file "nicedesign.css" within the file "decor.html" only if the browser is Internet Explorer 5 or above.

(b)  Give extract codes about how  Cascading Style Sheets can be used to control the appearance of hyperlinks.

(c)  (i) Describe fully how the CGI architecture operates. Illustrate your answer using a diagram. 

(ii) Explain the POST and GET methods with respect to the above architecture.

(d) Explain and illustrate with the aid of an annotated sketch what will be the output when the following codes are loaded into a browser:

< script language="JavaScript">
    var valX = 5,  valY ;
            while ( valX >= 1 ) {
     valY = 1 ;
            while ( valY <= 5 ) {
         document.write( valX % 2 == 1 ? "?" : "@" );
           ++ valY;
      }
            -- valX;
      document.writeln( "
" );
      }
< /script>


Related Discussions:- Explain the post and get methods

What is the purpose of a hashtable, Question: (a) How do you implement...

Question: (a) How do you implement the following in ASP.NET: (i) Server-side Comments (ii) Server-side Include Directives. (b) What is the purpose of a HashTable? (

Python, How does a program provide "input" to one of its functions?

How does a program provide "input" to one of its functions?

C++, fow to I write a emplate that reads a set of numbers typed at the keyb...

fow to I write a emplate that reads a set of numbers typed at the keyboard into an array of T

Get variable data, How do i get back data from a FOR loop in order to prin...

How do i get back data from a FOR loop in order to print them on screen?

Program to records name-bounty and difficulty for ten target, You have been...

You have been employed by a bounty hunter to create hit list (yes... you better do this right). Create a Hit List program that can records the name, bounty, and difficulty for ten

Write a program to decrypt encrypted messages, You are working for a crypto...

You are working for a cryptography department, where one of your jobs is to decipher intercepted messages that have been encrypted using a book cipher. The messages are sent by dif

.net class library, .NET class library .NET structure comes with just on...

.NET class library .NET structure comes with just one category selection. And that all developers need to learn!! Whether they create the value in C# or VB.NET or J#, it doesn't

Statistical parametric mapping, A large offshore accommodation barge is to ...

A large offshore accommodation barge is to be converted into a floating luxury hotel.  It will be connected to a single point mooring buoy (SPM) in a beautiful inland loch where th

Scheme assignment, A function that takes a list with at least 4 numbers and...

A function that takes a list with at least 4 numbers and if three of the numbers sum is equal to the remaining numbers return #t else return #f

What is .net technology?, What is .NET TECHNOLOGY? .NET technological ...

What is .NET TECHNOLOGY? .NET technological innovation was presented by Enthusiasm, to get the industry from the SUN's Coffee. Few in the past, Enthusiasm had only VC++ and VB

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd