Hidden input, Computer Engineering

Assignment Help:

Yet another type of input is HIDDEN input.

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Friend Form 1">

A HIDDEN input is a value/name pair which is returned to you but doesn't show up anywhere on web page. The hidden input above is required for use with mailto Formatter (MTF). It's how MTF recognizes the forms it has to parse.

Assume you were a company trying to generate leads for a new product and there is a standard form for gathering information which has name, company, products, phone interested in, etc. Only problem is there are 6 slightly different versions of form in 6 different places. You need to know what's coming from where. What to do?

You can add a HIDDEN input to your forms like below:

<HTML>

<BODY>

<FORM METHOD=POST>

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 1"> ...for the first version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 2"> ...for the second version

<INPUT TYPE=HIDDEN NAME="FORMNAME" VALUE="Version 3"> ...for the third version

</FORM>

</HTML>

By the way, it doesn't matter what name/value pair in the hidden input is (or any input for that matter).

<INPUT TYPE=HIDDEN NAME="E" VALUE="Mc^2">HIDDEN

Inputs are also useful for cgi scripts. For instance, many ISP's have a script you can have your forms sent to. It then sends form back to you properly formatted. Hidden input can be used to tell cgi script who you are, where to send parsed data and so on.


Related Discussions:- Hidden input

Illustrate the advantages of register transfer, Register Transfer We as...

Register Transfer We assign computer registers by capital letters to denote function of the register. Such as, the register which holds an address for memory unit is usually

Execution of a program in cpu, Execution of a program in CPU is completed e...

Execution of a program in CPU is completed employing different set of registers and their individual circuitry. As CPU registers are used for execution of interrupt service routine

Give an account of modems used in data transfer, Give an account of modems ...

Give an account of modems used in data transfer. Modem: Modems are usually provided through network operators (Department of Telecommunication in India) or through vendors wh

Explain the main tags of wireless markup language, Discuss the main tags of...

Discuss the main tags of WML. Tag Definition of Wireless Markup Language: This defines the starting and the ending of the page, as .   this explains

Operation of micro-programmed control unit, Micro-instructions are stored i...

Micro-instructions are stored in control memory. Address register for control memory comprises the address of subsequent instruction which is to be read. Control memory Buffer Regi

Instruction level-levels of parallel processing, Instruction Level It r...

Instruction Level It refers to the condition where different instructions of a program are implemented by different processing elements. Most processors have numerous execution

Soundness - artificial intelligence, Soundness - artificial intelligence: ...

Soundness - artificial intelligence: You may see in some application domains-for example automated theorem proving - that your search is "sound and complete". The soundness in

What is meaning of term byte stuffing, The term byte stuffing refers to: ...

The term byte stuffing refers to: The term byte stuffing consider as to data stuffing used along with character -oriented hardware.

Maximum number of nodes in a binary tree, The maximum number of nodes in a ...

The maximum number of nodes in a binary tree of depth 5 is 31 is the maximum number of nodes in a binary tree

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd