Show the properties of text box, Computer Engineering

Assignment Help:

Q. Show the properties of Text Box?

The <INPUT> tag is used to specify where user input is expected. It has several attributes, of which TYPE attribute is used to specify the kind of input which is to be provided. The most common value of this attribute of <INPUT> tag is TEXT. As demonstrated in Figure, every INPUT needs a NAME. When user types in his address (for instance 1234 ABC), it will become input's value and be paired with NAME so end result after running it through Mailto Formatter would be ADDRESS=1234 ABC.

We can, if we want to, type in a VALUE.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ">

This would automatically pair the value 44 XYZ with name ADDRESS, unless user changes it. Take care to use quotes as specified in the illustration.

We can specify the size of text input box.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

Default value is 20. You already know that default value is the value that browser presumes if you haven't told it otherwise.

Go ahead and remove VALUE="44 XYZ".

If we want, we can specify how many characters a user can input.

Experiment with this and try to input more than 10 characters! MAXLENGTH attribute is used to restrict number of characters to be entered in textbox.

<INPUT TYPE=TEXT NAME="ADDRESS" SIZE=20 MAXLENGTH=10>

Very similar to TYPE=TEXT is the TYPE=PASSWORD. It is exactly same, except that for security it displays *** in place of the actual input. Text entered as password wouldn't be echoed on the page. So you can use this anytime you want to accept a password or some other sensitive information from the user.

<INPUT TYPE=PASSWORD>

Remember that every <INPUT> should have a NAME which gives the name of field.

<INPUT TYPE=PASSWORD NAME="USER PASSWORD">

SIZE, VALUE and MAXLENGTH attributes work here also similarly as they do with TEXT.


Related Discussions:- Show the properties of text box

Message passing programming, Message passing is possible the most widely us...

Message passing is possible the most widely used parallel programming paradigm these days. It is the most portable, natural and efficient scheme for distributed memory systems. It

client will now send ten integers , Change this program so that every clie...

Change this program so that every client will now send ten integers and receives their sum from the server. In Java, for loops can be easily executed as follows: for (int i = 0 ; i

Examples of input, (i)  Input a single ASCII character into BL register wit...

(i)  Input a single ASCII character into BL register without echo on screen  CODE SEGMENT  MOV AH, 08H;         Function 08H  INT 21H          ;         the character inpu

Define grammar of a language, Define Grammar of a language. A formal la...

Define Grammar of a language. A formal language grammar is a set of formation rules which describe that strings formed from the alphabet of a formal language are syntactically

Temporary location, Compare zero-, one, two-, and three- address machines b...

Compare zero-, one, two-, and three- address machines by writing programs to compute                         X = (A + B x C)/(D - E x F) for every of the four machines.  Do n

What is the prominence of rs232-c in serial communication, What is the prom...

What is the prominence of RS232-C in serial communication?  Name some application where you see its use.  RS-232 stands for Recommend Standard number 232 and C is the latest re

Garbage collector to free the memory, In .NET Compact Framework, can I free...

In .NET Compact Framework, can I free memory explicitly without waiting for garbage collector to free the memory?  Yes you can clear the memory using gc.collect method but it i

Show the liability of cpu in interrupt cycle, Q. Show the liability of CPU ...

Q. Show the liability of CPU in interrupt cycle? In the interrupt cycle the liability of CPU/Processor is to ensure whether any interrupts have happened checking presence of in

Remote-load latency problem, Remote-load Latency Problem:  When one process...

Remote-load Latency Problem:  When one processor requires some remote loading of data by other nodes, then the processor need to wait for these two remote load operations. The long

What is interrupt vector table, Interrupt vector table is always created in...

Interrupt vector table is always created in first 1K area of the memory. Explain why? When CPU receives an interrupt type number from PIC, it uses this number to look up corres

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd