Show the properties of text box, Computer Engineering

Assignment Help:

Q. Show the properties of Text Box?

The <INPUT> tag is used to specify where user input is expected. It has several attributes, of which TYPE attribute is used to specify the kind of input which is to be provided. The most common value of this attribute of <INPUT> tag is TEXT. As demonstrated in Figure, every INPUT needs a NAME. When user types in his address (for instance 1234 ABC), it will become input's value and be paired with NAME so end result after running it through Mailto Formatter would be ADDRESS=1234 ABC.

We can, if we want to, type in a VALUE.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ">

This would automatically pair the value 44 XYZ with name ADDRESS, unless user changes it. Take care to use quotes as specified in the illustration.

We can specify the size of text input box.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

Default value is 20. You already know that default value is the value that browser presumes if you haven't told it otherwise.

Go ahead and remove VALUE="44 XYZ".

If we want, we can specify how many characters a user can input.

Experiment with this and try to input more than 10 characters! MAXLENGTH attribute is used to restrict number of characters to be entered in textbox.

<INPUT TYPE=TEXT NAME="ADDRESS" SIZE=20 MAXLENGTH=10>

Very similar to TYPE=TEXT is the TYPE=PASSWORD. It is exactly same, except that for security it displays *** in place of the actual input. Text entered as password wouldn't be echoed on the page. So you can use this anytime you want to accept a password or some other sensitive information from the user.

<INPUT TYPE=PASSWORD>

Remember that every <INPUT> should have a NAME which gives the name of field.

<INPUT TYPE=PASSWORD NAME="USER PASSWORD">

SIZE, VALUE and MAXLENGTH attributes work here also similarly as they do with TEXT.


Related Discussions:- Show the properties of text box

Define a technique of temporarily removing inactive program, is a technique...

is a technique of temporarily removing inactive programs from the memory of computer system? Swapping is a technique of temporarily eliminating inactive programs from the memor

Give example of bus and memory transfer, Give example of bus and memory tra...

Give example of bus and memory transfer For example, the read operation for transfer of a memory unit M from address register AR to another data register DR can be illustrated

Describe the vertical frequency or cycle, Q. Describe the Vertical Frequenc...

Q. Describe the Vertical Frequency or cycle? Like a Fluorescent lamp, the screen has to repeat same image many times per second to display an image to user. The frequency of th

ASP.NET, I have developed a web application in .net & if the web applicati...

I have developed a web application in .net & if the web application is idle for some time & after that if we perform some action on that web page then it doesn''t respond. Can you

ERP, Benefits of implementing ERP

Benefits of implementing ERP

What is write-through protocol, What is write-through protocol? For a w...

What is write-through protocol? For a write operation using write-through protocol during write-hit: The cache location and the major memory location are updated concurrently.

What are program-invisible registers, What are program-invisible registers?...

What are program-invisible registers? Ans: the local and global descriptor tables are found in the memory system. To access and specify the address of these tables, program inv

What are the major components of a web browser, What are the major componen...

What are the major components of a web browser? A browser contains a set of clients, a controller and a set of interpreters which manages them. All browsers must have an HTML

Translate sentence into predicate logic - ai, Translate the following sente...

Translate the following sentences into predicate logic, using identity (=). a. Everyone was drunk except John. b. Christine rides a bike, but everyone else drives a car. c

Describe distributed object model, Question 1 Give a brief explanation on m...

Question 1 Give a brief explanation on message oriented middleware Question 2 Describe Distributed object model Question 3 Explain File systems in a distributed computing Env

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd