Show the properties of text box, Computer Engineering

Assignment Help:

Q. Show the properties of Text Box?

The <INPUT> tag is used to specify where user input is expected. It has several attributes, of which TYPE attribute is used to specify the kind of input which is to be provided. The most common value of this attribute of <INPUT> tag is TEXT. As demonstrated in Figure, every INPUT needs a NAME. When user types in his address (for instance 1234 ABC), it will become input's value and be paired with NAME so end result after running it through Mailto Formatter would be ADDRESS=1234 ABC.

We can, if we want to, type in a VALUE.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ">

This would automatically pair the value 44 XYZ with name ADDRESS, unless user changes it. Take care to use quotes as specified in the illustration.

We can specify the size of text input box.

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

Default value is 20. You already know that default value is the value that browser presumes if you haven't told it otherwise.

Go ahead and remove VALUE="44 XYZ".

If we want, we can specify how many characters a user can input.

Experiment with this and try to input more than 10 characters! MAXLENGTH attribute is used to restrict number of characters to be entered in textbox.

<INPUT TYPE=TEXT NAME="ADDRESS" SIZE=20 MAXLENGTH=10>

Very similar to TYPE=TEXT is the TYPE=PASSWORD. It is exactly same, except that for security it displays *** in place of the actual input. Text entered as password wouldn't be echoed on the page. So you can use this anytime you want to accept a password or some other sensitive information from the user.

<INPUT TYPE=PASSWORD>

Remember that every <INPUT> should have a NAME which gives the name of field.

<INPUT TYPE=PASSWORD NAME="USER PASSWORD">

SIZE, VALUE and MAXLENGTH attributes work here also similarly as they do with TEXT.


Related Discussions:- Show the properties of text box

Important steps of the boot process, Question: Computer forensic examin...

Question: Computer forensic examiners should be concerned with at least two important settings stored in RTC/NVRAM, which is accessed by the BIOS software most often called Set

How a file can be shared among different users, Discuss the different techn...

Discuss the different techniques with which a file can be shared among different users. Several popular techniques with that a file can be shared among various users are: 1

C program, find area uder the curve y=f(x) between x=a and x=b Posted Date...

find area uder the curve y=f(x) between x=a and x=b Posted Date: 9/1/2012 1:50:09 AM

Implement the concept of true and radix minus one complement, Q. Develop a...

Q. Develop a program to implement the concept of true and radix minus one complement. Program should ask for radix and two numbers from that radix. For that two numbers program

How to correctly apply the graphics patches in matlab, Open a LOCAL MACHINE...

Open a LOCAL MACHINE window and type: xhost +ashland # Add the following code sequence just before the plot command that was giving you problems: figure; set(gcf,'renderer','zbuffe

Show the noframes tag, Q. Show the Noframes Tag? tag can be used for t...

Q. Show the Noframes Tag? tag can be used for those browsers which aren't able to interpret tags. Even though most, if not all, of your visitors would

What is software quality assuranc, Software QA includes the whole software ...

Software QA includes the whole software development PROCESS - improving and monitoring the process, making sure that any agreed-upon standards and processes are followed, and ensur

Interrupt and scanning method of keypad operation, INTERRUPT METHOD - USING...

INTERRUPT METHOD - USING PORTB CHANGE INTERRUPT By using 4 by 4 matrix keypad connected to PORTA and PORTB. The rows are connected to PORTA-Low (RA1-RA4) and the columns are co

Stack, The Stack A procedure call is supported by a stack. So let's dis...

The Stack A procedure call is supported by a stack. So let's discuss stack in assembly. Stacks are 'Last In First Out' data structures and are used for storing return addresses

Explain standard streams and file streams, a. Explain Standard Streams and ...

a. Explain Standard Streams and file streams. Differentiate among two types of stream. b. Write a program in C++ that inputs characters from the keyboard and prints them in reve

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd