What is enctype, Computer Engineering

Assignment Help:

ENCTYPE="application/x-www-form-urlencoded" and in its place use

ENCTYPE="text/plain".

The subsequent illustration displays a general form which includes some of the commonly used controls.

<HTML>

<HEAD>

<TITLE> Welcome to EXPERTSMIND.COM </TITLE>

</HEAD>

<BODY>

<FORM METHOD=POST>

Text box with name, value and size attributes

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

<BR>Text box with password and maxlength

<INPUT TYPE=PASSWORD MAXLENGTH=10>

<BR>Radio button with default checked<BR>

Who is your best friend?<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Ajay" CHECKED>

Ajay <BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Rohan"> Rohan

<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Tarun"> Tarun<P>

<BR>Checkbox<BR>

<INPUT TYPE=CHECKBOX NAME="AJAY" VALUE="YES"> Ajay <BR>

<INPUT TYPE=CHECKBOX NAME="Rohan" VALUE="YES"> Rohan <BR>

<INPUT TYPE=CHECKBOX NAME="BU" VALUE="YES"> Bunty<P>

<BR>Drop down list<BR>

<SELECT NAME="BEST FRIEND" SIZE=4>

<OPTION VALUE="Ajay">Ajay

<OPTION VALUE="Rohan">Rohan

<OPTION VALUE="Tarun">Tarun

<OPTION VALUE="Gagan">Gagan

<OPTION VALUE="Harish">Harish

<OPTION VALUE="Manjit">Manjit

</SELECT>

</FORM>

</HTML>

2148_What is ENCTYPE.png

Figure: A Web Page with a Form


Related Discussions:- What is enctype

Detail explanation of cryptographic modules, Detail explanation of Cryptogr...

Detail explanation of Cryptographic modules Physical security of the cryptographic modules is also built in order to provide total security of the whole system and protect from

Write a perl script, Write a PERL script which takes a file named input.txt...

Write a PERL script which takes a file named input.txt as an input and processes it. The input file has the following format: firstname lastname: pass/fail score%. A sample input f

Higher order predicate logic - artificial intelligence, Higher Order Predic...

Higher Order Predicate Logic: In first order predicate logic, we are allowed to quantify over objects only. If we let  ourselves  to  quantify  over  predicate  or  function  s

C++, pebble merchant

pebble merchant

Coa, Whats the use of coa

Whats the use of coa

What are the 2 ieee standards for floating point numbers, What are the 2 IE...

What are the 2 IEEE standards for floating point numbers? 1.single 2.double

Counter, mod12 counter connection diagram

mod12 counter connection diagram

Execution of a program in cpu, Execution of a program in CPU is completed e...

Execution of a program in CPU is completed employing different set of registers and their individual circuitry. As CPU registers are used for execution of interrupt service routine

Pros and cons of assembly language, Pros and Cons of Assembly Language ...

Pros and Cons of Assembly Language The following are a number of advantages / disadvantages of employing assembly language: Assembly Language offers more control over ha

How i-o interface communicate with processor, Q. How I-O interface communic...

Q. How I-O interface communicate with processor? The above illustration clearly specifies need communication between processor and I/O interface. This communication includes su

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd