What is enctype, Computer Engineering

Assignment Help:

ENCTYPE="application/x-www-form-urlencoded" and in its place use

ENCTYPE="text/plain".

The subsequent illustration displays a general form which includes some of the commonly used controls.

<HTML>

<HEAD>

<TITLE> Welcome to EXPERTSMIND.COM </TITLE>

</HEAD>

<BODY>

<FORM METHOD=POST>

Text box with name, value and size attributes

<INPUT TYPE=TEXT NAME="ADDRESS" VALUE="44 XYZ" SIZE=10>

<BR>Text box with password and maxlength

<INPUT TYPE=PASSWORD MAXLENGTH=10>

<BR>Radio button with default checked<BR>

Who is your best friend?<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Ajay" CHECKED>

Ajay <BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Rohan"> Rohan

<BR>

<INPUT TYPE=RADIO NAME="BEST FRIEND" VALUE="Tarun"> Tarun<P>

<BR>Checkbox<BR>

<INPUT TYPE=CHECKBOX NAME="AJAY" VALUE="YES"> Ajay <BR>

<INPUT TYPE=CHECKBOX NAME="Rohan" VALUE="YES"> Rohan <BR>

<INPUT TYPE=CHECKBOX NAME="BU" VALUE="YES"> Bunty<P>

<BR>Drop down list<BR>

<SELECT NAME="BEST FRIEND" SIZE=4>

<OPTION VALUE="Ajay">Ajay

<OPTION VALUE="Rohan">Rohan

<OPTION VALUE="Tarun">Tarun

<OPTION VALUE="Gagan">Gagan

<OPTION VALUE="Harish">Harish

<OPTION VALUE="Manjit">Manjit

</SELECT>

</FORM>

</HTML>

2148_What is ENCTYPE.png

Figure: A Web Page with a Form


Related Discussions:- What is enctype

Cache-only memory access model (coma), Cache-Only Memory Access Model (COMA...

Cache-Only Memory Access Model (COMA) As we have discussed previous, shared memory multiprocessor systems may use cache memories with each processor for deducting the execution

Determine the binary equivalent of hexadecimal FA, The binary equivalent of...

The binary equivalent of (FA) 16   is ? Ans. (FA) 16 = (11111010) 10

Define end directive and assume directive, END DIRECTIVE: ENDS directive e...

END DIRECTIVE: ENDS directive ends a segment and ENDP directive ends a procedure and END directive ends whole program which appears as last statement. ASSUME Directive:   An .

Define the firewall design policy, Define the Firewall Design Policy ...

Define the Firewall Design Policy A lower-level policy that describes how the firewall will handle prevention of access and filtering of services as defined in the above net

Define seek time and latency time, Define seek time and latency time. ...

Define seek time and latency time.  The time taken by the head to move to the appropriate cylinder or track is known as seek time. Once the head is at right track, it must wai

What is multiplicity, What is multiplicity? Multiplicity is applied to ...

What is multiplicity? Multiplicity is applied to attributes for data base application. Multiplicity for an attribute specifies the number of possible value for every instantiat

What is page frame, What is page frame? An area in the main memory that...

What is page frame? An area in the main memory that can hold single page is called as page frame.

Write the factors considered in designing an i/o subsystem, Write the facto...

Write the factors considered in designing an I/O subsystem? 1.  Data Location: Device selection, address of data within device ( track, sector etc) 2.  Data transfer: Amount

What is mqseries channel, Channel means logical communication link. There a...

Channel means logical communication link. There are two parts of channels a) Message channel, b) MQI channel   1) Mesage channel use for communication among QMgr to Q

What is bank interleaving, Interleaved memory is a method for compensating ...

Interleaved memory is a method for compensating the relatively slow speed of DRAM. The CPU can access alternative sections instantly without waiting for memory to be cached. Multip

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd