Download presentation
Presentation is loading. Please wait.
Published byLeslie Fisher Modified over 9 years ago
1
Adapted from 2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and 3.1-3.3 4 th ed: 4.11 SY306 Web and Databases for Cyber Operations Set 3: HTML5 Forms
2
Adapted from 2012 Prentice Hall, Inc. All rights reserved. 2.11 Forms HTML forms are used to collect user input.
3
Adapted from 2012 Prentice Hall, Inc. All rights reserved. First name: Notice that the hidden field above is not shown to a user. http://www.w3schools.com/tags/tryit.asp?filename=tryhtml5_input_type_hidden
4
Adapted from 2012 Prentice Hall, Inc. All rights reserved. More Complex HTML5 Forms
5
Adapted from 2012 Prentice Hall, Inc. All rights reserved. Key issue: How is data sent to the server? method = “get” –Requests data from a specified resource –Appends form data directly to the end of the URL 1.http://... submit.cgi?name=smith&vote=3http://... submit.cgi?name=smith&vote=3 2.http://www.amazon.com/search?item=iphone6shttp://www.amazon.com/search?item=iphone6s method = “post” –Submits data to be processed to a specified resource –query string (name/value pairs) is sent in the HTTP message body of a POST request
6
Adapted from 2012 Prentice Hall, Inc. All rights reserved. Key issue: What provides security? Using Using https:// Using http://
7
Adapted from 2012 Prentice Hall, Inc. All rights reserved. Exercise #1: Write HTML5 to generate this form:
8
Adapted from 2012 Prentice Hall, Inc. All rights reserved. Exercise #2: Write HTML5 to generate this form:
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.