Presentation is loading. Please wait.

Presentation is loading. Please wait.

Adapted from  2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and 3.1-3.3 4 th ed: 4.11 SY306 Web and Databases for Cyber Operations.

Similar presentations


Presentation on theme: "Adapted from  2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and 3.1-3.3 4 th ed: 4.11 SY306 Web and Databases for Cyber Operations."— Presentation transcript:

1 Adapted from  2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and 3.1-3.3 4 th ed: 4.11 SY306 Web and Databases for Cyber Operations Set 3: HTML5 Forms

2 Adapted from  2012 Prentice Hall, Inc. All rights reserved. 2.11 Forms HTML forms are used to collect user input.

3 Adapted from  2012 Prentice Hall, Inc. All rights reserved. First name: Notice that the hidden field above is not shown to a user. http://www.w3schools.com/tags/tryit.asp?filename=tryhtml5_input_type_hidden

4 Adapted from  2012 Prentice Hall, Inc. All rights reserved. More Complex HTML5 Forms

5 Adapted from  2012 Prentice Hall, Inc. All rights reserved. Key issue: How is data sent to the server? method = “get” –Requests data from a specified resource –Appends form data directly to the end of the URL 1.http://... submit.cgi?name=smith&vote=3http://... submit.cgi?name=smith&vote=3 2.http://www.amazon.com/search?item=iphone6shttp://www.amazon.com/search?item=iphone6s method = “post” –Submits data to be processed to a specified resource –query string (name/value pairs) is sent in the HTTP message body of a POST request

6 Adapted from  2012 Prentice Hall, Inc. All rights reserved. Key issue: What provides security? Using Using https:// Using http://

7 Adapted from  2012 Prentice Hall, Inc. All rights reserved. Exercise #1: Write HTML5 to generate this form:

8 Adapted from  2012 Prentice Hall, Inc. All rights reserved. Exercise #2: Write HTML5 to generate this form:


Download ppt "Adapted from  2012 Prentice Hall, Inc. All rights reserved. 5 th ed: Chapter 2 and 3.1-3.3 4 th ed: 4.11 SY306 Web and Databases for Cyber Operations."

Similar presentations


Ads by Google