100% found this document useful (2 votes)
500 views

Class - X - Practical & Project File - Session - 2024-25

Uploaded by

bhrtvs77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
500 views

Class - X - Practical & Project File - Session - 2024-25

Uploaded by

bhrtvs77
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 36

PRAGATI

PUBLIC SR. SEC. SCHOOL

PRACTICAL FILE
CUM
PROJECT WORK

SESSION (2024-25)

Submitted by: ______________


Under the guidance of: Mr. Bharat Vyas
Certificate

Roll No:

This is to certify that _________, student of


class 10th has successfully completed the
project on the below mentioned project
under the guidance of Mr. Bharat Vyas
(subject teacher) during the year of 2024-25
in partial fulfillment of computer science
practical examination conducted by AISCE,
New Delhi.

__________ _________
Signature of Signature of
External examiner Internal examiner

_________________
Seal/ Signature of Principal
Acknowledgement
In the accomplishment of this practical file/
project successfully, many people have best
owned upon us their blessings and the heart
pledge support, this time we are utilizing to
thank all the people who have been
concerned with this project. Primarily we
would like to thank god for being able to
complete this project with success. Then we
would like to thank my principal Mrs Sarika
Sharma ma'am and our Computer science
teacher Mr. Bharat Vyas sir whose valuable
guidance has been the ones that helped us
patch this project and make it full proof
success, his suggestions and instruction has
served as the major contribution towards the
completion of this project. Then we would
like to thank our parents who have helped us
with their valuable suggestions and guidance
has been very helpful in various phases of the
completion of the practical file/ project.
S.No. Contents Page No.
1. HTML code to create static web pages.
2. HTML code to use CSS technique using external
style sheets to enforce a format in an HTML page.
3. HTML code to embed pictures, audio and videos in
an HTML page.
4. HTML code to add tables and frames in an HTML page.
5. HTML code to decorate web pages using graphical
elements.
6. HTML code to for using various HTML form elements
(textbox, radio button, password, list, etc.)
7. HTML code to create a blog discussing viruses, malware,
spam, antiviruses
8. Create a web page discussing plagiarism. List some reported cases
of plagiarism and the consequent punishment meted out. Explain
the nature of the punishment in different countries as per their
IP laws.
9. HTML code to create static web pages
10. HTML code to implement the concept of form.

____________
TEACHER'S SIGN
Program 1: HTML code to create static web pages.
Code:-

<!DOCTYPE html>

<html lang="en">

<head>

<!-- Declared Vars To Go Here -->

<meta charset="utf-8">

<meta http-equiv="X-UA-Compatible" content="IE=edge">

<meta name="viewport" content="width=device-width, initial-scale=1">

<!-- Metadata -->

<meta name="description" content="">

<meta name="author" content="">

<link rel="icon" href="mysource_files/favicon.ico">

<!-- Page Name and Site Name -->

<title>Page Name - Squiz Matrix HTML Example</title>

<!-- CSS -->

<link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css"
rel="stylesheet">

<link href="mysource_files/style.css" rel="stylesheet">

</head>

<body>

<div class="container">

<header class="header clearfix" style="background-color: #ffffff">

<!-- Main Menu -->

<nav>
<ul class="nav nav-pills pull-right">

<li class="active"><a href="#">Home</a></li>

<li><a href="#">About</a></li>

<li><a href="#">Contact</a></li>

</ul>

</nav>

<!-- Site Name -->

<h1 class="h3 text-muted">Site Name</h1>

<!-- Breadcrumbs -->

<ol class="breadcrumb">

<li><a href="#">Home</a></li>

<li><a href="#">Level 1</a></li>

<li class="active">Level 2</li>

</ol>

</header>

<div class="page-heading">

<!-- Page Heading -->

<h1>Page Heading</h1>

</div>

<div class="row">

<div class="col-sm-3">

<!-- Sub Navigation -->

<ul class="nav nav-pills nav-stacked">

<li><a href="#">Level 2</a></li>

<li class="active"><a href="#">Level 2</a>

<ul>

<li><a href="#">Level 3</a></li>

<li><a href="#">Level 3</a></li>

<li><a href="#">Level 3</a></li>

</ul>

</li>
<li><a href="#">Level 2</a></li>

</ul>

</div>

<div class="col-sm-6">

<div class="page-contents">

<!-- Design Body -->

<h2>Sub Heading</h2>

<p>Donec id elit non mi porta gravida at eget metus. Maecenas faucibus mollis interdum.</p>

<h4>Sub Heading</h4>

<p>Morbi leo risus, porta ac consectetur ac, vestibulum at eros. Cras mattis consectetur

Purus sit amet fermentum.</p>

<h4>Sub Heading</h4>

<p>Maecenas sed diam eget risus varius blandit sit amet non magna.</p>

</div>

</div>

<div class="col-sm-3">

<!-- Login Section -->

<h2>Login</h2>

<!-- Search Section -->

<h2>Search</h2>

<!-- Nested Right Column Content -->

</div>

</div>

<footer class="footer">

<p class="pull-right">

<!-- Last Updated Design Area-->

Last Updated: Monday, October 7, 2022

</p>

<p>&copy; 2016 Company, Inc.</p>

</footer>

</div> <!-- /container -->


</body>

</html>

Output 1:
Program 2: HTML code to use CSS technique using external style sheets to enforce a
format in an HTML page.
Code:

BODY {background:cyan; margin-top:20}


H1 {font-weight:bold; text-align:center; color:Red; font-family:Gill Sans, Arial, Sans-serif}
CITE {font-family:Gill Sans, Arial, Sans-serif; font-style:italic}
H2 {font-size:16pt; font-weight:bold; margin-top:6; margin-bottom:6}
P {margin-top:4; margin-bottom:4}
TD {padding:1pt 3pt 2pt 3pt; border-style:solid; border-width:1}
TABLE {border-style:solid; border-width:3; border-color:white; font-size:10pt; text-align:Justify}

<html>
<head>
<title>EXTERNAL STYLES</title>
<link type="text/css" rel="stylesheet" href="EXTERNAL.CSS" />
</head>
<body>
<h1> Using External Stylesheet</h1>
<table>
<tr>
<th>Writer</th>
<th>Primary Genre</th>
</tr>
<tr><td>Arora</td><td>Technical (Multimedia)</td></tr>
<tr><td>Roy</td><td>Fiction</td></tr>
<tr>
<td>Yunus</td>
<td>Non-Fiction</td>
</tr>
</table>
<p>Another table follows
<table>
<tr>
<th>Writer</th>
<th>Primary Genre</th>
</tr>
<tr><td>Singh</td><td>Technical</td></tr>
<tr><td>Paulo</td><td>Fiction</td></tr>
<tr>
<td>Oslo</td>
<td>Non-Fiction</td>
</tr>
</table>
</body>
</html>
Output 2:

Program 3: HTML code to embed following media-


3.1 For audio:-

<!DOCTYPE html>

<html>

<head>

<title>Page Title</title>

</head>

<body>

<h2>Click play button to play audio</h2>

<audio src="./test.mp3" controls></audio>

</body>

</html>

Output 3.1:

3.2 For video:-

<!DOCTYPE html>
<html>

<head>

<title>Page Title</title>

</head>

<body>

<h2>Click play button to play video</h2>

<video src="./test.mp4" controls></video>

</body>

</html>

Output 3.2:

3.3 For image:-

<!DOCTYPE html>

<html>

<head>

<style>

img {

width: 100%;

}
</style>

</head>

<body>

<img src="html5.gif" alt="HTML5 Icon" width="128" height="128">

<img src="html5.gif" alt="HTML5 Icon" style="width:128px;height:128px;">

</body>

</html>

Output 3.3:

Program 4: HTML code to add tables and frames in an HTML page.


Code:

<!DOCTYPE html>

<html>

<body>

<p><b>Note:</b> The frame attribute is not supported in HTML5. Use CSS instead.</p>

<p>Table with frame="box":</p>

<table frame="box">

<tr>

<th>Month</th>

<th>Savings</th>
</tr>

<tr>

<td>January</td>

<td>$100</td>

</tr>

</table>

<p>Table with frame="above":</p>

<table frame="above">

<tr>

<th>Month</th>

<th>Savings</th>

</tr>

<tr>

<td>January</td>

<td>$100</td>

</tr>

</table>

<p>Table with frame="below":</p>

<table frame="below">

<tr>

<th>Month</th>

<th>Savings</th>

</tr>

<tr>

<td>January</td>

<td>$100</td>

</tr>

</table>

<p>Table with frame="hsides":</p>

<table frame="hsides">
<tr>

<th>Month</th>

<th>Savings</th>

</tr>

<tr>

<td>January</td>

<td>$100</td>

</tr>

</table>

<p>Table with frame="vsides":</p>

<table frame="vsides">

<tr>

<th>Month</th>

<th>Savings</th>

</tr>

<tr>

<td>January</td>

<td>$100</td>

</tr>

</table>

</body>

</html>

Output 4:
Program 5: HTML code to decorate web pages using graphical elements
Using SVG:

<!DOCTYPE html>

<html>

<body>

<h1>My first SVG</h1>

<svg width="100" height="100">

<circle cx="50" cy="50" r="40" stroke="green" stroke-width="4" fill="yellow" />

Sorry, your browser does not support inline SVG.

</svg>

</body>

</html>

Output 5:
Program 6: HTML code for using various HTML form elements like- text box, radio buttons,
checkbox, password, list, combo box.
Code:

1. For Text Box:

<label>First Name: <input type="text"></label>

<label>Last Name: <input type="text"></label>

Output:

2. For Password:

<form>

<label for="pwd">Password:</label>

<input type="password" id="pwd" >

</form>

Output:
3. For Radio Buttons:

<input type="radio" name="gender" id="male">

<label for="male">Male</label>

<input type="radio" name="gender" id="female">

<label for="female">Female</label>

Output:

4. For Checkbox:

<label> <input type="checkbox"> :Bike</label>

<label> <input type="checkbox"> :Car</label>

Output:

5. For Listbox:

<select name="Cars" size="5">

<option value="Merceders"> Merceders </option>

<option value="BMW"> BMW </option>

<option value="Jaguar"> Jaguar </option>

<option value="Lamborghini"> Lamborghini </option>


<option value="Ferrari"> Ferrari </option>

<option value="Ford"> Ford </option>

</select>

Output:

6. For Combo Box:

<select class="combobox">

<option value="Select">Select....</option>

<option value="php">php</option>

<option value="html">html</option>

<option value="javascript">Javascript</option>

<option value="CPP">CPP</option>

<option value="Python">Python</option>

<option value="vue">Vue</option>

<option value="7">Cobobl</option>

<option value="9">TEXT 4</option>

<option value="CSS Text">CSS TEXT</option>

<option value="responsive">Responsive</option>

<option value="script">scripting</option>

<option value="preprocessors">Saas, Less</option>

<option value="csharp">C Sharp</option></select>

<style>

.combobox{

padding:8px;

}
</style>

Output:

Program 7. Write a blog using HTML pages discussing Viruses, Malware, Spam and
Antiviruses.
Code:

<html>

<head>

<title> PROJECT P-2 </title>

</head>

<body background="B1.JPG">

<h1> <font color="green" size="65"><B> <U> VIRUSES </B> </U> </font> </h1>

<p> <font color="blue" size="15">A computer virus is a type of malicious software, or malware, that
spreads between computers and causes damage to data

and software.

Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and
leakage.

A key thing to know about computer viruses is that they are designed to spread across programs and
systems.

Computer viruses typically attach to an executable host file, which results in their viral codes
executing when a file is opened.

The code then spreads from the document or software it is attached to via networks, drives, file-
sharing programs, or infected email attachments.</font></p>
<br><br><br><br><br><br><br><br><br><br>

<center><font color="magenta" size="35"> TYPES OF VIRUSES-</font></center>

<br><br><br>

<font color="yellow" size="20">Resident Virus</font>

<p><font color="red" size="15">Viruses propagate themselves by infecting applications on a host


computer.

A resident virus achieves this by infecting applications as they are opened by a user.

A non-resident virus is capable of infecting executable files when programs are not
running.</font></p>

<br><br>

<font color="yellow" size="20">Multipartite Virus</font>

<p><font color="red" size="15">A multipartite virus uses multiple methods to infect and spread
across computers.

It will typically remain in the computer’s memory to infect the hard disk, then spread through and
infect more drives by altering the content of applications. This results in performance lag and
application memory running low.</font> </p>

<br><br>

<font color="yellow" size="20">Direct Action</font>

<p><font color="red" size="15">A direct action virus accesses a computer’s main memory and
infects all programs, files, and folders located in the autoexec.bat path, before deleting itself. This
virus typically alters the performance of a system but is capable of destroying all data on the
computer’s hard disk and any USB device attached to it. Direct action viruses can be avoided through
the use of antivirus scanners. They are easy to detect, as is restoring infected files.</font> </p>

<br><br>

<font color="yellow" size="20">Browser Hijacker</font>

<p><font color="red" size="15">A browser hijacker manually changes the settings of web browsers,
such as replacing the homepage, editing the new tab page, and changing the default search engine.
Technically, it is not a virus because it cannot infect files but can be hugely damaging to computer
users, who often will not be able to restore their homepage or search engine. It can also contain
adware that causes unwanted pop-ups and advertisements.</font> </p>

<br><br>

<font color="yellow" size="20">Overwrite Virus</font>

<p><font color="red" size="15">Overwrite viruses are extremely dangerous. They can delete data
and replace it with their own file content or code. Once files get infected, they cannot be replaced,
and the virus can affect Windows, DOS, Linux, and Apple systems. The only way this virus can be
removed is by deleting all of the files it has infected, which could be devastating. The best way to
protect against the overwrite virus is to use a trusted antivirus solution and keep it updated.</font>
</p>

<br><br>

<font color="yellow" size="20">Web Scripting Virus</font>

<p><font color="red" size="15">A web scripting virus attacks web browser security, enabling a
hacker to inject web-pages

with malicious code, or client-side scripting. This allows cyber criminals to attack major websites,
such as social networking sites,

email providers, and any site that enables user input or reviews. Attackers can use the virus to send
spam, commit fraudulent activity, and damage server files.</font> </p>

<br><br>

<font color="yellow" size="20">File Infector</font>

<p><font color="red" size="15">A file infector is one of the most common computer viruses. It
overwrites files when they are opened and can quickly spread across systems and networks. It
largely affects files with .exe or .com extensions.

The best way to avoid file infector viruses is to only download official software and deploy an
antivirus solution.</font></p>

<br><br>

<font color="yellow" size="20">Network Virus</font>

<p><font color="red" size="15">Network viruses are extremely dangerous because they can
completely cripple entire computer networks. They are often difficult to discover, as the virus could
be hidden within any computer on an infected network. These viruses can easily replicate and
spread by using the internet to transfer to devices connected to the network.

Trusted, robust antivirus solutions and advanced firewalls are crucial to protecting against network
viruses.</font> </p>

<br><br>

<font color="yellow" size="20">Boot Sector Virus</font>

<p><font color="red" size="15">A boot sector virus targets a computer’s master boot record (MBR).
The virus injects its code into a hard disk’s partition table, then moves into the main memory when a
computer restarts. The presence of the virus is signified by boot-up problems, poor system
performance, and the hard disk becoming unable to locate. Most modern computers come with
boot sector safeguards that restrict the potential of this type of virus.</font> </p>

<br><br><br><br><br><br><br><br><br><br><br><br><br><br>

<font color="green" size="65"><B> <U> MALWARE </B> </U> </font>

<br><br>

<font color="blue" size="15">Malware, or malicious software, is any program or file that is


intentionally harmful to a \computer, network or server.
Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These
malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions
and monitor end users' computer activity.</font>

<BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR>

<center><font color="magenta" size="35"> TYPES OF MALWARES-</font></center>

<br><br><br>

<font color="yellow" size="20">Virus </font>

<p><font color="red" size="15">Is the most common type of malware that can execute itself and
spread by infecting other programs or files.</font> </p>

<br><br>

<font color="yellow" size="20">Worm</font>

<p><font color="red" size="15">It can self-replicate without a host program and typically spreads
without any interaction from the malware authors.</font> </p>

<br><br>

<font color="yellow" size="20">Trojan horse</font>

<p><font color="red" size="15">It is designed to appear as a legitimate software program to gain


access to a system.

Once activated following installation, Trojans can execute their malicious functions.</font> </p>

<br><br>

<font color="yellow" size="20">Spyware</font>

<p><font color="red" size="15">It collects information and data on the device and user, as well as
observes the user's activity without their knowledge.</font> </p>

<br><br>

<font color="yellow" size="20">Ransomware </font>

<p><font color="red" size="15">It infects a user's system and encrypts its data. Cybercriminals then
demand a ransom payment from the victim in exchange for decrypting the system's data.</font>
</p>

<br><br>

<font color="yellow" size="20">Rootkit </font>

<p><font color="red" size="15">It obtains administrator-level access to the victim's system. Once
installed, the program gives threat actors root or privileged access to the system.</font> </p>

<br><br>

<font color="yellow" size="20">Backdoor virus or remote access Trojan (RAT) </font>


<p><font color="red" size="15">It secretly creates a backdoor into an infected computer system
that enables threat actors to remotely access it without alerting the user or the system's security
programs.</font> </p>

<br><br>

<font color="yellow" size="20">Adware </font>

<p><font color="red" size="15">It tracks a user's browser and download history with the intent to
display pop-up or banner advertisements that lure the user into making a purchase. For example, an
advertiser might use cookies to track the webpages a user visits to better target advertising.</font>
</p>

<br><br>

<font color="yellow" size="20">Keyloggers, also called System Monitors</font>

<p><font color="red" size="15">It track nearly everything a user does on their computer. This
includes emails, opened webpages,programs and keystrokes.

<br><br><br><br><br>

<font color="green" size="65"><B> <U> SPAM</B> </U> </font>

<p> <font color="blue" size="15">Spam(stupid pointless annoying malware, for instance) is any kind
of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via
email, but it can also be distributed via text messages, phone calls, or social media.</font> </p>

<br><br>

<center><font color="magenta" size="35"> TYPES OF SPAMS-</font></center>

<br><br>

<font color="yellow" size="20">Phishing E-Mails</font>

<p><font color="red" size="15">Phishing emails are a type of spam cybercriminals send to many
people, hoping to “hook” a few people. Phishing emails trick victims into giving up sensitive
information like website logins or credit card information.

</font> </p>

<font color="yellow" size="20">E-Mail Spoofing</font>

<p><font color="red" size="15">Spoofed emails mimic, or spoof, an email from a legitimate sender,
and ask you to take some sort of action. Well-executed spoofs will contain familiar branding and
content, often from a large well-known company such as PayPal or Apple.</font> </p>

<br><br><br><br><br>

<font color="green" size="65"><B> <U> ANTIVIRUSES</B> </U> </font>

<p> <font color="blue" size="15">Antivirus software is a type of program designed and developed to
protect computers from malware like viruses, computer worms, spyware, botnets, rootkits,
keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your
computer. </font> </p>
<br><br>

<center><font color="magenta" size="35"> SOME ANTIVIRUS SOFTWARES-</font></center>

<br><br>

<font color="red" size="15">Bitdefender Antivirus Plus </font>

<br><br>

<font color="red" size="15">Norton 360 With LifeLock </font>

<br><br>

<font color="red" size="15">Webroot Secure Anywhere for Mac </font>

<br><br>

<font color="red" size="15">McAfee Antivirus Plus </font>

<br><br>

<font color="red" size="15">Trend Micro Antivirus+ Security </font>

<br><br>

<font color="red" size="15">Malwarebytes </font>

<br><br>

</body>

</html>

OUTPUT:
Program 8 : Create a web page discussing plagiarism. List some reported cases of
plagiarism and the consequent punishment meted out. Explain the nature of the
punishment in different countries as per their IP laws.
Code:

<html>

<head>

<title>PLAGIARISM</title>

</head>

<body bgcolor="#808080">

<h1> <font color="green" size="65"><B> <U> PLAGIARISM</B> </U> </font> </h1>

<p><font color="red" size="15">Plagiarism means using someone else’s work without giving them
proper credit. In academic writing, plagiarizing involves using words, ideas, or information from a
source without citing it correctly.

In practice, this can mean a few different things.</p></font>

In practice, this can mean a few different things.

<br><br><br><br><br><br><br><br><br><br>

<center><font color="yellow" size="35"> EXAMPLES OF PLAGIARISM-</font></center>

<br><br><br>

<p><font color="blue" size="15">Copying parts of a text word for word, without quotation
marks</font></p>

<p><font color="blue" size="15">Paraphrasing a text by changing a few words or altering the


sentence structure, without citing the source</font></p>

<p><font color="blue" size="15">Giving incorrect information about a source</font></p>

<p><font color="blue" size="15">Quoting so much from a source that it makes up the majority of
your text</font></p>

<p><font color="blue" size="15">Reusing work you’ve submitted for a previous assignment, without
citing yourself</font></p>

<p><font color="blue" size="15">Submitting a text written entirely by someone else (e.g., a paper
you bought from a ghostwriter)</font></p>

<BR><BR><BR><BR><BR><BR><BR><BR><BR>

<font color="purple" size="20">TYPES OF PLAGIARISM </font>

<br><br><br><br>

<font color="blue" size="20">Global plagiarism </font>


<p><font color="red" size="15">means passing off an entire text by someone else as your own
work.</font></p>

<br><br>

<font color="blue" size="20">Verbatim plagiarism </font>

<p><font color="red" size="15">means directly copying someone else’s words.</font></p>

<br><br>

<font color="blue" size="20">Paraphrasing plagiarism </font>

<p><font color="red" size="15">means rephrasing someone else’s ideas to present them as your
own.</font></p>

<br><br>

<font color="blue" size="20">Patchwork plagiarism </font>

<p><font color="red" size="15">means stitching together parts of different sources to create your
text.

<br><br><br><br><br><br><br><br>

<font color="green" size="45"><B> <U> REPORTED CASES OF PLAGIARISM AND THE CONSEQUENT
PUNISMENT METED OUT</B> </U> </font>

<br><br>

<font color="blue" size="20">Kaavya Viswanathan</font>

<p><font color="red" size="15">In 2006, Kaavya Viswanathan published a young adult book. It was
later discovered that Viswanathan plagiarized heavily from books by Megan McCafferty, among
others.

Viswanathan claims that the plagiarism was unintentional. However, her book was recalled from
stores and taken out of print and Viswanathan lost her contract for a second book.</font> </p>

<br><br>

<font color="blue" size="20">Jonah Lehrer</font>

<p><font color="red" size="15">Jonah Lehrer recently resigned as a writer for the New Yorker after
he was caught self-plagiarizing on a number of occasions and fabricating quotes for a book.</font>
</p>

<br><br>

<font color="blue" size="20">Doris Kearns Goodwin</font>

<p><font color="red" size="15">Doris Kearns Goodwin is a historian who won the Pulitzer Prize in
1995. It was later discovered that Goodwin plagiarized in her 1987 book, The Fitzgeralds and the
Kennedys.

Once her plagiarism was discovered, Goodwin had to leave her position as a guest pundit on the PBS
NewsHour program and resigned from the Pulitzer Board.</font> </p>
<br><br>

</body>

</html>

OUTPUT:
Program 9: HTML code for implementing the external style sheet concept (CSS).
Code:

<html>

<head>

<title> Using CSS font properties </title>

<link rel="stylesheet" type="text/css" href= "S4.css">

</head>

<body>

<h1> Quote of the Day </h1>

<p>

It's never too late to start over. If you weren't happy with yesterday, try something different today.
Don't stay stuck. Do better.

<ul>

<li> Stay positive :) </li>

<li> Stay strong !! </li>

</ul>

</p>

</body>

</html>

Output:
Program 10: HTML code to implement the concept of form.
Code:

<HTML>

<BODY>

<P ALIGN = Center>

<CENTER> <H1> Example Form 2 </H1></CENTER>

</P>

<Form METHOD = POST >

<P>Person's NAME:

<INPUT TYPE="TEXT" NAME="pereson-name" SIZE="40" MAXLENGTH="40">

<INPUT TYPE="hidden" NAME="recipients" SIZE="40" MAXLENGTH="40">

</P

<P>Password:

<INPUT TYPE="password" NAME="password" SIZE="10" MAXLENGTH="10">

</P>

<P> Please Place your mailing list :

<INPUT TYPE="checkbox" NAME="mailing-lists" VALUE="YES" checked

</P>

<P> What Country do you Live in ?

<SELECT NAME = "Country">

<OPTION VALUE = "IND">INDIA

<OPTION VALUE = "USA">UNITED STATES

<OPTION VALUE = "CA"> CANADA

<OPTION VALUE = "FR"> FRANCE

<OPTION VALUE = "SPR">SINGAPORE

</SELECT>

</P>

<P> Type of Computer you have :

<INPUT TYPE="radio" NAME="Comp-Type"VALUE="INTELi3"/> INTEL I3&nbsp;

<INPUT TYPE="radio" NAME="Comp-Type"VALUE="INTELi5"/> INTEL I5&nbsp;


<INPUT TYPE="radio" NAME="Comp-Type"VALUE="INTELi7"/> INTEL I7&nbsp;

<INPUT TYPE="radio" NAME="Comp-Type"VALUE="AMDFX"/> AMD FX

<INPUT TYPE="radio" NAME="Comp-Type"VALUE="AMDATHLON"/> AMD ATHALON

</P>

<P>Comments : <br>

<TEXTAREAS ROWS = "5" COLS = "50" NAME = "comments"> This is text that can be defaulted
into the text areas field </TEXTAREA>

</P>

<P>

<INPUT TYPE="submit" NAME="Request" VALUE="Submit This Form">

<INPUT TYPE="reset" NAME="Clear" VALUE="Clear Form and Start Over">

</P>

</FORM>

</BODY>

</HTML>

Output:
PROJECT
HTML CODE TO CREATE A WEBSITE USING SEVERAL WEBPAGES

Code:
<!-- 1 -->
<!DOCTYPE html>
<html>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="https://www.w3schools.com/w3css/3/w3.css">
<body>

<!-- Content will go here -->

</body>
</html>

<!-- 2 -->
<!-- Navigation -->
<nav class="w3-bar w3-black">
<a href="#home" class="w3-button w3-bar-item">Home</a>
<a href="#band" class="w3-button w3-bar-item">Band</a>
<a href="#tour" class="w3-button w3-bar-item">Tour</a>
<a href="#contact" class="w3-button w3-bar-item">Contact</a>
</nav>

<!-- 3 -->
<!-- Slide Show -->
<section>
<img class="mySlides" src="img_la.jpg" style="width:100%">
<img class="mySlides" src="img_ny.jpg" style="width:100%">
<img class="mySlides" src="img_chicago.jpg" style="width:100%">
</section>
<!-- 4 -->
// Automatic Slideshow - change image every 3 seconds
var myIndex = 0;
carousel();

function carousel() {
var i;
var x = document.getElementsByClassName("mySlides");
for (i = 0; i < x.length; i++) {
x[i].style.display = "none";
}
myIndex++;
if (myIndex > x.length) {myIndex = 1}
x[myIndex-1].style.display = "block";
setTimeout(carousel, 3000);
}

<!-- 5 -->
<section class="w3-container w3-center" style="max-width:600px">
<h2 class="w3-wide">THE BAND</h2>
<p class="w3-opacity"><i>We love music</i></p>
</section>

<!-- 6 -->
<section class="w3-container w3-content w3-center" style="max-
width:600px">
<p class="w3-justify">
We have created a fictional band website. Lorem ipsum dolor sit amet,
consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore
et dolore magna aliqua.</p>
</section>

<!-- 7 -->
<section class="w3-row-padding w3-center w3-light-grey">
<article class="w3-third">
<p>John</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
<article class="w3-third">
<p>Paul</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
<article class="w3-third">
<p>Ringo</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
</section>

<!-- 8 -->
<!-- Footer -->
<footer class="w3-container w3-padding-64 w3-center w3-black w3-
xlarge">
<a href="#"><i class="fa fa-facebook-official"></i></a>
<a href="#"><i class="fa fa-pinterest-p"></i></a>
<a href="#"><i class="fa fa-twitter"></i></a>
<a href="#"><i class="fa fa-flickr"></i></a>
<a href="#"><i class="fa fa-linkedin"></i></a>
<p class="w3-medium">

<!-- 9 -->
Powered by
<a href="https://www.demowebsite.com/w3css/default.asp" target="_blank"
>w3.css</a>
</p>
</footer>

<!-- 10 -->
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/fon
t-awesome/4.6.3/css/font-awesome.min.css">
Output:

You might also like