0% found this document useful (0 votes)
37 views

Coding and Computer Technology CH 5 and ch6

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Coding and Computer Technology CH 5 and ch6

Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Coding and Computer Technology

Class : 7
Ch:5 PHP forms and Ch:6 Include function in PHP
I. Fill in the blanks

1) Forms are generally used to obtain information for further


processes.
2) Forms are generally used to obtain information for further
processes.
3) In PHP, information is generally obtained by using HTML forms.
4) The gathered information by PHP is processed by PHP to make
decisions and create dynamic webpages.
5) To get input from the user, <input> tag is used.
6) HTML forms are created using form tag.
7) Text fields are used when you need to capture the user data in a
form.
8) <input type=”text” is the syntax for obtaining input from the user.
9) The information sent through GET method is visible.
10)The information sent through GET method is visible.
11)The information sent through GET method is visible in the address
bar of browser.
12)The information sent through GET method should contain 1024
characters.
13)Sensitive information should not be sent through GET method.
14)$GET superglobal variable, holds the values sent through GET
method.
15)Information is transferred through HTTP headers in POST method.
16)Information sent through POST method is invisible.
17)Information sent through POST method is invisible.
18)The security of the data depends on the HTTP protocol through
which data is sent in POST method.
19)There is no restriction on the data size in POST method.
20)In POST method, information security can be ensured by sending
data through secure HTTP in POST method.
21)Binary and ASCII data can be sent through POST method.
22)$POST is a superglobal variable that holds the values sent through
POST method.
23)The inputs received will have to be validated, to ensure that the
user has entered relevant values.
24)The errors need to be highlighted along the relevant field.
25)The completed HTML form may contain errors that need to be
validated.
26)For validating form data, all the variables need to be passed
through PHP’s htmlspecialchars() function.
27)PHP’s htmlspecialchars() function replaces the HTML characters
like < and > to the HTML version like &lt; and &gt; .
28)To validate form data, we need to create a function that does all
the checking.
29)Function check_input() checks each $post variable.
30)At the beginning of the script of the form, a check has been
performed to know if the form has been submitted, which is done
using $_SERVER[“REQUEST_METHOD”].
31)To ensure that all the required fields are filled in by the applicant,
the form has to be validated.
32) If the applicant has not filled the mandatory fields, an error
message will be displayed.
33) A computer network is a system for communication among
computers.
34) A computer network allows all the user in the network to
communicate , share and access common resources.
35) We can set passwords to control the access to confidential data
in your machine.
36)Destruction can be defined as attempts to destroy the system
data/information in order to disable the operations of a network.
37) You should seek the permission of a user, if he/she has set a
password to his/her computer.
38) in PHP, the occur repeatedly in a file can be inserted using include
or require function.
39)The validation of form is ensured by form required.
40)The include/require function imbibes all the code, text and
markup elements present in the specified file and embeds them
into the file which use include function.
41) Syntax of Include function is Include ”filename” .
42)The function include () will include the text from the specified file
and embed it into the file that uses include function.
43)In include function coding, the system will generate a warning
E_WARNING, if the file is not found.
44) The syntax of require function is require “filename”
45)The function require will stop the execution of the remaining file,
if the require function encounters an error.
46)The system will generate a fatal error E_COMPILE_ERROR if the
file can’t be found , in require function.
47)A pointing device is an input interface that allows a user to input
data into a computer.
48)CAD and GUI allow the user to control and provide data. The data
is provided by pointing, clicking and dragging.
49)Movements of the pointing device are reflected in the screen by
the movement of pointer.
50)The most common pointing device is mouse.
51) A mouse is a small hand-held device moved over a horizontal
surface.
52)A mouse moves a graphical pointer smoothly in a screen.
53)A mouse is moved over a horizontal surface.
54)The rotating ball transmits signal from mouse to computer.
55)The computer moves the graphical pointer on the screen
according to the mouse movements.
56)The optical mouse is similar to the conventional mouse, but uses
visible or infra-red light of a roller ball to detect the changes in
position.
57)Mouse does selecting and moving files.

II. Abbreviations

1) HTML - Hyper Text Markup Language


2) PHP – Hypertext preprocessor
3) ASCII – American Standard Code for Information Interchange
4) HTTP – Hyper Text Transfer Protocol
5) POST – Power On Self-Test
6) CAD – Computer Aided Design
7) GUI – Graphical User Interface

III. Write the syntax of form.

<form>
<input>
</input>
</form>’``

You might also like