subject

Part 3; using php to generate forms: to your order form from part 2, add input elements for customer name and address if they're not already there. the "state" part of the address must be a select element(also called a "pulldown menu") to allow the person placing the order to choose his or her state. don't type all fifty states, but supply at least georgia, alabama and florida. put the names of the states in an php array and use php code to create the drop-down dynamically. (this will still be named l6p2.php; you're just adding to something you've already tested.) you will find an example of creating a select element for states in the class slides covering html forms. you are going to create the drop-down dynamically, and not by hard-coding it. this part of the assignment is a fair example of something you might do with php in "real life." instead of an array, you would use a database call, so if we suddenly add another state to the u. s. (or your company suddenly adds another state to its service area) a change to the database automatically (and immediately) changes what people see in the form. for this assignment, you're loading states from an array. we'll get them from a database in the next assignment. you do not need a special link on your index page for part 3; i will test part 3 at the same time i test part 2.

ansver
Answers: 3

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:20, Masielovebug
In what kind of attack can attackers make use of millions of computers under their control in an attack against a single server or network availability confidentiality integrity identity automated attack software? those who wrongfully disclose individually identifiable health information can be fined up to what amount per calendar year? single most expensive malicious attack hipaa what are script kiddies? advanced persistent threat security manager security engineer what level of security access should a computer user have to do their job what process describes using technology as a basis for controlling the access and usage of sensitive data? cybercriminal
Answers: 1
image
Computers and Technology, 22.06.2019 18:30, yeeet26
If an improvement creates no significant change in a product’s performance, then it is a(n) ? a0 design improvement. (there are no answer choices)
Answers: 1
image
Computers and Technology, 23.06.2019 11:00, shawn20034
This chapter lists many ways in which becoming computer literate is beneficial. think about what your life will be like once you’re started in your career. what areas of computing will be most important for you to understand? how would an understanding of computer hardware and software you in working from home, working with groups in other countries and contributing your talents.
Answers: 1
image
Computers and Technology, 23.06.2019 13:30, alannaamarriee
Jace needs to answer a question on square roots to win a quiz. how can he use a spreadsheet to find the square root of 786? a. use the functions round and count b. create a table and chart c. use the function sqrt d. use the function now
Answers: 3
You know the right answer?
Part 3; using php to generate forms: to your order form from part 2, add input elements for custom...

Questions in other subjects:

Konu
Engineering, 03.09.2019 05:30