answersLogoWhite

0

The two methods for submitting data to a server GET and POST

When ever you open a web page you are using the GET method.

POST is primarily used with forms where you input information, though not always.

A search engine generally uses the GET method, even though you are entering information into a form. When the GET method is used, the form fields are added onto the URL. In a POST the fields are submitted 'Behind the Scenes' and not visible to the user.

User Avatar

Wiki User

15y ago

What else can I help you with?

Related Questions

What two terms describe the data requester and data provider in LAN?

Client and server


What are the methods of presenting data?

two methods of presenting data 1.tabular form 2.pictorial form


What two term describe data requester and data provider in a lan?

What two terms describe the "data requester" and "data provider" in a LAN? A data requester is a client and the data provider is a server.


What two terms describe the data requester and the data provider in the LAN?

What two terms describe the "data requester" and "data provider" in a LAN? A data requester is a client and the data provider is a server.


What two term describe the data requester and data provider in a LAN?

What two terms describe the "data requester" and "data provider" in a LAN? A data requester is a client and the data provider is a server.


What two terms describes the data requester and data provider in a LAN?

What two terms describe the "data requester" and "data provider" in a LAN? A data requester is a client and the data provider is a server.


The data requester and data provider in a LAN?

What two terms describe the "data requester" and "data provider" in a LAN? A data requester is a client and the data provider is a server.


What are the two main method of primary data collection processes?

What are the two main methods of primary data collection processes


What are the two SQL server authentication methods?

I think one is database server authentication, the other is operating system level authentication (could be at the network level).


Are classes of attack that overload a server's code and spill some pre-determined code into memory?

No these are two different methods. Overloading a server using SYNC packets which initiate a connection then ignoring the connection request is a DOS or denial of service attack. Entering data into a server via a program or webpage which has poor validation or coding which allows code to be inserted on the server by exceeding the pointer limit is a buffer overflow exploit.


Why does TCP server program have two sockets?

1)Socket 2)Server Socket Server socket is used for normal two-way socket communication. Socket class allows us to read and write through the sockets. getInputStream() and getOutputStream() are the two methods available in socket class.


Which two statements describe the FTP protocol?

The FTP client initiates the transfer of data when using a passive data connection. It requires two connections between client and server.