• asp:Wizard 应用


     <asp:Wizard ID="Wizard1" runat="server" HeaderText="Sample Wizard" >

                <WizardSteps>

                    <asp:WizardStep runat="server" Title="第一步" StepType="Start">

                        <asp:Label ID="Label1" runat="server" Text="用户名:"></asp:Label>

                        <asp:TextBox ID="tbName" runat="server"></asp:TextBox>

                        <asp:RequiredFieldValidator ID="RequiredFieldValidator1" runat="server" ControlToValidate="tbName"

                            ErrorMessage="不能为空!"></asp:RequiredFieldValidator>

                        <br />

                        <asp:Label ID="Label2" runat="server" Text="密码:"></asp:Label>

                        <asp:TextBox ID="tbPwd" runat="server"></asp:TextBox>

                    </asp:WizardStep>

                    <asp:WizardStep runat="server" Title="第二步">

                        <asp:Label ID="Label3" runat="server" Text="Email"></asp:Label>

                        <asp:TextBox ID="tbEmail" runat="server"></asp:TextBox><br />

                        <asp:Label ID="Label4" runat="server" Text="Telephone"></asp:Label>

                        <asp:TextBox ID="tbPhone" runat="server"></asp:TextBox>

                    </asp:WizardStep>

                </WizardSteps>

            </asp:Wizard>

    <asp:wizard>包含<wizardSteps>,<wizardsteps>中只能有<asp:wizardStep>;其中的<asp:wizardstep>可有多个,也就是某个流程的步骤。

  • 相关阅读:
    机器学习笔记
    使用pelican创建静态博客
    farbox editor是个好东西
    MamBa项目的插件编写-TikiTorch生成器
    通过rundll32运行C#DLL转储内存
    通过调用Windows本地RPC服务器bypass UAC
    浅谈python反序列化漏洞
    [转载]SQL Server提权系列
    certutil在传输payload中的新奇技巧
    AVIator -- Bypass AV tool
  • 原文地址:https://www.cnblogs.com/wenming205/p/1271134.html
Copyright © 2020-2023  润新知