SlideShare a Scribd company logo
4
Most read
5
Most read
6
Most read
Get and post methods
Titleof the presentation
AnjaliG
anjalig2009@gmail.com
www.facebook.com/AnjaliGeetha
twitter.com/username
in.linkedin.com/in/AnjaliG
9497879952
METHODS GET AND POST
INTRODUCTION
 Get and Post are HTTP request methods to transfer data from client to server.
 HTTP works as a request-response protocol between a client and server.
 Get - Requests data from a specified resource
 Post - Submits data to be processed to a specified resource
 Both GET and POST can be used to send request and receive response
GET METHOD
 GET requests can be cached
 The GET method means retrieve whatever information (in the form of an entity) is
identified by the Request-URI.
GET requests remain in the browser history
GET can't be used to send binary data, like images or word documents, to the server.
GET requests can be bookmarked
GET requests should never be used when dealing with sensitive data
GET requests have length restrictions
GET requests should be used only to retrieve data
 Eg: http://www.example.com/servlet?foo=bar
POST METHOD
 POST requests are never cached
POST requests do not remain in the browser history
POST requests cannot be bookmarked
 POST requests have no restrictions on data length
The POST method can be used to send ASCII as well as binary data.
The data sent by POST method goes through HTTP header so security depends on HTTP
protocol. By using Secure HTTP you can make sure that your information is secure.
COMPARE GET VS POST
GET POST
BACK button/Reload Harmless Data will be re-submitted
(the browser should alert
the user that the data
are about to be re-
submitted)
Bookmarked Can be bookmarked Cannot be bookmarked
Cached Can be cached Not cached
History Parameters remain in
browser history
Parameters are not saved
in browser history
GET POST
Restrictions on data
length
Yes, when sending data,
the GET method adds the
data to the URL; and the
length of a URL is limited
(maximum URL length is
2048 characters)
No restrictions
Restrictions on data type Only ASCII characters
allowed
No restrictions. Binary
data is also allowed
Security GET is less secure
compared to POST
because data sent is part
of the URL
Never use GET when
sending passwords or
other sensitive
information!
POST is a little safer than
GET because the
parameters are not
stored in browser history
or in web server logs
Visibility Data is visible to
everyone in the URL
Data is not displayed in
the URL
CONTINUE. . .
ADVANTAGES OF GET
 Save the results of a form submission.
For example, you can submit data and
bookmark the resultant URL, send it to a colleague by email, or put it in a normal hypertext
link. The ability to bookmark the results page is the main reason google.com, yahoo.com, and
other search engines use GET.
 Type data in by hand.
You can test Servlets or JSP pages that use GET simply by entering a URL with the appropriate
data attached.
ADVANTAGES OF POST
 Transmit large amounts of data. Many browsers limit URLs to a few thousand
characters, making GET inappropriate when your form must send a large amount of data.
Since HTML forms let you upload files from the client machine, sending multiple megabytes
of data is quite commonplace. Only POST can be used for this task.
 Send binary data. Spaces, carriage returns, tabs, and many other characters are illegal in
URLs. If you upload a large binary file, it would be a time-consuming process to encode all
the characters before transmission and decode them on the other end.
 Keep the data private from someone looking over the user’s shoulder..
THANK YOU
If this presentation helped you, please visit our
page facebook.com/baabtra and like it.
Thanks in advance.
www.baabtra.com | www.massbaab.com |www.baabte.com
Contact Us
Emarald Mall (Big Bazar Building)
Mavoor Road, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
NC Complex, Near Bus Stand
Mukkam, Kozhikode,
Kerala, India.
Ph: + 91 – 495 40 25 550
Start up Village
Eranakulam,
Kerala, India.
Email: info@baabtra.com

More Related Content

PPTX
Web publishing
PPT
Introduction to Python
PPT
Mobile Computing
PPT
Network Layer,Computer Networks
PDF
IoT Communication Protocols
PPTX
Data types in C
PDF
Methods in Java
Web publishing
Introduction to Python
Mobile Computing
Network Layer,Computer Networks
IoT Communication Protocols
Data types in C
Methods in Java

What's hot (20)

PPTX
HTTP request and response
PPTX
Html form tag
PPT
PPTX
Html forms
PPT
Cookies and sessions
PPTX
virtual hosting and configuration
PPT
Scripting languages
PPSX
Javascript variables and datatypes
PPTX
PPT
Introduction to Web Programming - first course
PPSX
ADO.NET
PDF
jQuery for beginners
PPTX
Introduction to ajax
PPT
Unit 3 (frames)
PPTX
Introduction to php
PDF
Intro to html 5
PPT
Introduction to JavaScript
PPTX
ODP
Introduction of Html/css/js
PPT
Introduction to XML
HTTP request and response
Html form tag
Html forms
Cookies and sessions
virtual hosting and configuration
Scripting languages
Javascript variables and datatypes
Introduction to Web Programming - first course
ADO.NET
jQuery for beginners
Introduction to ajax
Unit 3 (frames)
Introduction to php
Intro to html 5
Introduction to JavaScript
Introduction of Html/css/js
Introduction to XML
Ad

Viewers also liked (20)

PPT
Get_vs_Post
PPTX
The post method era
PPTX
Introduction to HTTP protocol
PPT
Java servlet life cycle - methods ppt
PPTX
HyperText Transfer Protocol (HTTP)
PPTX
Aula02 Desenvolvimento em Ambiente Web - CSS 3
PPT
Php forms
PPTX
01 session tracking
PDF
Servlet Filter
PPTX
PHP & JavaScript & CSS Coding style
PPTX
Http Vs Https .
PDF
Java servlets
PPT
Hacking And Its Prevention
PPTX
Post method pedagogy
PDF
Lecture 3: Servlets - Session Management
PPT
Java Servlets
PPT
HTTP Basics
PPT
Java Servlets
PPTX
Ethical hacking presentation
PPTX
Computer security threats & prevention
Get_vs_Post
The post method era
Introduction to HTTP protocol
Java servlet life cycle - methods ppt
HyperText Transfer Protocol (HTTP)
Aula02 Desenvolvimento em Ambiente Web - CSS 3
Php forms
01 session tracking
Servlet Filter
PHP & JavaScript & CSS Coding style
Http Vs Https .
Java servlets
Hacking And Its Prevention
Post method pedagogy
Lecture 3: Servlets - Session Management
Java Servlets
HTTP Basics
Java Servlets
Ethical hacking presentation
Computer security threats & prevention
Ad

Similar to Get and post methods (20)

PDF
Making web forms using php
PDF
GET and POST in PHP
PPTX
Time to Migrate to HTTPS – The Simple Way to Do It Right, And the Ways That t...
PPTX
Session and cookies ,get and post methods
PDF
PHP Making Web Forms
PPT
The constrained application protocol (coap) part 2
PPT
The constrained application protocol (co ap) part 2
PPT
The constrained application protocol (coap) part 2
PDF
Form handling in php
PPTX
5. Formshcfsjhfajkjsfjsjfjksafjsfjkjfhjsafjsajkgfjskafkjas.pptx
PDF
Asp.Net difference faqs- 4
PPTX
WWW and HTTP
PPTX
CHAPTER_4_DJANGO_FORMS[1] [Read-Only].pptx
PPTX
Form Handling using PHP
PPT
Session12 J2ME Generic Connection Framework
DOCX
Study of http
PPTX
www and http services
PPTX
RESTful design
PDF
HTTP Basics Demo
PPT
Under the Covers with the Web
Making web forms using php
GET and POST in PHP
Time to Migrate to HTTPS – The Simple Way to Do It Right, And the Ways That t...
Session and cookies ,get and post methods
PHP Making Web Forms
The constrained application protocol (coap) part 2
The constrained application protocol (co ap) part 2
The constrained application protocol (coap) part 2
Form handling in php
5. Formshcfsjhfajkjsfjsjfjksafjsfjkjfhjsafjsajkgfjskafkjas.pptx
Asp.Net difference faqs- 4
WWW and HTTP
CHAPTER_4_DJANGO_FORMS[1] [Read-Only].pptx
Form Handling using PHP
Session12 J2ME Generic Connection Framework
Study of http
www and http services
RESTful design
HTTP Basics Demo
Under the Covers with the Web

More from baabtra.com - No. 1 supplier of quality freshers (20)

PPTX
Agile methodology and scrum development
PDF
Acquiring new skills what you should know
PDF
Baabtra.com programming at school
PDF
99LMS for Enterprises - LMS that you will love
PPTX
Chapter 6 database normalisation
PPTX
Chapter 5 transactions and dcl statements
PPTX
Chapter 4 functions, views, indexing
PPTX
PPTX
Chapter 2 grouping,scalar and aggergate functions,joins inner join,outer join
PPTX
Chapter 1 introduction to sql server
PPTX
Chapter 1 introduction to sql server
Agile methodology and scrum development
Acquiring new skills what you should know
Baabtra.com programming at school
99LMS for Enterprises - LMS that you will love
Chapter 6 database normalisation
Chapter 5 transactions and dcl statements
Chapter 4 functions, views, indexing
Chapter 2 grouping,scalar and aggergate functions,joins inner join,outer join
Chapter 1 introduction to sql server
Chapter 1 introduction to sql server

Recently uploaded (20)

PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Machine learning based COVID-19 study performance prediction
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Empathic Computing: Creating Shared Understanding
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
The Rise and Fall of 3GPP – Time for a Sabbatical?
Review of recent advances in non-invasive hemoglobin estimation
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
Mobile App Security Testing_ A Comprehensive Guide.pdf
Encapsulation theory and applications.pdf
Electronic commerce courselecture one. Pdf
Building Integrated photovoltaic BIPV_UPV.pdf
The AUB Centre for AI in Media Proposal.docx
Advanced methodologies resolving dimensionality complications for autism neur...
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Empathic Computing: Creating Shared Understanding
20250228 LYD VKU AI Blended-Learning.pptx

Get and post methods

  • 4. INTRODUCTION  Get and Post are HTTP request methods to transfer data from client to server.  HTTP works as a request-response protocol between a client and server.  Get - Requests data from a specified resource  Post - Submits data to be processed to a specified resource  Both GET and POST can be used to send request and receive response
  • 5. GET METHOD  GET requests can be cached  The GET method means retrieve whatever information (in the form of an entity) is identified by the Request-URI. GET requests remain in the browser history GET can't be used to send binary data, like images or word documents, to the server. GET requests can be bookmarked GET requests should never be used when dealing with sensitive data GET requests have length restrictions GET requests should be used only to retrieve data  Eg: http://www.example.com/servlet?foo=bar
  • 6. POST METHOD  POST requests are never cached POST requests do not remain in the browser history POST requests cannot be bookmarked  POST requests have no restrictions on data length The POST method can be used to send ASCII as well as binary data. The data sent by POST method goes through HTTP header so security depends on HTTP protocol. By using Secure HTTP you can make sure that your information is secure.
  • 7. COMPARE GET VS POST GET POST BACK button/Reload Harmless Data will be re-submitted (the browser should alert the user that the data are about to be re- submitted) Bookmarked Can be bookmarked Cannot be bookmarked Cached Can be cached Not cached History Parameters remain in browser history Parameters are not saved in browser history
  • 8. GET POST Restrictions on data length Yes, when sending data, the GET method adds the data to the URL; and the length of a URL is limited (maximum URL length is 2048 characters) No restrictions Restrictions on data type Only ASCII characters allowed No restrictions. Binary data is also allowed Security GET is less secure compared to POST because data sent is part of the URL Never use GET when sending passwords or other sensitive information! POST is a little safer than GET because the parameters are not stored in browser history or in web server logs Visibility Data is visible to everyone in the URL Data is not displayed in the URL CONTINUE. . .
  • 9. ADVANTAGES OF GET  Save the results of a form submission. For example, you can submit data and bookmark the resultant URL, send it to a colleague by email, or put it in a normal hypertext link. The ability to bookmark the results page is the main reason google.com, yahoo.com, and other search engines use GET.  Type data in by hand. You can test Servlets or JSP pages that use GET simply by entering a URL with the appropriate data attached.
  • 10. ADVANTAGES OF POST  Transmit large amounts of data. Many browsers limit URLs to a few thousand characters, making GET inappropriate when your form must send a large amount of data. Since HTML forms let you upload files from the client machine, sending multiple megabytes of data is quite commonplace. Only POST can be used for this task.  Send binary data. Spaces, carriage returns, tabs, and many other characters are illegal in URLs. If you upload a large binary file, it would be a time-consuming process to encode all the characters before transmission and decode them on the other end.  Keep the data private from someone looking over the user’s shoulder..
  • 12. If this presentation helped you, please visit our page facebook.com/baabtra and like it. Thanks in advance. www.baabtra.com | www.massbaab.com |www.baabte.com
  • 13. Contact Us Emarald Mall (Big Bazar Building) Mavoor Road, Kozhikode, Kerala, India. Ph: + 91 – 495 40 25 550 NC Complex, Near Bus Stand Mukkam, Kozhikode, Kerala, India. Ph: + 91 – 495 40 25 550 Start up Village Eranakulam, Kerala, India. Email: info@baabtra.com

Editor's Notes

  • #6: Uri-identifies the resource upon which to apply the request.