The solution to jquery ajax submission of garbled codes: 1. Unify the encoding settings; 2. Use the post method to pass parameters; 3. Escape encoding in the js front end and then decode in the background to obtain the data; 4. Globally Set the contentType and specify the encoding.

The operating environment of this tutorial: windows7 system, jquery1.10.0 version, Dell G3 computer.
Recommended: jquery tutorial
jquery What should I do if ajax submits garbled data?
When I use jquery to process html5 applications, the test under firefox is normal. When the user accesses it with a pad, it says that there are garbled characters. I tested it myself and sure enough, and then found that under the chrome and ie kernel Everyone has this problem. When the page attribute is set to utf-8, only Firefox transmits the charset=utf-8 header file. Chrome and IE do not specify it, so garbled characters appear.
Solution:
The code is as follows:
$.ajaxSetup({
contentType: "application/x-www-form-urlencoded; charset=utf-8"
});
$.post("test.php", { name: "i5a6", time: "2pm" },
function(data){
process(data);
}, "json");Or use:
The code is as follows:
$.ajax({
url:url,
type:"POST",
data:data,
contentType:"application/x-www-form-urlencoded; charset=utf-8",
dataType:"json",
success: function(){
...
}
})It is recommended to use the first one, However, it is based on your actual situation. Some people recommend using encodeURIComponent for character conversion.
Summarize some experience of garbled data submitted by ajax.
In order to avoid garbled characters, you can do the following steps
Solution
1. Keep the encoding unified, including file encoding, database encoding, and web page content-type encoding
Check
It is recommended to use UTF-8 for Chinese. Using gbk/gb2312 may cause garbled characters
2, use post to send instead of get
The get method will pass parameters through the link, and will automatically urlEncode (encode), and the encoding method of each browser may be different. Using post can avoid this situation.
3, by escaping the front-end encoding in js and then sending it, and then decoding it in the background to obtain the data
These can be searched online
4, set the contentType globally and specify the encoding
Because jquery ajax uses utf-8 to encode and send data, IE does not add charset=utf-8 when sending, resulting in garbled characters (IE uses iso-8859-1 encoding by default)
The code is as follows:
$.ajaxSetup({
contentType: "application/x-www-form-urlencoded; charset=utf-8"
});For more programming-related knowledge, please visit: Programming Teaching! !
The above is the detailed content of What to do if jquery ajax submits garbled code. For more information, please follow other related articles on the PHP Chinese website!
JavaScript Object Models: Deep Copying, Shallow Copying, and Considerations for Java SerializationJul 23, 2025 am 04:07 AMShallow copy only copies the top-level properties of the object, nested reference types share the same memory address, and modifying the copy will affect the original object; deep copy recursively copies all levels to ensure complete independence. For example, using Object.assign or extension operators is a shallow copy, modifying nested objects will reflect the original object; while JSON.parse(JSON.stringify(obj)) or Lodash's _.cloneDeep() can achieve deep copy to avoid mutual influence. In addition, deep copying requires attention to special types of processing such as functions, circular references, and Date. When communicating across languages, the impact of Java serialization on data structures must also be considered.
How to select an HTML element by class or tag name in JS?Jul 23, 2025 am 04:01 AMSelecting HTML elements in JavaScript can be achieved in three ways: 1. Use getElementsByClassName to select by class name, return dynamic HTMLCollection, you need to write the class name, such as 'box', and access the first element through boxes[0]; 2. Use getElementsByTagName to select by tag name, and also return dynamic HTMLCollection, suitable for batch operations such as modifying all li styles; 3. Use querySelectorAll to select by CSS selector, support more complex selection logic, return static NodeList, if only the first match is required, you can use querySe
Working with Dates in JavaScript: A Complete GuideJul 23, 2025 am 03:59 AMJavaScript's date processing requires attention to creating, getting set values, formatting and time zone issues. 1. Create a Date object by using no parameters, timestamps, date strings or components; note that the month starts at 0 and the browser parses the strings may be inconsistent. 2. Use getDate, setDate and other methods to get/set the value, and use getTime() to compare the date. 3. Intl.DateTimeFormat can be used to ensure consistency, and third-party libraries can also be used. 4. UTC method should be used to deal with time zones to avoid confusion. The sending server recommends using UTC and converting it to the backend.
JavaScript Performance Optimization: Debouncing and ThrottlingJul 23, 2025 am 03:57 AMDebouncingdelaysfunctionexecutionuntilafterapauseinactivity,idealforsearchinputsandformvalidation;2.Throttlinglimitsexecutiontoonceperfixedinterval,perfectforscrollandmousemoveevents;bothreduceperformanceloadwhilepreservingUX.
Leveraging JavaScript Proxies and Reflect API for Advanced Metaprogramming with Java InteropJul 23, 2025 am 03:55 AMJavaScriptProxies and ReflectAPI can be used to enhance the interoperability of Java and JavaScript in Nashorn or GraalVM environments. 1. Use Proxy to intercept access to Java objects, such as recording attribute access logs or dynamically modifying the return value, and implementing it through get traps and Reflect.get; 2. You can proxie the Java class itself and control constructor calls through construct traps; 3. Use apply traps to automatically convert parameter types before calling Java methods to improve compatibility between JS and Java; 4. Reflect provides more consistent operation methods, such as Reflect.has
Implementing JavaScript Security Headers in Node.jsJul 23, 2025 am 03:48 AMThe method of setting up JavaScript security headers in Node.js applications is to use Helmet middleware to implement it through the backend. 1. Install and introduce the Helmet package and add it to the Express middleware chain to enable the default security headers; 2. Common security headers include CSP to prevent XSS attacks, X-Content-Type-Options to avoid MIME type guessing, X-Frame-Options to prevent click hijacking, HSTS to force HTTPS access, etc.; 3. CSP policies can be customized to meet external resource loading needs, but 'unsafe-inline' should be avoided, and Nonce or Hash is recommended instead; 4. Enable
Advanced JavaScript Readable and Writable StreamsJul 23, 2025 am 03:47 AMReadable and writable streams in JavaScript achieve efficient data transmission through chunking processing. 1. ReadableStream is used to read data in asynchronously in blocks, suitable for large file reading, HTTP response and other scenarios; 2. WritableStream receives data and processes it, such as writing to files or recording logs; 3. Use the .pipe() method to automatically process back pressure, connecting readable and writable streams; 4. Transform stream can be converted during data flow; 5. In actual use, pay attention to error processing, back pressure control and correct ending of streams. Mastering these key points will help improve big data processing capabilities and performance.
How does hoisting work in JavaScript?Jul 23, 2025 am 03:45 AMVariable and function enhancement is the mechanism by which the JavaScript engine collects declarations into memory during the compilation phase, and does not really move the code. When a variable is declared using var, it will be promoted to the top of the scope, but the assignment remains in place; let and const will also be promoted, but will not be initialized, and it will enter a "temporary dead zone", and an error will be reported when access is reported. Function declarations will be fully promoted, including the function body, so they can be called before declaration; while the function expression only has the variable name promoted, and the function body is still in place. In actual development, suggestions are: 1. Declare variables at the top of the scope; 2. Priority is given to let and const; 3. Avoid calling function expressions or arrow functions before the function; 4. Do not repetitively declare functions and variables with the same name. Understanding the lifting mechanism helps


Hot AI Tools

Undress AI Tool
Undress images for free

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Notepad++7.3.1
Easy-to-use and free code editor

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.







