Create a web page using a four-column table

Assignment Help Computer Engineering
Reference no: EM132188699

Workshop Six - 6.8 Dropbox

Four-Column Table

Introduction and Alignment

Tables are important for organizing tabular data in a web page.

Upon completion of this assignment you should be able to:

Create and format tables in web pages.

Resources

Textbook: Web Development and Design Foundations with HTML5

Background Information

Attributes in the table elements allow for styling without the need for CSS. Table headers appear in bold by default, thus emphasizing the text in these cells. Table columns separate the information and make it easier to read. Table and cell alignment can be achieved without the need to create a style sheet.

Instructions

Complete #8 of the ‘Hands-On Exercises' on p. 390 of Chapter 8. Refer to section 8.21 in the textbook for help with tables.

Create a web page using a four-column table about your favorite music CD.

The column headings (<th>) should be as follows:

Group: Place the name of the group and the names of its principal members in this column.

Tracks: List the title of each music track or song.

Year: List the year that the CD was recorded.

Links: Place at least two absolute links to sites about the group in this column.

Include an e-mail link to yourself on the web page.

Make sure that your table is configured accessible, see section 8.4 on configuring an accessible table.

Save the page as band8.html

When you have completed your assignment, save a copy for yourself and submit a copy to your instructor using the Dropbox by the end of the workshop.

Reference no: EM132188699

Questions Cloud

Why would an administrator choose to use multiple : Why would an administrator choose to use multiple Registration Authorities when processing certificate requests?
Explain what mutual exclusion means in this scenario : You are working as a software engineer and you developed a multi-threaded program that uses a single global array of integers.
The functionality offered by the rsa and diffie-hellman : Explain what the following are: root certificates, self-signed certificates. Describe how they are used.
Configure and stylize hyperlinks in web pages : This is the second phase of the website project. For this phase you will add a 4th page to your site, and this page must contain a table.
Create a web page using a four-column table : Attributes in the table elements allow for styling without the need for CSS. Table headers appear in bold by default, thus emphasizing the text in these cells.
Draw the gantt charts for these processes under the two : Can you also calculate these three metrics at the completion of all processes: average waiting time, average latency, and the system throughput?
Draw a picture of the linkedlist after the insertion of one : Draw a picture of an initially empty LinkedList, including the two sentinels. Draw a picture of the LinkedList after the insertion of one value.
Create a web page that has a form : Survey forms are a way for visitors to interact with a site. There are many types of input elements that can be used to collect the data from the user.
What is the worst-case asymptotic running time : What is the worst-case asymptotic running time of the method mthd, assuming that the parameter n is a positive integer?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Would you expect this technique to be faster

You cannot afford to use one million pigeon-holes, so you decide instead to use one thousand pigeon-holes numbered from 0 to 999.

  Continuenbspworking on your proposaldevelopnbspthe flow

continuenbspworking on your proposal.developnbspthe flow diagram of the information and any control elements needed to

  Describe how do the teams manage their team boundaries

Describe How do the teams manage their team boundaries? What are the trade-offs between internal cohesion and external ties within each type of team?

  Create a ring class along with functions for inserting data

Create a templated ring class along with functions for inserting and deleting data, and a function that displays the contents of the ring.

  Suggest how alice can prevent related message attack on rsa

Suggest how Alice can prevent a related message attack on RSA. Using the Rabin cryptosystem with p = 47 and q = 11: Encrypt P 2. 17 to find the ciphertext.

  How many times must a problem instance be solved

How many times must a problem instance of size 500 be solved using Alg2 in order to justify its development cost?

  Which protocol are used in wlan

Which Protocol are used in WLAN (Wireless local area network). and describe functionality of these protocol in wireless local area network.

  Task - implement a few basic networks

CS 3600 Assignment: Probability. Your task is to implement a few basic networks as well as several sampling algorithms. You will do this in probability notebook.ipynb, and there are tests along the way to help. Unlike previous assignments

  Write the methods to implement queues

Write the methods to implement queues by the simple but slow technique of keeping the front of the queue always in the first position of a linear array.

  Write a review on emerging application of technology

Write a review on Emerging Application of Technology in a Critical Infrastructure. This paper is the second of two Technology Reviews that you will research and write for this course.

  How an interrupt handler would address the event

Set the context for the interrupt disk read and describe how an interrupt handler would address the event.

  Explain how cache coherence can be maintained in the ksr-one

Describe the ALLCACHE architecture implemented in the Kendall Square Research KSR-1. Explain how cache coherence can be maintained in the KSR-1.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd