Explain cell spacing and cell padding, Computer Engineering

Assignment Help:

Q. Explain Cell Spacing and Cell Padding?

Couple of attributes known as CELLSPACING and CELLPADDING. Both are part of <TABLE>tag. CELLPADDING is the amount of space between border of cell and the contents of the cell. Default value for this attribute is 1. This is so that any text in cells doesn't appear to be sticking to the border. Though, you can specify a value of 0 if you wish. CELLSPACING attribute has a somewhat different meaning. It determines spacing between adjacent cells. Its default value is 2. The below illustration displays these and some other significant attributes of <TABLE> tag.

<HTML>

<HEAD>

<TITLE> EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY>

First: Table with cellspacing and cellpadding

<TABLE BORDER=3 CELLSPACING=7 CELLPADDING=7>

<TR>

<TD>Bella</TD>

<TD>Tom</TD>

<TD>Lee</TD>

</TR>

<TR>

<TD>Adom</TD>

<TD>Herry</TD>

<TD>ketty</TD>

</TR>

</TABLE>

Second: Table with colspan

<TABLE BORDER=1>

<TR>

<TD COLSPAN=2>Bella</TD>

<TD>Tom</TD>

</TR>

<TR>

<TD>Herry</TD>

<TD>Adom</TD>

<TD>Lee</TD>  </TR> 

</TABLE>

Third: Table with rowspan

<TABLE BORDER=1>

<TR>

<TD ROWSPAN=2>Bella</TD>

<TD>Tom</TD>

<TD>Lee</TD>

</TR>

<TR>

<TD>Adom</TD>

<TD>Ricky</TD>

</TR>

</TABLE>

Fourth: Table with rowspan and colspan

<TABLE BORDER=1>

<TR>

<TD ROWSPAN=2>Bella</TD>

<TD COLSPAN=2>Tom</TD>

</TR>

<TR>

<TD>Adom</TD>

<TD>Lee</TD>

</TR>

</TABLE>

Fifth: Table with strong tag and a link in cell's data

<TABLE BORDER=1>

<TR>

<TD COLSPAN=3

ALIGN=CENTER><STRONG><AHREF="https://EXPERTSMIND.COM.org/">Bella</STRO

NG>

</TD>

</TR>

<TR>

<TD>Tom</TD>

<TD>Herry</TD>

<TD>Adom</TD>

</TR>

</TABLE>

</BODY>

</HTML>

2326_Explain cell spacing and cell padding.png

Figure Some Important Attributes of the Table Tag Family


Related Discussions:- Explain cell spacing and cell padding

Explain the feasibility study, Explain the Feasibility Study This inclu...

Explain the Feasibility Study This includes writing a report to convince management of the merits of adopting proposed new system. Some features of the study comprise: T

JAVA, HOW WAS JAVA INVENTED?

HOW WAS JAVA INVENTED?

Explain what are the different hazards, There are situations, called hazard...

There are situations, called hazards that stop the next instruction in the instruction stream from implementing during its designated clock cycle. Hazards decrease the performance

Explain working of dotmatrix or inkjet printers, Q. Explain working of DotM...

Q. Explain working of DotMatrix or InkJet Printers? Three major issues consider the quality of characters generated by DotMatrix/InkJet Printers: - Number of dots in the matrix

Differences between internal and external fragmentation, Explain the differ...

Explain the differences between Internal and external fragmentation. Internal and external fragmentation (1) While memory allocated to a process is a little larger than th

What are the various functional verification methodologies, What are the va...

What are the various functional verification methodologies Ans: TLM (Transaction Level Modelling) Linting RTL Simulation (Environment  involving  :  stimulus  generators,

protects against transcription, The last digit of a credit card number is ...

The last digit of a credit card number is the check digit, which protects against transcription errors like an error in a single digit or switching two digits. The following method

Computer network architecture, A protocol is a formal description of messag...

A protocol is a formal description of message formats and the rules two or more machines must follow to exchange those messages. Because TCP (transmission control protocol) and IP

Learning weights in perceptrons, Learning Weights in Perceptrons: Furt...

Learning Weights in Perceptrons: Furthermore details are we will look at the learning method for weights in multi-layer networks next lecture. Thus the following description o

Explain a scheme of capability list to implement protection, Describe the s...

Describe the scheme of capability lists to implement protection? Capability lists (C- lists): These lists are utilized to make sure that uses only access files that are e

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd