What is unordered lists, Computer Engineering

Assignment Help:

Q. What is Unordered Lists?

First, we will build an unordered list. Many times, these lists are also termed as bulleted lists. These lists are characterized by list items which do not have numbers. They are used when points in the list have no particular order. They are delimited by <UL> and </UL> tags. Every point in the list is delimited by <LI> and </LI> tags.

<HTML>

<HEAD>

<TITLE>EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

What I want for Id

<UL>

<LI>a big red truck</LI>

<LI>an aeroplane that flies</LI>

<LI> a nice soft toy</LI>

<LI>a drum set</LI>

<LI>a Walkman</LI>

<LI> extra pocket money</LI>

</UL>

</BODY>

</HTML>

The syntax of the <UL> tag is:

<UL TYPE=""> where TYPE= "DISC", "SQUARE" or "CIRCLE".

<LI> </LI>

</UL>

Bullet appearance can be changed to be round (a dark circle), a circle or a disc depending on value of the TYPE attribute. As displayed in the Figure, list of items are included within <UL> and </UL> tags. Each list item must be preceded with a <LI> tag.


Related Discussions:- What is unordered lists

Define the object orientation and its analysis, Object Orientation and Anal...

Object Orientation and Analysis An Object is anything that exists within the problem domain that can be recognized by data and/or behaviour. An example of an object is a bike.

Console application with a class, Make a console application with a class '...

Make a console application with a class 'Account' having variables as id(int) and name (String).Add property 'account-no' which can be set andget. Add a 'ReadOnly' property 'IntRat

What is computer virus, What is computer virus?  A  computer  virus  is...

What is computer virus?  A  computer  virus  is  a  computer  program  that  is  designed  to  spread  itself between   computers.   Computer virus are inactive when standing a

What is double data rate sdram, What is double data rate SDRAM?  Double...

What is double data rate SDRAM?  Double data rates SDRAM are those which can transfer data on both edges of the clock and their bandwidth is fundamentally doubled for long burs

What are the aspects of security policy, What are the aspects of security p...

What are the aspects of security policy The security policy should cover aspects such as network service access, physical access, limits of acceptable behaviour, company's pro

Explain the terms constructors and destructors, When we initialize the form...

When we initialize the form at that time if we require to set any variable's value then we can set it by defining in constructor. Constructor's name always similar as class name an

Calculate max distance so subscriber get speech reproduction, In a subscrib...

In a subscriber loop that contains a series resistance of 300 ohms to protect the batteries in the exchange, a normalized telephone draws 10 mA and its standard input d.c. resistan

What are the roll and page areas, What are the roll and page areas? Ro...

What are the roll and page areas? Roll and page areas are SAP R/3 buffers used to kept user contexts (process requests).  The SAP dispatcher assigns procedure requests to work

Explain the race condition, Explain the Race Condition The situation wh...

Explain the Race Condition The situation where various processes access - and manipulate shared data concurrently. The final value of the shared data relies upon which process

The disadvantage of specifying parameter, The disadvantage of specifying pa...

The disadvantage of specifying parameter during instantiation are: -  This has a lower precedence when compared to assigning using defparam.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd