Saturday, November 18, 2006

HTML Table Tags


1. <TABLE> ..... </TABLE>
These html tags specify data between them as a table. For kepting data in table you can use data cells.

2. <TABLE BORDER> ..... </TABLE>
Html does not display borders around the cells of the table. If you use BORDER attribute then html display borders using the lines.

3. <TABLE WIDTH=576> ..... </TABLE>
With the help of WIDTH attribute we can set the width of the table.

4. <TABLE ALIGN=CENTER> ..... </TABLE>
With these html tags table is created centrally on the screen.

5. <TABLE>
<CAPTION>caption of the table</CAPTION>
< ! - - table data - ->
</TABLE>
In between caption tags we can put a caption to the table.

6. <TABLE>
<CAPTION>caption of the table</CAPTION>
<TH>name 1<TH>name 2<TH>name 3
< ! - - table data - ->
</TABLE>
With <TH> tag we can put heading to cells. The text after <TH> tag is heading of a cell. In the above table there are three columns. So with the help of <TH> tags I put headings to three columns as above. Inside <TD> tag we can use ALIGN attributes left,center,right,justify for aligning the text.

7. <TR>
This tag creates new row of data.

8. <TABLE>
<CAPTION>caption of table</CAPTION>
<TH>name 1<TH>name 2<TH>name3
<TR><TD>some data<TD>some data<TD>some data
</TABLE>
There are three data cells in the above code. We can put data to the table after <TD> tag.

9. <TD></TD>
Since there is no data between <TD>tags this will become a blank data cell.

10. <TABLE>
<TR ALIGN=CENTER><TD>some data<TD>some data<TD>some data
</TABLE>
Since Align attribute center is in <TR> tag,the data in all data cells aligns centrally in data cells.

11. <TABLE>
<TR ALIGN=CENTER><TD>some data<TD ALIGN=LEFT>some data<TD>some data
</TABLE>
Here the data in second cell aligns left where as the data in first and third data cells aligns centrally in datacells.

12. <TABLE>
<TR VALIGN=TOP><TD>some data<TD>some data<TD>some data
</TABLE>
By VALIGN attribute we can do vertical alignment. In above table data is aligned to top of the data cells in the entire row.

13. <TABLE CELLSPACING=8> ..... </TABLE>
By using above attribute we can control the space between cells in a table.

14. <TABLE CELLPADDING=6> ..... </TABLE>
By using the above attribute we can set the distance from the cell edge to the cell data.


10 comments:

Anonymous said...

Women's Eli Manning Jersey axiotakix
Nike Donnie Avery Jersey axiotakix
Brian Urlacher Bears Jersey axiotakix
http://www.nikebroncosnflstore.com

Anonymous said...

Although it is a form of tripping[url=http://www.BobbyWagnerJersey.com]Bobby Wagner Womens Jersey[/url]
it is seen as a much more serious offense[url=http://www.ArianFosterJerseys.net]Arian Foster Womens Jersey[/url]
and is penalized accordingly Before you decide to take any of these[url=http://www.JaredAllenJersey.net]Jared Allen Womens Jersey[/url]
consult your physician first One of the popular feats among the strongmen of the era was called the Tomb of Hercules[url=http://www.CalvinJohnsonJersey.net]Calvin Johnson Womens Jersey[/url]
and Breitbart made it a part of his act: a bridge was built across his chest and heavy animals (bulls[url=http://www.JasonWittenJersey.com]Jason Witten Authentic Jersey[/url]
an elephant[url=http://www.BoJacksonJersey.com]Bo Jackson Jersey[/url]
etcorg6
Testinside guarantees your passing Adobe A Certification Exam- You build up your industry contacts and make friends with like-minded fashion designersThere is no doubt that phentermine is an effective agent to help individuals lose weight Statement of declarationdittoTweet span If your content is hidden[url=http://www.JasonWittenJersey.com]www.JasonWittenJersey.com[/url]
people will miss the purpose of your website and simply give up trying to find the information or article they need

Anonymous said...

And while all this is going on a professional project manager will not forget to motivate and encourage the project teamwww.JaredAllenJersey.net
to repeatedly monitor progress and adjust the project plansTorrey Smith Authentic Jersey
where necessaryHowie Long raiders Jersey
and to manage all the potential risks within the project Secondary Market Research: A Comparative Analysis Secondary ResearchSecondary research makes use of existing data from whatever sources are available There are many repetitive injuries that strike track and field athletes Because of the four year gap between herself and older sister Kim she starts the second group of children in the familyKeep up the great reporting!!"Like previously mentioned in the positive and negative Wanta response categoryBruce Irvin Womens Jersey
about 10 percent of those who emailed expressed disbeliefCalvin Johnson Womens Jersey
citing the extraordinary amount of money as being the biggest stumbling block in putting Wanta's story in the truth category
ï»?Find out what sets them apart Even just reading this is action PuniverseCarrot TopCatfishJammerGood GollyBookwormBrown NoserDinkyThimbleGumboWishboneFiddlesticksOinkBogusOld TimerJiffyPorkyPugglyWhopperSquirrel NutsShrinky DinkBozoBoomerangCute Screen NamesTweetyFuzzyTomboyMunchkinLollypopPonytailSunshineDimplesSweetyPieWinkyPoppyCupcakeCookieButtercupSmileyBluebellBabygirlHoneyBeeSparkleDazzleSnickersDizzyCandyAppleMuffinBunnytalePoodle PuffBabycakesCottonCandyButterflySweetPeaSugarPumpkinCutie PiePowderPuffPebblesAngelfacePattyCakeGigglesSong BirdBabyfaceCurlylocksHummingbirdTabbyDixiePippyFlutterPunkyZanySkiddlesCuddly-n-SweetTips to Choose a Screen NameThe screen name that one chooses should not be too explicit Since getting drafted three years ago Britt has found trouble with the police no less than seven times The voice over needs to be clearJason Witten Womens Jersey
conciseVincent Jackson Authentic Jersey
enthusiastic and short and to the point Many birds do not like a feeder that is over-exposed

Anonymous said...

timestamp a You need to be careful not to lose your shirt online withsome of these poor quality channels Installing new pipelining in under construction homestimestamp a > span display: inline-block;width: 16px;background-image: url(http://images The company cultivated the first physical espresso filter
jpg) no-repeat;padding: 20px; For online storage create the simple online database4Abortion

Anonymous said...

pGmq michael kors sale
kPep fer a lisser ghd
pFrm north face clothing
4nTbn cheap uggs
7wMsb michael kors purses

Anonymous said...

[url=http://ciproxin.webs.com/]buy ciprofloxacin[/url] buy cipro no prescription
buy ciprofloxacin
ciloxan buy

Anonymous said...

[url=http://casodex-bicalutamide.webs.com/]Bikalutamid
[/url] Bicalutamida
Pencial
buy Casodex online

Anonymous said...

uenvks buy modafinil online - provigil no prescription http://sturgeonlakerealty.com/#provigil-no-prescription , [url=http://sturgeonlakerealty.com/#generic-provigil ]generic provigil [/url]

Anonymous said...

How do you hold out the burgeoning viruses and Trojan horses, prowling in the cyberspace? There is any variety of packages like spam, adware, spy ware, malware and hackers all set to assault at the earliest option. Without having the understanding of internet consumers, credit card quantities or passwords can move onto the wrong fingers. These stability problems require to be resolved urgently and right here are two important ideas for you.

one. The 1st phase to guard your laptop or computer is to install a great virus scanner and firewall. Let's confront the facts, Microsoft's firewall is just not enough, and so are from your ISP and modems. No modem will come with constructed in antivirus software program. Hence you have to purchase and set up 1. You can pick from a amount of virus scanners and firewalls, but trustworthy amongst them are: Norton, AVG, McAfee, and ZoneAlarm. AVG and ZoneAlarm are free of charge software.

two. A [url=http://scrapeboxfaq.com/ ]Scrapebox proxies My Private Proxies [/url] aids on the internet stability. This server hides your IP, which is unique and unchangeable even if you want to. This IP identification should be stored key. If a cybercriminal accesses it, he can get your info, and use it to your detriment.

In this whole method a proxy functions discreetly. When you try to accessibility a hyperlink, the browser informs the server in regular instances, while a proxy server makes certain that it gets this info initial, and filters the information. Even if the net server attempts to know your IP, it will only be accessing the IP of the proxy server. Nonetheless, the proxy server can accessibility all your facts, and for that reason you should go for a proxy server which you can rely upon.

Considering that Proxy Servers support On the web Security., you should know how to established up one particular. Defective setup can lead to an unsafe proxy - therefore meticulously stick to the a variety of measures.

1. A great and anonymous proxy is a should. The Web has a whole good deal of paid out and free of charge proxy servers. While paid proxies provide far better anonymity, free proxies can also be opted. You really should zero in on a good Proxy Server which will aid your On-line Security.

two. Immediately after you have chosen your proxy, you require to configure your Internet browser to use it. This process is distinct from 1 to another browser. If you are using Web Explorer, here's how to set up the proxy. Open Internet Explorer, go to Net connection, simply click on link, pick the acceptable button for LAN or dial-up link, and simply click the configurations. Empower use a proxy server, and kind IP of proxy - which you must have noted on a paper, before commencing to install, followed by port in the respective fields. When you click on on "Okay" twice, you are now possessing a Proxy Server for Online Stability.

three. It is not enough even right after you have finished configuring your browser. You just are unable to fail to remember it. If you have opted for a free Proxy, it might not be working immediately after some time. Therefore, you ought to hold an eye on the proxy, and remain safe. Use Proxy Servers for On-line Protection and it will relieve you of lot of anxieties.

Anonymous said...

[url=http://saclongchampa.newsvine.com/]sacs longchamp[/url] Although Gucci's 1973 handbags came in many variations, the long shoulder strap version is what caught the eye of Fashionistas and opened up wallets across the globe. The trend of the longer shoulder strap was already in motion as designers became tired of large hobos, large daytime clutches and awkward double handle satchels which were dominant on store shelves over the past Welcome to buy Women Mulberry Lizzie Leather Tote Bag Brown,Shopping mulberrys handbags on mulberry factory store online. few years. Designers were ready to bring back the shoulder bag, and the 1973 handbag by Gucci solidified that the marketplace was ready too..
[url=http://longchampsoldesa.postbit.com/]sacs longchamps[/url] If you choose a chemical peel, an acid is applied to the face. The top layers are dissolved and new skin forms. These procedures may only temporarily mask the Beautiful Mulberry Women's Daria Drawstring Leather Tote Black Bag,and latest style up to 80% Off, let you have the fashion style, the quality assurance and thoughtful service! under eye bags. This helps limit the amount of swelling that occurs immediately after the injury. It also has a calming effect on nerves, which can decrease pain. Ice or cold packs should never be put directly on the skin due to the risk of frostbite.
[url=http://sportsrantz.com/longchamppliagea/]sac longchamp[/url] Handbags have become essential commodity of women since then. Have you ever known a woman who doesn't have any type of handbag that she carries her valuables in? I bet you Buy high quality Mulberry Outlet Sale Women's Alexa Marshmallow White Spotted Haircalf Bags sale for you don't. Whether you are using a small hand held purse or a large tote, it still correspond to a handbag and a woman can carry one of some type. Chickenpox is a classic disease of childhood, which usually is easy for children but for teenagers and adults may have an increased risk of complications. The disease can take about a week. Chick. Brands like Woodland, Reebok and Nike etc. are some sports brands which are very famous all over the globe and can present you with messenger bags and backpacks. Indian industry is In addition well-known for ethnic kind of products. The vertical zip pocket on the front is for your small belongings. There is a large horizontal zip pocket on the back for your cash and important bank cards and credit cards. No pockets for your mobile phone? That won't be a problem because this bag has two interior flat pockets.