Describe thead, tbody and tfoot tag, Computer Engineering

Assignment Help:

Q. Describe THEAD, TBODY and TFOOT tag?

THEAD, TBODY, TFOOT

<THEAD>, <TBODY>, and <TFOOT> form groups of rows. <THEAD> specifies that a group of rows are header rows at the top of the table. <TBODY> specifies that a group of rows are body rows. <TFOOT> specifies that a group of rows are footer rows at the bottom of the table.

The most popular use for these three tags, that are currently only recognized by MSIE 4 and up, is to put borders among groups of rows instead of between every two rows. For illustration, suppose you have a table in which you want borders around the top row, bottom row and around the entire block of rows in between. You could do that with following code. Note that in addition to <THEAD>, <TBODY> and <TFOOT> you also should use <TABLE RULES=GROUPS>. The below example illustrates the use of these tags:

<HTML>

<BODY>

<TABLE CELLPADDING=6 RULES=GROUPS FRAME=BOX>

<THEAD>

<TR> <TH>Weekday</TH> <TH>Date</TH> <TH>Manager</TH>

<TH>Qty</TH> </TR>

</THEAD>

<TBODY>

<TR> <TD>Mon</TD> <TD>09/11</TD> <TD>Komal</TD> <TD>639</TD>

</TR>

<TR> <TD>Tue</TD> <TD>09/12</TD> <TD>Lovely</TD> <TD>596</TD>

</TR>

<TR> <TD>Wed</TD> <TD>09/13</TD> <TD>Rohan</TD> <TD>1135</TD>

</TR>

<TR> <TD>Thu</TD> <TD>09/14</TD> <TD>Suresh</TD> <TD>1002</TD>

</TR>

<TR> <TD>Fri</TD> <TD>09/15</TD> <TD>Rohan</TD> <TD>908</TD>

</TR>

<TR> <TD>Sat</TD> <TD>09/16</TD> <TD>Lovely</TD> <TD>371</TD>

</TR>

<TR> <TD>Sun</TD> <TD>09/17</TD> <TD>Suresh</TD> <TD>272</TD>

</TR>

</TBODY>

<TFOOT><TR> <TH ALIGN=LEFT COLSPAN=3>Total</TH> <TH>4923</TH>

</TR></TFOOT>

</TABLE>

</HTML>

782_Describe THEAD - TBODY and TFOOT tag.png

Figure: Using the THEAD, TBODY and TFOOT Tags


Related Discussions:- Describe thead, tbody and tfoot tag

4bit counter using JK flip flop and unique sequence, Need to build a 4bit J...

Need to build a 4bit JK flip flop counter with a unique patter. 6 4 2 5 3 1 F C B A

Determine the primary memory of the server, Determine the primary memory of...

Determine the primary memory of the server The keys used for accessing the server are held at a secret location in the primary memory of the server. This area or location is hi

Explain about the public key cryptography, Explain about the Public Key Cry...

Explain about the Public Key Cryptography. Public Key Cryptography: It is a cryptographic system which uses two keys as a public key identified to everyone and a private

State about dynamic modelling and its inputs, State about Dynamic modelling...

State about Dynamic modelling and its inputs Dynamic modelling is elaborated further by adding concept of time: new attributes are computed, as a function of the attribute chan

Minimum total number of shelv, Write a program that finds the minimum total...

Write a program that finds the minimum total number of shelv, C/C++ Programming

Define rules for evaluating the boolean expression, Define Rules For Evalua...

Define Rules For Evaluating the Boolean Expression? Generally, the following rules must always be followed when evaluating the Boolean expression: Primary, perform all in

Assessing heuristic searches-artificial intelligence, Assessing Heuristic S...

Assessing Heuristic Searches Given a specific problem you want to create an agent to solve, there can be more than one way of specifying it as a search problem, more than one o

Recent parallel programming models, A model for parallel programming is an ...

A model for parallel programming is an abstraction in addition its machine architecture is independent. A model is able to be implemented on different hardware and memory architect

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd