How can we use ordered lists, Computer Engineering

Assignment Help:

Q. How can we use Ordered Lists?

Lists having numbered items are termed as ordered lists. They are used when items in the list have a natural order. They can also be used when number of items in the list needs to be known at a glance. To make an ordered list, simply change <UL> tag to <OL>.

<HTML>

<HEAD>

<TITLE>EXPERTSMIND.COM</TITLE>

</HEAD>

<BODY BGCOLOR="#FFFFFF">

What I want for my birthday

<OL>

<LI>a big red truck</LI>

<LI>a toy train</LI>

<LI>a Barbie doll</LI>

<LI>a drum set</LI>

<LI>binoculars</LI>

<LI>a month's extra pocket money</LI>

</OL>

</BODY>

</HTML>

Syntax of the <OL> tag is:

<OL TYPE="" START=""> where TYPE= "1", "a", "A", "i", "I" and START is the first item number.

<LI> </LI>

</OL>

Type of the numbering format desired must be specified as the value of TYPE attribute. The possible types are displayed above in syntax. Numbering starts from START attribute's value.


Related Discussions:- How can we use ordered lists

What methods can be overridden in java, In C++ terminology, all public meth...

In C++ terminology, all public methods in Java are virtual. Thus, all Java methods can be overwritten in subclasses except those that are declared final, private and static.

Information system for strategic advantage, Q. Describe short note on Infor...

Q. Describe short note on Information system for strategic advantage? Ans. Strategic role of information systems engage using information technology to develop products or serv

Explain macro definition and call, Explain Macro definition and call. ...

Explain Macro definition and call. Macro: The assembly language programming frequently finds this necessary to repeat certain piece of code several times during the course of

COMPUTER SYSTEM, Classify computer systems according to capacity. How they ...

Classify computer systems according to capacity. How they are different from computers according to the classification of technology. Provide comparative study also.

Intel architecture, INTEL ARCHITECTURE - 64 ( IA-64) IA-64 (Intel Archit...

INTEL ARCHITECTURE - 64 ( IA-64) IA-64 (Intel Architecture-64) is a 64-bit processor architecture developed in cooperation by Intel and Hewlett-Packard, executed by processors s

Explain the storage class static, Explain the Storage Class Static Th...

Explain the Storage Class Static The Storage Class Static : Static declarations have two important and distinct uses. The more elementary use is to allow a local variable to

Ethernet 10 base 2 is an example of which topology, Ethernet 10 Base 2 is a...

Ethernet 10 Base 2 is an example of               network topology. (A)  Bus                                           (B)  Ring (C)  Star

Differences between cisc and risc architectures, Question: a) What is ...

Question: a) What is the main difference between the Princeton and Harvard microprocessor architectures? b) State five main differences between CISC and RISC architectures?

Explain signed binary number system, Explain signed binary number system. ...

Explain signed binary number system. Ans. Signed Binary Numbers: In decimal number system positive numbers are signified by (+) sign and negative numbers are represented b

What is a snooping cache, DNS cache snooping is not a term the author just ...

DNS cache snooping is not a term the author just made up, it is called and discussed by some notable DNS execution developers, and a few interested DNS administrators have prob

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd