


How to Bypass Hidden Elements When Using nth-child Selectors
The nth-child selector allows you to target elements based on their position among their sibling elements. However, this selector counts hidden elements, which can cause problems when you want specific rows in a grid to display differently.
In your case, you're using nth-child selectors to change the appearance of every nth row in a grid of blocks. When you hide some blocks using display: none, the nth-child selector still counts them, leading to incorrect styling.
CSS-Based Solution
Unfortunately, there's no pure CSS solution to this problem. The nth-child selector simply looks at all siblings, regardless of their visibility.
jQuery-Based Solution
To avoid including hidden elements in your nth-child calculations, you need to remove them from the DOM when they're hidden. jQuery provides a .detach() method for this purpose:
$(".hide-others").click(function () { var divs; $(".photos-board-item").each(function (i) { $(this).data("initial-index", i); }); if (divs) { $(divs) .appendTo(".row") .each(function () { var oldIndex = $(this).data("initial-index"); $(".photos-board-item").eq(oldIndex).before(this); }); divs = null; } else { divs = $(".css--all-photo").detach(); } });
This code removes the hidden elements from the DOM when the "Hide others" button is clicked. When the button is clicked again, the elements are reinserted into the DOM, preserving their original order.
Demo
Here's a demo that demonstrates the solution:
[DEMO FIDDLE]
By using the .detach() method, you can toggle the visibility of elements without breaking the nth-child selector logic, ensuring that every row in your grid maintains its desired appearance.
The above is the detailed content of How to Style Rows Correctly with nth-child Selectors When Hidden Elements Exist?. For more information, please follow other related articles on the PHP Chinese website!

This is the 3rd post in a small series we did on form accessibility. If you missed the second post, check out "Managing User Focus with :focus-visible". In

This tutorial demonstrates creating professional-looking JavaScript forms using the Smart Forms framework (note: no longer available). While the framework itself is unavailable, the principles and techniques remain relevant for other form builders.

The CSS box-shadow and outline properties gained theme.json support in WordPress 6.1. Let's look at a few examples of how it works in real themes, and what options we have to apply these styles to WordPress blocks and elements.

If you’ve recently started working with GraphQL, or reviewed its pros and cons, you’ve no doubt heard things like “GraphQL doesn’t support caching” or

The Svelte transition API provides a way to animate components when they enter or leave the document, including custom Svelte transitions.

How much time do you spend designing the content presentation for your websites? When you write a new blog post or create a new page, are you thinking about

In this article we will be diving into the world of scrollbars. I know, it doesn’t sound too glamorous, but trust me, a well-designed page goes hand-in-hand

npm commands run various tasks for you, either as a one-off or a continuously running process for things like starting a server or compiling code.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

Dreamweaver Mac version
Visual web development tools

WebStorm Mac version
Useful JavaScript development tools

Notepad++7.3.1
Easy-to-use and free code editor

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
