1, background-attachment: fixed
attribute prevents the background image from scrolling. Its default value is scroll, which means that by default, the background will scroll with the document
2. The font-weight attribute sets the thickness of the text (keywords 100 ~ 900 specify 9 levels of boldness for the font. If a font has these built-in boldness levels, then these numbers map directly to the predefined levels , 100 corresponds to the thinnest font variant, and 900 corresponds to the thickest font variant. The number 400 is equivalent to normal, and 700 is equivalent to bold).
3. The font-style attribute is most commonly used to specify italic text.
4. The font-family attribute defines the font family of the text.
5. The font-size attribute sets the size of the text.
Use em to set font size
If you want to avoid the problem of not being able to resize text in Internet Explorer, many developers use em units instead of pixels.
W3C recommends using em size units.
1em is equal to the current font size. If an element's font-size is 16 pixels, then 1em equals 16 pixels for that element. When setting the font size, the em value changes relative to the font size of the parent element.
The default text size in browsers is 16 pixels. So the default size of 1em is 16 pixels.
You can use the following formula to convert pixels to em: pixels/16=em
(Note: 16 is equal to the default font size of the parent element. Assume that the font-size of the parent element is 20px, then the formula needs to be changed to: pixels/20=em)
In the example above, the text size in ems is the same as the text size in pixels in the previous example. However, if you use em units, the text can be resized in all browsers.
Unfortunately, there is still a problem in IE. When resizing text, it will be larger or smaller than normal.
Use Percentage and EM together
A solution that works in all browsers is to set the default font-size value in percentage for the body element (parent element)
<code>body {font-size:100%;}</code> h1 {font-size:3.75em;} h2 {font-size:2.5em;} p {font-size:0.875em;}
6. The text-decoration attribute is mostly used to remove underlines from links
7,
Combine descendant selectors and child selectors
Please look at the selector below:
table.company td > p
The above selector will select all p elements that are children of the td element, which itself inherits from the table element, which has a class attribute containing company.
8,
Tip: In the CSS definition, a:hover must be placed after a:link and a:visited to be valid.
Tip: In the CSS definition, a:active must be placed after a:hover to be valid.
Tip: Pseudo class names are not case sensitive.
https://zhuanlan.zhihu.com/p/22606894 Front-end interview summary

The official account web page update cache, this thing is simple and simple, and it is complicated enough to drink a pot of it. You worked hard to update the official account article, but the user still opened the old version. Who can bear the taste? In this article, let’s take a look at the twists and turns behind this and how to solve this problem gracefully. After reading it, you can easily deal with various caching problems, allowing your users to always experience the freshest content. Let’s talk about the basics first. To put it bluntly, in order to improve access speed, the browser or server stores some static resources (such as pictures, CSS, JS) or page content. Next time you access it, you can directly retrieve it from the cache without having to download it again, and it is naturally fast. But this thing is also a double-edged sword. The new version is online,

The article discusses using HTML5 form validation attributes like required, pattern, min, max, and length limits to validate user input directly in the browser.

This article demonstrates efficient PNG border addition to webpages using CSS. It argues that CSS offers superior performance compared to JavaScript or libraries, detailing how to adjust border width, style, and color for subtle or prominent effect

Article discusses best practices for ensuring HTML5 cross-browser compatibility, focusing on feature detection, progressive enhancement, and testing methods.

The article discusses the HTML <datalist> element, which enhances forms by providing autocomplete suggestions, improving user experience and reducing errors.Character count: 159

The article discusses the HTML <progress> element, its purpose, styling, and differences from the <meter> element. The main focus is on using <progress> for task completion and <meter> for stati

This article explains the HTML5 <time> element for semantic date/time representation. It emphasizes the importance of the datetime attribute for machine readability (ISO 8601 format) alongside human-readable text, boosting accessibilit

The article discusses the HTML <meter> element, used for displaying scalar or fractional values within a range, and its common applications in web development. It differentiates <meter> from <progress> and ex


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

SublimeText3 Chinese version
Chinese version, very easy to use

SublimeText3 Mac version
God-level code editing software (SublimeText3)

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Dreamweaver CS6
Visual web development tools

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
