当前位置:网站首页>弹性布局(display:flex下 align-content、justify-content、align-items三个属性的作用和效果
弹性布局(display:flex下 align-content、justify-content、align-items三个属性的作用和效果
2022-07-25 03:34:00 【No Bug】
align-content属性
作用:设置同一列子元素在Y轴的对齐方式
| 属性值 | 描述 |
|---|---|
| flex-start | 排列在当前列的最上方 |
| flex-end | 排列在当前列的最下方 |
| center | 排列在当前列的中间位置 |
| space-between | 间距相等排列,上下不留白 |
| space-around | 间距相等排列,上下留白等于间距的一半 |
justify-content属性
作用:设置同一行子元素在X轴的对齐方式
| 属性值 | 描述 |
|---|---|
| flex-start | 排列在当前行的最左边 |
| flex-end | 排列在当前行的最右边 |
| center | 排列在当前行的中间位置 |
| space-between | 间距相等排列,两边不留白 |
| space-around | 间距相等排列,两边留白等于间距的一半 |
align-items属性
作用:设置同一行子元素在Y轴的对齐方式
| 属性值 | 描述 |
|---|---|
| flex-start | 排列在当前行的最上方 |
| flex-end | 排列在当前行的最下方 |
| center | 排列在当前行的中间位置 |
| stretch | 当子元素没有设置高度或为auto,将占满整个容器的高度 |
| baseline | 以子元素第一行文字的基线对齐 |
边栏推荐
- Sword finger offer II 041. Average value of sliding window_____ Using queue / loop array implementation
- Hal library serial port for note taking
- Task02 | EDA initial experience
- Database transactions (often asked)
- New features commonly used in ES6
- Many local and municipal supervision departments carried out cold drink sampling inspection, and Zhong Xue's high-quality products were all qualified
- Time complexity and space complexity
- Function method encapsulation -- mutual conversion of image types qpixmap, qimage and mat
- What should testers do if they encounter a bug that is difficult to reproduce?
- Openlayers draw deletes the last point when drawing
猜你喜欢

mysql_ Master slave synchronization_ Show slave status details

Force deduction brush question 7. Integer inversion

B. Almost Ternary Matrix

05 - MVVM model

File permission management

Network security - comprehensive penetration test -cve-2018-10933-libssh maintain access

A 20 yuan facial cleanser sold tens of thousands in seven days. How did they do it?

Force deduction brush question 26. Delete duplicates in the ordered array

FLASH read / write problem of stm32cubemx

Calculation method of confusion matrix
随机推荐
ES6 - study notes
04 -- two ways of writing el and data
ECMAScript new features
Secondary vocational network security skills competition P100 vulnerability detection
Openlayers draw circles and ellipses
Day 10: BGP border gateway protocol
Machine learning exercise 8 - anomaly detection and recommendation system (collaborative filtering)
Day 9 (capture traffic and routing strategy)
Brief understanding of operational amplifier
Recursive and non recursive methods are used to realize the first order, middle order and second order traversal of binary tree respectively
Table of contents of force deduction questions
MySQL configuration in CDH installation
144. Preorder traversal of binary tree
mysql_ Account authorization permission recycling, account locking and unlocking, account creation and deletion
C language function operation
Analysis of cascading relation operation examples of cascade
Fiddler grabs packets and displays err_ TUNNEL_ CONNECTION_ FAILED
Why does the legend of superstar (Jay Chou) not constitute pyramid selling? What is the difference between distribution and pyramid selling?
Network security - comprehensive penetration test -cve-2018-10933-libssh maintain access
Question B: shunzi date