What's the blue underlined font for links?

I'm sure that ubiquitous blue, underlined, sans-serif font that everybody uses for a Web link must have some specs  ... i.e., 100% cyan with 15% K in arial or some such.
Anybody set up a character style for it that looks realistic in print?
Thanks,
Eddie

Eddie,
In addition to what Herb said:
When the creator of the site makes no changes to the default values of the website creation application, probably the font is fake Helvetica (also known as Arial) and the Link colour is 0000FF (all web colours are expressed as Hex triplets, corresponding to coded RGB values, 00 = 0, FF = 255); similarly the active link colour may be FF0000 and the visited link colour FF00FF.

Similar Messages

  • What is the default theme font for ea & cs?

    Hi all;
    This was not answered before. Is this specified now?
    If the theme.xml file is as follows (which Word usually does):
    <a:minorFont>
    <a:latin typeface="Calibri"/>
    <a:ea typeface=""/>
    <a:cs typeface=""/>
    What font is used for:
    <w:rFonts w:asciiTheme="minorBidi" w:hAnsiTheme="minorBidi"/>
    I'm seeing Arial for a test case and I have no idea where that's coming from.
    ??? - thanks - dave
    What we did for the last 6 months -
    Made the world's coolest reporting & docgen system even more amazing

    Hello Dave,
    I couldn't download your test case (404), but I made a similar one.
    theme1.xml:
          <a:minorFont>
            <a:latin typeface="Calibri" panose="020F0502020204030204"/>
           <a:ea typeface=""/>
            <a:cs typeface=""/>
          </a:minorFont>
    document.xml:
          <w:r>
            <w:rPr>
                <w:rFonts w:asciiTheme="minorBidi" w:hAnsiTheme="minorBidi" />
            </w:rPr>
            <w:t>test</w:t>
          </w:r>
    This resulted in Times New Roman when I opened the document, which is in line with what I see in [MS-OI29500] §2.1.87/c:
    [begin quote:
    c. The standard states that the default fonts for the ascii, hAnsi, cs, and eastAsia attributes are application-defined.
    Word uses a default font of Times New Roman for all of these attributes. --end quote]
    I'm not sure why you're seeing Arial in your document. If you get that to me with a different link or via dochelp email, I'll be glad to investigate it further. EDIT: I was able to correct the link. I'll see if I can determine what's going on with the font
    selection for this document.
    Best regards,
    Matt Weber | Microsoft Open Specifications Team

  • What's the perfect CHINESE FONT for iWeb to solved the Justified issue?

    Hi,
    Terible here, i'm using Chinese Font for my website...most of the Text Box were out of Justified unlike the perfect justified on English Font.
    Sorry i hope you understand what i'm trying to descript above.
    I'm wondering now, Is there any specific Chinese Font to solved the Justified issue?
    Now, everything looks fine in iWeb but when view it in Safari or any browser, there'll be out of Justified.
    Need helps and thanks!!!

    Could you provide your url so people can see what you are referring to?
    Have you tried the various Chinese fonts provided with OS X already?
    http://www.yale.edu/chinesemac/pages/fonts.html#Apple

  • What's the most efficient font for printing

    Hi there, I'm using Pages. And I was jsut wondering, of the fonts in Pages, which was hte most ink effecient when printing!?

    http://www.ehow.com/list_7428150_fonts-use-less-ink.html
    more hits
    https://www.google.dk/search?q=which+font+uses+least+ink&oq=which+font+use+leat& aqs=chrome.1.69i57j0l5.4570j0j8&sourceid=chrome&espv=210&es_sm=93&ie=UTF-8

  • I need to know the standard default font for Firefox

    I had a Dell 20 inch 2007fp monitor that I had to give up. I purchased an LG 22inch widescreen monitor.
    My home page is the Drudge Report and with the new monitor the font is all messed up.
    What is the standard default font for Firefox?

    You can see the defaults in a screenshot in this KB article: [[Some text shows up bold after upgrade]]<br />
    You can check the font setting in: Tools > Options > Content : Fonts & Colors: Advanced<br />
    Default Font: Times New Roman (16)<br />
    <br />
    Fonts for : Western<br />
    <br />
    Proportional: Serif (16)<br />
    Serif : Times New Roman<br />
    Sans-serif : Arial<br />
    Monospace : Courier New (13)
    Your above posted system details show outdated plugin(s) with known security and stability risks.
    *Next Generation Java Plug-in 1.6.0_18 for Mozilla browsers
    Update the [[Java]] plugin to the latest version.
    *http://java.sun.com/javase/downloads/index.jsp (Java Platform: Download JRE)

  • HT204149 What is the maximum resolution available for use with the Apple Mini DisplayPort to Dual-Link DVI adapter?

    What is the maximum resolution available for use with the Apple Mini DisplayPort to Dual-Link DVI adapter?

    Hey guys,
    I found out an answer by myself...
    The missing link : the MacBook Pro needs to be powered... as in you need to plug the charger in...
    In conclusion, you simply plug everything, turn on the MacBook Pro, close the lid, and there you go !

  • What do the blue versus gray icons mean for groups in address book

    When I subscribe to another address book, it sits below a line under all my contact groups.
    My group icons are grey, the subscribed contact group icons are blue.
    If I drag a subscribed group to my "All" group then it sits there like a normal group, and sync to my iphone/touch etc. but the icon remains blue.
    I got excited thinking that it would automatically update any changes found in the subscribed address book but that doesn't seem to be the case.
    So what does the blue icon mean? is there something special I can do with it? I can't find any apple documentation anywhere.
    Thanks
    Edward

    The blue dots mean the addressee has a device capable of using iMessage.
    Try using the phone number instead of the email address to send the message.

  • HT4664 What is the best graphics card for FCPX?

    In the nonstop anti-FCPX propaganda is an article of interest — posted 7/9/12 — comparing the benchmarks of FCPX and PP6.
    http://www.streamingmedia.com/Producer/Articles/ReadArticle.aspx?ArticleID=83582 &PageNum=1
    The system used was a 2 x 2.93 GHz Quad-Core Mac Pro from early 2009 running MacOS X version 10.7.4 with 12 GB of RAM and an NVIDIA Quadro FX 4800 graphics card with 1.5 GB of onboard RAM.
    In most cases PP6 outperformed FCPX with this configuration. However, in the comments Ben Balser pointed out that FCP X's A/VFoundation engine wasn't ideal on the NVIDA card:
    "Quadro is actually not the best card for FCP X's A/VFoundation engine, but great for CS6's Mercury engine, so the test is amazingly flawed right there. Try both on a 5780 card and watch things drastically change. I've done that test myself. Exporting to Compressor uses a MUCH more sophisticated encoding engine meant for higher level, professional transcoding, not simple outputs, which are faster using Export Media…"
    Apple lists this card on its support page: http://support.apple.com/kb/HT4664
    So,
    What is the best graphics card for FCPX?

    Ben,
    Thanks for chiming in on that article. It would be good to have a benchmark comparison with the two systems each with a preferred card.
    I'm hoping to see some other comparisons on this thread. Also, some links to other articles about best practices and configurations.

  • How to get rid of the blue underline with green arrows on words and then a pop-up ad appears.

    How to get rid of the blue underline with green arrows on words and then a pop-up ad appears.

    Click here and follow the instructions, or if they don't cover the type of adware on the computer, these ones. If you're willing to use a tool to remove it(you don't need to, but may find it easier), you can instead run Adware Medic; this link is a direct download.
    (119795)

  • What Are the Exact Basic rules for Replying a Thread...... -:)   @};-

    Hi Experts,
    After Looking into the forums many days I had a small conclusion about forums,
    SAP Forums are better place I have seen for getting a goo dhelp & Knowledge...
    Why can't we make it a BEST Place.
    This is just a small doubt which I would like to clear myself first,
    I have seen many users In the forums asking for a Basic Questions
    When cleared, But still they want to have a Spoon feeding with a Sample Code.
    When Sample Code Given they will provide the original code and requests for Modifications.
    These always looks to me as crazy.
    I have seen somelong time agin by moderators posting that In SCN there will be no SPOON FEEDING.
    I am not sure whether if still this Rule AVAILABLE or NOT.
    Ok if the task is really difficult let them ask again and again,
    And it was not replied, let them repost, I agree with them.
    And How about a User Registered in SDN very long back and asking for a silly question in below thread,
    [Sendin Email to the recipent list -Need correct FM |Getting the address from shipto partner of Bil. item not directly from C.ma]
    This is one more example, really funny, The thread poster needs the solution at any cost, he doesn't require and Suggetions,,, {He Only needs Solution}
    [Radio Buttons |Radio Buttons;
    [Turning Off Debugger |Turning Off Debugger;
    [Regarding Amount in words|Regarding Amount in words;
    There are 100's of threads like this....Everyone knows this facts.
    Check this who answered this one and who replied correct answer, who copied, finally who was rewarded...!
    [how to validate POsting period |Re: how to validate POsting period]
    Now My Real Problem is....!
    User is always intelligent, Only the weakness is in Contributor, trying to help them,..,
    And I openly say that Someone requesting for basic help is not DUMB, But the Contributor replying forgets
    the basic rules " Why Contributing ?"
    According to me It's not the Requestor to see Rules & Requlations before posting the threads,
    But its responsibilty for the Contributing person to see th Rules & Requlations before replying the threads,
    If we follow the rules and stand on a single word or rule or anything there will be Good Result.
    Major Problem is in US not anyone else.
    Example Some one saying search in the forum,,, then please no replies after that...
    But we are very pity hearted again we post the solution,,,
    But it is not at all enough(for cintribtor's)... they will copy the solution and post again by slight Modifications,
    And Some users are having 500,600,700,800 Posts with 0 points, registered long long back.
    They are completly dependent on forums,,, As they goto office and as they eat, The same they open forums and ask Queries...
    They will never realize what they are doing,, and we will never let them improve better...
    Finally Lets Discuss About this and Correct & Suggest me if I am wrong,
    Is my thoughts are going in the right way or not I am not even sure... Please Aslo Correct me if I did any mistakes.
    Thanks & regards,
    Dileep .C
    Edited by: Dileep Kumar Chinnaiah on Apr 29, 2009 12:33 PM
    Title Changed Form
    "What to do when someone asking for Basic Questions" to "What Are the Exact Basic rules for Replying a Threads...... "

    Hi Stephen,
    Very useful Information,
    First tell me a little something about my self...
    After completion of my certification(as a fresher) I was down the streets hunting the job,
    with the insufficient knowledge and being a non-experienced person, I never got one.
    And mean while when I got my "S-UserID", I used to be proud, To say frankly, I registerd in SDN & SAP all at a time, without even knowing what I can do there..,
    When I got a job afterwords I was doing the job and never seen SDN page for many months,
    when I came to know that of we have doubts we can post at SDN. then started requesting help,
    I posted only a little, I didnot got the proper response. on that day I decided,
    still there are some places where we cannot get help on time and there will be people waiting to get help,
    Why cant I put some of my efforts to help others.
    Then I searched some topic by Topic in SDN topic by Topic I used to read threads just for knowledge.
    when I feel my self comfort for contributing, I started contibuting...!
    If you haven't read it, take a look first, so you can understand where things are now.
    I dont know where things are now. But these in this thread I mentioned clearly what I seen from the day I started contributing.
    I searched with the terms of 'Rules for replying', The results are not as I expected, and this link has subject as
    "O SDN, where art thou?" So it dosent hit my in the list.
    Like everybody until a certain stage I am also rushing for points.
    But I most cases I never tried to copy paste answers. If I done some then that is just to point it myself some day,
    I have no hopes or no intrest on the points...! This was discussed with Rob & Matt, at my inital contribution where my points are 36.
    From that day till date I have changed a lot to myself.
    Everyone cannot change like me because they are not like me & And I dont even expect that...!
    I will be online almost 6-8Hrs a day, Not even getting intrest to see the forums just because of the co-contributors.
    My only point is I am just requesting to a co-contributor,
    Clearly In a example : Lets say contributor has replied to a thread, and if you know that is a correct solution,
    please dont reply any more, If you have a better solution than that, then only reply,
    Even there is one reply in the thread not a matter, if correct answer leave that query.
    If still error persists, Show up with your Idea's...
    Dont let down the contributor, by copying his reply and editing and pasting(edit only if incorrect).
    I am just looking for this one exactly to circulate between ourselfs.
    For this we a little support from moderators to circulate(may be as a rule or may be as a mail to them)
    You may say again how many mails we have to send, It dosent matter, one mail to one person one time,
    and +ve factors will show up definetly.
    A real contributor always understand what I am talking about, but some one who hunts for points will never.
    I am really sorry if I am troubling with my doubts & requests,
    If so, Pleae forgive me,,
    Thanks & regards,
    Dileep .C

  • What are the scaling co-efficients for Accelerometer input in Daq-mx ?

    hi
    im using daq-mx to take accelerometer input.
    i want to read the raw data and scale it myslef later.
    i want to know what are the scaling co-efficients for the accelerometer input in daq-mx and what is the process of determining them.
    thanks.

    Rahul,
    I've answered your question in another thread you can check using the
    following link:
    http://forums.ni.com/ni/board/message?board.id=250&message.id=14353
    I hope this helps answer your question.
    Jason

  • What are the different transaction codes for PGI?

    1. What are the different transaction codes for PGI?
    2. What transaction code should I use for a Group Delivery?
    Regards,
    Nazim.

    Hi
    Go to VL02 and you can do the PGI.
    Regfarding Group Delivery, you can create a batch job and link the program to the batch job so that the job picks up all the orders and create deliveries.
    Creating a Background Job Using the Job Wizard
    •From the main menu select System>Services>Jobs>Define Job (transaction SM36).
    •Press the Job Wizard button and step through the screens as follows:
    •1:Continue
    •2: Enter a name for your job. Continue.
    •3: Continue with ABAP Program Step selected
    •4: Enter the ABAP Program Name and variant name.
    Press the Print Parameters button, specify the required printer and set the "Time of Print" to "Send to Print Spooler for now".
    Press green tick
    Continue
    •5: If more reports need to be added to the job tick the checkbox, press continue and repeat screens 3 and 4.
    •6: Select how the job is to scheduled (eg Date and Time)
    •7: Enter the required scheduling information ( eg Date and Time) and if required tick "Periodic Jobs"
    •8: If "Periodic Job" was selected select the frequency (eg Monthly)
    •9: Check the job details and press Complete
    Hope the above info helps.
    Reward if useful
    Regards

  • What is best blue tooth presenter for macbook pro and air

    What is best Blue Tooth presenter for MacBook Pro and Air?

    You got lots of choices such as:
    WD Studio
    http://www.wdc.com/en/products/products.aspx?id=200
    WD Studio 2
    http://www.wdc.com/en/products/products.aspx?id=210
    WD My Book
    http://www.wdc.com/en/products/products.aspx?id=250
    Lacie:
    http://www.lacie.com/dk/products/range.htm?id=10007
    http://www.lacie.com/dk/products/range.htm?id=10036
    The are tons of external storage for mac out there but these are a few of them...
    I personally like the WD Studio 2 and the LaCie 2big Network 2

  • What is the best virus protection for a Mac?

    What is the best virus protection for a Mac?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't actually been tested by Apple (unless it comes from the Mac App Store), but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. For most practical purposes, applications recognized by Gatekeeper as signed can be considered safe.
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could find some other way to evade Apple's controls.         
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. Beyond XProtect, Gatekeeper, and MRT, there’s no evidence of any benefit from other automated protection against malware. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source. How do you know whether a source is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style "virus" affecting OS X. Merely loading a page with malicious Java content could be harmful. Fortunately, Java on the Web is mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers. In Safari, this is done by unchecking the box marked Enable Java in the Security tab of the preferences dialog.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a specific task, enable Java only when needed for the task and disable it immediately when done. Close all other browser windows and tabs, and don't visit any other sites while Java is active. Never enable Java on a public web page that carries third-party advertising. Use it, when necessary, only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. If you need to be able to detect Windows malware in your files, use the free software ClamXav — nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging threats, but they get a false sense of security from it, and then they may behave in ways that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • What is the recommended virus software for my MacBook?

    what is the recommended virus software for my MacBook?

    None, actually, is needed as there are no known viruse affecting OS X.
    Helpful Links Regarding Virus Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    If you require anti-virus protection I recommend using ClamXav.

Maybe you are looking for

  • NavigateToURL doesn't bring FireFox window to the front

    Just wondering if this is a bug that's likely to get fixed anytime soon.   Or is there something inherintely blocking it from working like something that would have to change in windows or firefox to make it work.   I'm only asking because I was goin

  • How to make a clean spiral path in cs5

    I have Photoshop CS5 Extended at work and am lucky to have it. (no hope of getting CS6 or any other Adobe products at the moment).  Is there a technique or script to make a clean spiral (with a path--so I can apply a brush stroke) in CS5 WITHOUT usin

  • Oracle EE cluster licensing

    Hi, I'd have to create a cluster with two servers. Each server is equipped with two processors (i.e. two filled sockets) which are intel quad core. My question is: assuming that the minimum named user license number is 25, how many 25-user package sh

  • Error message when I try to sync ipod

    itunes says it cannot sync to the ipod because there's no room on the ipod. I restored the ipod and there's nothing on the ipod, but itunes won't sync.

  • Perl script to extract SAP table

    Hi everyone, Is that possible to use Perl script to access and extract SAP table ? Is there any documentation for this ? Thanks