Browse Definitions:
Reference

HTML, XHTML and XML Cheat Sheets

We've gathered resources from around the Web to help you with website coding. You'll find cheat sheets that show you common (and less common) tags and special characters, as well as how to do anything in HTML, XHTML and XML -- among other resources. Do you have a favorite web site coding cheat sheet? Let us know!

Need more information before you get started? See our definitions for HTML, XHTML and XML.

  • 216 Web browser-safe colors -- Elizabeth Castro, author of "HTML for the World Wide Web: Visual QuickStart Guide, Fifth Edition with XHTML and CSS" created this colorful page with 216 Web-safe browser colors.

  • ASCII Codes -- ASCIITable.com provides the ASCII character table and descriptions of the first 32 non-printing characters.

  • Character Entity References in HTML 4 and XHTML 1.0 -- Elizabeth Castro offers a set of tables containing the 252 allowed entities in HTML 4 and XHTML 1.0, as described in section 24 of the official HTML 4 specifications. She's also, helpfully, categorized them.

  • Creating Links -- This page offers examples of how to link to an object at different directory levels.

  • Doctype Declarations (DTDs) (1) -- When authoring documents in HTML or XHTML, it is important to add a Doctype declaration. The doctype declaration must be exact (both in spelling and in case) to have the desired effect, which makes it sometimes difficult. To ease the work, here is a list of recommended doctype declarations that you can use in your Web documents. (From the W3C website)

  • Doctype Declarations (DTDs) (2) -- XML.su offers a pageful of DTDs (DocType declarations).

  • HTML (1) -- This HTML guide provides essential HTML tags, backgrounds and colors, text formatting and much more.

  • HTML (2) -- This HTML cheat sheet lists commonly used tags and their uses.

  • HTML (4) -- This Webmonkey HTML reference includes basic tags, formatting, tables, frames and forms.

  • HTML Entities -- Elizabeth Castro maintains this cheat sheet listing allowable character entity references in HTML 4 and XHTML 1.0.

  • HTML & XHTML Tag Quick Reference (PDF) -- In this cheat sheet, you'll find commonly used tags and information about the proper use of XHTML.

  • HTML Character Entities -- Here you'll find a list of the assigned character codes in HTML, with an example of how they are displayed, and a description.

  • HTML Special Character Reference -- This HTML 4 character reference table explains how to enter special characters that can't be entered through a single key by using the associated numeric character reference code or the character entity reference code.

  • HTML Special Entity Codes -- This Web page contains lists of common special entity codes needed in HTML to generate special characters such as ñ, ¢, ÷. Full instructions are in the "Using the Codes" section followed by lists organized by character type.

  • HTML/XHTML Character References -- This page offers a big table with code for rendering special characters including non-English letters, mathematical symbols and more.

  • Server Side Includes (SSIs) (PDF) -- Explain That! provides a guide to SSIs, which are directives placed in an HTML document for processing before a document is served to a viewer.

  • Special ASCII HTML Character Codes -- This list includes HTML for many ASCII symbols used on Web pages. The first section includes the first 255 character codes and their related HTML codes. Then, at the bottom you'll find some other symbols and the HTML codes to create them.

  • Special ASCII characters and how to type them -- This table denotes symbols that aren't found on keyboards but are available by by activating the keyboard NUM LOCK function, pressing the ALT key, and entering certain numbers in the numeric keypad.

  • W3C DOM -- W3C provides W3C DOM (Document Object Model) interfaces, all in one page.

  • XHTML Character Entity Reference -- This page contains the 252 allowed entities in HTML 4 and XHTML 1.0, as outlined in section 24 of the official W3C HTML 4 specifications. It also includes an explanation of how to use the reference.

We've got lots more! Check out the full collection of  Our Favorite Cheat Sheets for fast help on a wide range of IT subjects, including related subjects like programming, blogging, browser shortcuts, and search engine optimization.

This was last updated in February 2010

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

  • security

    Security, in information technology (IT), is the defense of digital information and IT assets against internal and external, ...

  • insider threat

    An insider threat is a malicious hacker (also called a cracker or a black hat) who is an employee or officer of a business, ...

SearchHealthIT

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

  • HIPAA business associate agreement (BAA)

    Under the U.S. Health Insurance Portability and Accountability Act of 1996, a HIPAA business associate agreement (BAA) is a ...

SearchDisasterRecovery

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

  • fault-tolerant

    Systems with integrated fault tolerance are designed to withstand multiple hardware failures to ensure continuous availability.

SearchStorage

  • data deduplication

    Deduplication retains one unique data instance to reduce storage and bandwidth consumed by remote backups, replication and ...

  • byte

    In most computer systems, a byte is a unit of data that is eight binary digits long. Bytes are often used to represent a ...

  • Secure Digital card (SD card)

    SD cards use flash memory to provide nonvolatile storage. They are more rugged than traditional storage media and are used in ...

SearchSolidStateStorage

  • flash file system

    Flash file systems are designed specifically for memory devices. A well-designed flash device and flash file system ensure ...

  • IOPS (input/output operations per second)

    IOPS measures the maximum number of reads and writes to non-contiguous storage. It is not an actual benchmark since vendor ...

  • eMMC (embedded MultiMediaCard)

    An embedded MultiMediaCard (eMMC) is a small storage device made up of NAND flash memory and a simple storage controller.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close