


Example analysis of using reverse insertion method for DOM tree operation in jQuery_jquery
The example in this article describes the reverse insertion method of DOM tree operation in jQuery. Share it with everyone for your reference. The specific analysis is as follows:
Use reverse insertion method
Here we first insert the created content in front of the element, and then insert the same element into another position in the document. Generally, when manipulating elements in jQuery, it's more concise and efficient to use the concatenation method. But we have no way to do this now, because this is the target of .insertBefore() and the content of .appendTo(). At this time, using the reverse insertion method can help us solve the problem.
Insertion methods like .insertBefore() and .appendTo() generally have a corresponding reverse method. The reverse method also performs the same operation, but the "target" and "content" are reversed. For example:
Hello
').appendTo(' #container');The result is the same as the following code:
Hello p>');
Below we will use .before() instead of .insertBefore() to reconstruct the code, see the following code:
var $notes = $('
.insertBefore('#footer');
$('span.footnote').each(function(index) {
$(this)
.before('' (index 1) '')
.appendTo($notes)
.wrap('');
});
});
Insert method callback
The reverse insertion method can accept a function as a parameter, similar to the .attr() and .css() methods. The function passed in will be called for each target element and return the inserted HTML string. This technique can actually be used here, but since it requires repeating the same operation for each footnote, it is clearer to use an .each() method.
Now, we can consider the final step: creating links to matching footnotes at corresponding locations in the text and links in footnotes to locations in the text. To do this, each footnote requires four tags: two links, one in the text and one in the footnote; and two id attributes. Because in this way, the parameters passed to the .before() method will become complicated, so it is necessary to use a new method of creating strings here.
In the above code, we use the operator to concatenate strings. Although there is no problem using the operator,
If you have too many strings to concatenate, it will look messy. So, we use the .join() method of the array here to build a larger array. In other words, the following two lines of code have the same result.
var str = ['a', 'b', 'c'].join('');
Although this example requires entering more characters, using the .join() method can avoid confusion caused by too many strings to be spliced. Let's take a look at the sample code again. The following code is the process of using .join() to create a string.
var $notes = $('
.before([
'', index 1,
''
].join(''))
.appendTo($notes)
.wrap('');
});
});
Note that since each element of the array will perform operations separately, there is no need to put index 1 in parentheses. Using this technique, you can add a link to the bottom of the page and a unique id value for the footer tag. At the same time, in the following method, the corresponding id attribute must also be added to the
var $notes = $('
.before([
'',
'', index 1,
''
].join(''))
.appendTo($notes)
.wrap('');
});
});
With these tags added, each footnote tag will have a link to the corresponding footnote at the bottom of the page. All that's left is to create a link to its context in the footnote. To do this, you can use .append(), the reverse method of .appendTo(), see the following code:
var $notes = $(' '"id="context-', index 1,
'"class = "context__>',
'', index 1,
''
].join(''))
.appendTo($notes)
.append([
' (');
});
});
Note that the href here points to the id in the footnote tag. In the running results, you can see a footnote containing the new link.
I hope this article will be helpful to everyone’s jQuery programming.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Tomato Novel is a very popular novel reading software. We often have new novels and comics to read in Tomato Novel. Every novel and comic is very interesting. Many friends also want to write novels. Earn pocket money and edit the content of the novel you want to write into text. So how do we write the novel in it? My friends don’t know, so let’s go to this site together. Let’s take some time to look at an introduction to how to write a novel. Share the Tomato novel tutorial on how to write a novel. 1. First open the Tomato free novel app on your mobile phone and click on Personal Center - Writer Center. 2. Jump to the Tomato Writer Assistant page - click on Create a new book at the end of the novel.

Colorful motherboards enjoy high popularity and market share in the Chinese domestic market, but some users of Colorful motherboards still don’t know how to enter the bios for settings? In response to this situation, the editor has specially brought you two methods to enter the colorful motherboard bios. Come and try it! Method 1: Use the U disk startup shortcut key to directly enter the U disk installation system. The shortcut key for the Colorful motherboard to start the U disk with one click is ESC or F11. First, use Black Shark Installation Master to create a Black Shark U disk boot disk, and then turn on the computer. When you see the startup screen, continuously press the ESC or F11 key on the keyboard to enter a window for sequential selection of startup items. Move the cursor to the place where "USB" is displayed, and then

Unfortunately, people often delete certain contacts accidentally for some reasons. WeChat is a widely used social software. To help users solve this problem, this article will introduce how to retrieve deleted contacts in a simple way. 1. Understand the WeChat contact deletion mechanism. This provides us with the possibility to retrieve deleted contacts. The contact deletion mechanism in WeChat removes them from the address book, but does not delete them completely. 2. Use WeChat’s built-in “Contact Book Recovery” function. WeChat provides “Contact Book Recovery” to save time and energy. Users can quickly retrieve previously deleted contacts through this function. 3. Enter the WeChat settings page and click the lower right corner, open the WeChat application "Me" and click the settings icon in the upper right corner to enter the settings page.

Setting font size has become an important personalization requirement as mobile phones become an important tool in people's daily lives. In order to meet the needs of different users, this article will introduce how to improve the mobile phone use experience and adjust the font size of the mobile phone through simple operations. Why do you need to adjust the font size of your mobile phone - Adjusting the font size can make the text clearer and easier to read - Suitable for the reading needs of users of different ages - Convenient for users with poor vision to use the font size setting function of the mobile phone system - How to enter the system settings interface - In Find and enter the "Display" option in the settings interface - find the "Font Size" option and adjust it. Adjust the font size with a third-party application - download and install an application that supports font size adjustment - open the application and enter the relevant settings interface - according to the individual

Mobile games have become an integral part of people's lives with the development of technology. It has attracted the attention of many players with its cute dragon egg image and interesting hatching process, and one of the games that has attracted much attention is the mobile version of Dragon Egg. To help players better cultivate and grow their own dragons in the game, this article will introduce to you how to hatch dragon eggs in the mobile version. 1. Choose the appropriate type of dragon egg. Players need to carefully choose the type of dragon egg that they like and suit themselves, based on the different types of dragon egg attributes and abilities provided in the game. 2. Upgrade the level of the incubation machine. Players need to improve the level of the incubation machine by completing tasks and collecting props. The level of the incubation machine determines the hatching speed and hatching success rate. 3. Collect the resources required for hatching. Players need to be in the game

In today's society, mobile phones have become an indispensable part of our lives. As an important tool for our daily communication, work, and life, WeChat is often used. However, it may be necessary to separate two WeChat accounts when handling different transactions, which requires the mobile phone to support logging in to two WeChat accounts at the same time. As a well-known domestic brand, Huawei mobile phones are used by many people. So what is the method to open two WeChat accounts on Huawei mobile phones? Let’s reveal the secret of this method. First of all, you need to use two WeChat accounts at the same time on your Huawei mobile phone. The easiest way is to

LinuxDeploy operating steps and precautions LinuxDeploy is a powerful tool that can help users quickly deploy various Linux distributions on Android devices, allowing users to experience a complete Linux system on their mobile devices. This article will introduce the operating steps and precautions of LinuxDeploy in detail, and provide specific code examples to help readers better use this tool. Operation steps: Install LinuxDeploy: First, install

The difference between Go language methods and functions lies in their association with structures: methods are associated with structures and are used to operate structure data or methods; functions are independent of types and are used to perform general operations.
