当前位置:网站首页>Text组件新增内容通过tag_config设置前景色、背景色
Text组件新增内容通过tag_config设置前景色、背景色
2022-07-05 22:05:00 【Moxianzhe】
Text组件新增内容时,可以通过tag_config给特定的字符串设定前景色、背景色等属性。
self.text1.tag_config('red',foreground = 'red',background = 'yellow') #消息列表分区中创建标签,ys2样式2的前景色为red
self.text1.insert(END,str(msg) + '\n','red')
边栏推荐
- 微服务链路风险分析
- Serializability of concurrent scheduling
- Huawei fast game failed to call the login interface, and returned error code -1
- 如何开发引入小程序插件
- Codeforces 12D Ball 树形阵列模拟3排序元素
- 如何開發引入小程序插件
- Performance monitoring of database tuning solutions
- 资深电感厂家告诉你电感什么情况会有噪音电感噪音是比较常见的一种电感故障情况,如果使用的电感出现了噪音大家也不用着急,只需要准确查找分析出什么何原因,其实还是有具体的方法来解决的。作为一家拥有18年品牌
- Form artifact
- AD637使用笔记
猜你喜欢
Overview of database recovery
Official clarification statement of Jihu company
A number of ventilator giants' products have been recalled recently, and the ventilator market is still in incremental competition
K210 learning notes (IV) k210 runs multiple models at the same time
Lightweight dynamic monitorable thread pool based on configuration center - dynamictp
Advantages and disadvantages of the "Chris Richardson microservice series" microservice architecture
Installation of VMware Workstation
Implementation technology of recovery
database mirroring
Decorator learning 01
随机推荐
SecureCRT使用提示
PyGame practical project: write Snake games with 300 lines of code
阿龙的感悟
极狐公司官方澄清声明
让开发效率提升的跨端方案
Recovery technology with checkpoints
Matlab | app designer · I used Matlab to make a real-time editor of latex formula
初级软件测试必问面试题
华为游戏多媒体调用切换房间方法出现异常Internal system error. Reason:90000017
Official clarification statement of Jihu company
华为云ModelArts文本分类–外卖评论
Serializability of concurrent scheduling
The statistics of leetcode simple question is the public string that has appeared once
Alternating merging strings of leetcode simple questions
MMAP learning
Implementation technology of recovery
Oracle checkpoint queue - Analysis of the principle of instance crash recovery
从零开始实现lmax-Disruptor队列(四)多线程生产者MultiProducerSequencer原理解析
CA certificate trampled pit
How to view Apache log4j 2 remote code execution vulnerability?