notebook.css.small 1.07 KiB
/*
https://github.com/CamDavidsonPilon/Probabilistic-Programming-and-Bayesian-Methods-for-Hackers
*/
@font-face {
font-family: "Computer Modern";
src: url('http://mirrors.ctan.org/fonts/cm-unicode/fonts/otf/cmunss.otf');
}
div.cell{
/*width:800px;
margin-left:16% !important;*/
margin-right:auto;
}
h1 {
font-family: Helvetica, serif;
}
h4{
margin-top:12px;
margin-bottom: 3px;
}
div.text_cell_render{
font-family: Computer Modern, "Helvetica Neue", Arial, Helvetica, Geneva, sans-serif;
line-height: 145%;
font-size: 130%;
/*width:800px;*/
margin-left:auto;
margin-right:auto;
}
.CodeMirror{
font-family: "Source Code Pro", source-code-pro,Consolas, monospace;
}
.prompt{
display: None;
}
.text_cell_render .exercise {
font-weight: 300;
/*font-size: 22pt;*/
color: #4057A1;
font-style: italic;
/*margin-bottom: .5em;
margin-top: 0.5em;
display: block;*/
}
.text_cell_render .example {
font-weight: 300;
color: #40A157;
font-style: italic;
}
.warning{
color: rgb( 240, 20, 20 )
}