CIW V5 Site Designer

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bcartwri
B
Bcartwri
Community Contributor
Quizzes Created: 1 | Total Attempts: 271
| Attempts: 271
SettingsSettings
Please wait...
  • 1/139 Questions

    Jared is creating an interactive Web site that is expected to respond to heavy traffic. He needs to request new hardware in order to build a staging server. What requirement of the staging server should he be aware of when ordering the new hardware?

    • The staging server should have the same hardware and software configuration as the production server.
    • The staging server should have a different operating system from that of the production server for flexibility during testing.
    • The staging server should have a slower processor and less RAM than the production server because it is just a test server.
    • The staging server should have more RAM and a faster processor than the production server because testing is more intensive than production use.
Please wait...
Web Design Quizzes & Trivia
About This Quiz

The CIW v5 Site Designer quiz assesses skills in web design and development, focusing on image manipulation, server configuration, and W3C standards compliance. It prepares learners for practical challenges in designing and maintaining interactive, high-traffic websites.


Quiz Preview

  • 2. 

    Kellee wants to determine which areas of her company's Web site attract visitors, and the frequency with which those areas are visited. Which of the following is the best way for her to determine these facts?

    • Monitor network traffic during peak hours.

    • Place a hit counter on each page of the Web site.

    • Analyze the Web site server logs to measure page access.

    • Call users and ask them which sections of the site they visit often.

    Correct Answer
    A. Analyze the Web site server logs to measure page access.
    Explanation
    Analyzing the website server logs is the best way for Kellee to determine which areas of her company's website attract visitors and the frequency of those visits. Server logs record all the requests made to the website, including the specific pages accessed and the time of access. By analyzing these logs, Kellee can gather data on the popularity of different areas of the website and the frequency of visits, allowing her to make informed decisions about improving and optimizing the website's content and layout. Monitoring network traffic, using hit counters, or asking users directly would not provide as comprehensive and accurate information as analyzing the server logs.

    Rate this question:

  • 3. 

    Which of the following would typically be found in the contents of an external style sheet?

    • P [margin: 1in]

    • P (margin: 1in)

    • P { margin: 1in }

    Correct Answer
    A. P { margin: 1in }
    Explanation
    The correct answer is "P { margin: 1in }". This is the correct syntax for defining a CSS rule in an external style sheet. The "P" selector selects all paragraph elements, and the "margin: 1in" property sets the margin of the paragraphs to 1 inch. An external style sheet is a separate file that contains CSS rules and is linked to an HTML document using the tag. This allows for the separation of style and content, making it easier to maintain and update the styles across multiple pages.

    Rate this question:

  • 4. 

    Jason needs to create a table with four columns and six rows. Which of the following attributes must he include in the <td> tag to allow the first cell to span across the entire width of the table?

    • Colspan="4"

    • Colspan="6"

    • Rowspan="6"

    • Width="100%"

    Correct Answer
    A. Colspan="4"
    Explanation
    To allow the first cell to span across the entire width of the table, Jason must include the attribute "colspan" in the tag. The value of "colspan" determines how many columns the cell should span. In this case, since the table has four columns, the correct value for "colspan" is "4". This will make the first cell occupy all four columns and cover the entire width of the table.

    Rate this question:

  • 5. 

    You have been asked to transfer print copy to a Web page. Which of the following is a commonly accepted rule concerning white space in this situation?

    • A Web page should contain less than 10 percent white space at any time.

    • A Web page should contain more than 10 percent white space, but no more than 20 percent.

    • A Web page should contain approximately 50 percent less text than a printed page containing the same information.

    • A Web page should contain approximately 20 percent less text than a printed page containing the same information.

    Correct Answer
    A. A Web page should contain approximately 50 percent less text than a printed page containing the same information.
    Explanation
    The correct answer is "A Web page should contain approximately 50 percent less text than a printed page containing the same information." This is because reading on a screen is generally more difficult and tiring for the eyes compared to reading from a printed page. Therefore, it is recommended to have less text on a web page to make it easier for users to read and navigate.

    Rate this question:

  • 6. 

    Which of the following strategies is best for implementing bulk e-mailing to customers?

    • Buy an e-mail list from a vendor that sells a similar product.

    • Give customers the option to receive or to stop receiving bulk e-mail.

    • Send e-mail messages to all customer e-mail addresses collected at the time of purchase.

    • Generate a list of e-mail addresses from a directory listing of people who work in the same field as your company.

    Correct Answer
    A. Give customers the option to receive or to stop receiving bulk e-mail.
    Explanation
    The best strategy for implementing bulk e-mailing to customers is to give customers the option to receive or stop receiving bulk e-mail. This approach ensures that customers have control over whether they want to receive promotional e-mails or not, which helps in building a positive customer relationship. It also complies with privacy regulations and avoids the risk of spamming customers who may not be interested in receiving bulk e-mails.

    Rate this question:

  • 7. 

    You are using a style sheet. Which of the following examples of code are best suited for crossplatform design?

    • Font-family: bold, italics;

    • Font-family=monotype, courier

    • Font-family: Impact, Verdana, Geneva;

    • Font-family: Helvetica, Arial, sans-serif;

    Correct Answer
    A. Font-family: Helvetica, Arial, sans-serif;
    Explanation
    The code "font-family: Helvetica, Arial, sans-serif;" is best suited for cross-platform design because it specifies a list of font families that are commonly available on different operating systems and devices. This ensures that the text will be displayed consistently across various platforms, as it will try to use the first font family in the list, and if not available, it will fall back to the next one, and so on. This approach increases the chances of the text being rendered correctly regardless of the user's device or operating system.

    Rate this question:

  • 8. 

    Which of the following is true of both SWF and SVG file formats?

    • Both can be streamed.

    • Both are open industry standards.

    • Both are W3C Recommendations.

    • Both describe two-dimensional vector graphics.

    Correct Answer
    A. Both describe two-dimensional vector graphics.
    Explanation
    Both SWF (Shockwave Flash) and SVG (Scalable Vector Graphics) file formats are used to describe two-dimensional vector graphics. SWF is a multimedia format used for creating animations and interactive content, while SVG is a XML-based vector image format that is widely supported by web browsers. Both formats allow for the creation of scalable graphics that can be resized without losing quality.

    Rate this question:

  • 9. 

    Susan is creating some additional images for her customer's Web site. One image will be used repeatedly on site pages. However, in order to support the site's topic-specific color scheme, she wants one shape in the image's background to be a different color on each page. What is the best way for Susan to accomplish this task?

    • Create the image using layers for its different components.

    • Create the image using series for its different components.

    • Create the image using pages for its different components.

    • Create the image using frames for its different components.

    Correct Answer
    A. Create the image using layers for its different components.
    Explanation
    By creating the image using layers, Susan can easily change the color of the specific shape in the background on each page. Layers allow for independent editing of different components of an image, making it the best option for achieving the desired result.

    Rate this question:

  • 10. 

    Consider the following code: <a href="http://www.ciwcertified.com"> <img src="ciw-logo.gif" width="231" height="84" border="0"/> </a> The preceding code seems to render properly in multiple Web browsers. However, it will not validate to W3C standards. Which of the following must be added?

    • The alt attribute

    • A linked style sheet

    • A closing </img> tag

    • An embedded style sheet

    Correct Answer
    A. The alt attribute
    Explanation
    The alt attribute must be added. The alt attribute is used to provide alternative text for an image in case it cannot be displayed. It is an important attribute for accessibility purposes and is required by W3C standards.

    Rate this question:

  • 11. 

    Both versions of GIF files support small file size, lossless compression and transparency. Which of the two GIF versions also supports animation and interlacing?

    • 87a

    • 87b

    • 89a

    • 89b

    Correct Answer
    A. 89a
    Explanation
    The correct answer is 89a because it is the only version of GIF that supports both animation and interlacing. The other versions, 87a and 87b, do not have these features.

    Rate this question:

  • 12. 

    What is another name for the staging server?

    • Live server

    • Production server

    • Redundant server

    • Development server

    Correct Answer
    A. Development server
    Explanation
    The staging server is commonly referred to as the development server. This server is used to test and validate changes made to a software or application before it is deployed to the live production environment. It allows developers to ensure that the changes work as intended and do not cause any issues or disruptions to the live system.

    Rate this question:

  • 13. 

    The best way to thwart a dictionary attack is by enforcing a:

    • Proxy server policy.

    • Strong password policy.

    • Restricted access policy.

    • Firewall configuration policy.

    Correct Answer
    A. Strong password policy.
    Explanation
    A dictionary attack is a type of cyber attack where an attacker tries to gain unauthorized access to a system by systematically trying all possible words or combinations of words from a dictionary. Enforcing a strong password policy can help thwart such attacks as it requires users to create passwords that are complex and not easily guessable. Strong passwords typically include a combination of uppercase and lowercase letters, numbers, and special characters, making it difficult for attackers to crack them using dictionary-based techniques.

    Rate this question:

  • 14. 

    Which of the following techniques helps stop a denial-of-service (DOS) attack in which an attacker has sent multiple ICMP or TCP packets to crash a Web server on the Internet?

    • Filtering traffic at the firewall

    • Changing passwords on a regular basis

    • Installing Apache server rather than Microsoft IIS

    • Placing the database and the Web server on separate systems

    Correct Answer
    A. Filtering traffic at the firewall
    Explanation
    Filtering traffic at the firewall helps stop a denial-of-service (DOS) attack by blocking or filtering out the malicious packets sent by the attacker. By configuring the firewall to only allow legitimate traffic to reach the web server, the excessive ICMP or TCP packets sent by the attacker can be blocked, preventing the server from crashing. This technique helps protect the server and ensures that only valid traffic is allowed to access the web server.

    Rate this question:

  • 15. 

    Which of the following Web site characteristics demonstrates the ability to present information dynamically from a knowledge base?

    • Interactivity

    • Static layout

    • Dynamic HTML

    • Database integration

    Correct Answer
    A. Database integration
    Explanation
    Database integration is the correct answer because it refers to the ability of a website to retrieve and display information dynamically from a knowledge base or database. This means that the website can pull and present information in real-time, allowing for a more interactive and personalized user experience. Interactivity, static layout, and dynamic HTML are not specifically related to pulling information from a knowledge base.

    Rate this question:

  • 16. 

    Which of the following is a standard use of cookies?

    • Capturing keystrokes

    • Scanning hard disk drives

    • Storing password information

    • Recording financial information

    Correct Answer
    A. Storing password information
    Explanation
    Cookies are small text files that are stored on a user's computer by a website. One of the standard uses of cookies is to store password information. When a user logs into a website, the website can store the user's login credentials in a cookie so that the user does not have to enter their password every time they visit the site. This allows for a more convenient and seamless user experience.

    Rate this question:

  • 17. 

    Jacob runs a Web site specializing in selling music from independent artists. Most of the site's customers want to know about unknown or new artists in the music industry whose work is available on Jacob's site. Site visitors have requested an easier way to learn about updates to the New Artists page. Which of the following will best meet visitors' needs?

    • Update the New Artists page more often.

    • Install an RSS feed for the New Artists page.

    • Install a search feature on the New Artists page.

    • Use a different font for each new entry on the New Artists page.

    Correct Answer
    A. Install an RSS feed for the New Artists page.
    Explanation
    Installing an RSS feed for the New Artists page will best meet the visitors' needs because it will provide an easier way for them to learn about updates to the page. RSS feeds allow users to subscribe to updates from a website and receive notifications whenever new content is added. By installing an RSS feed, visitors to Jacob's website can easily stay informed about new artists added to the site without having to manually check the page for updates. This will save them time and effort while also ensuring that they don't miss out on discovering new and unknown artists in the music industry.

    Rate this question:

  • 18. 

    Lisa needs to create a rollover image to act as her Web site's navigation buttons. What is the minimum number of images she must use to achieve a rollover effect?

    • One

    • Two

    • Three

    • Four

    Correct Answer
    A. Two
    Explanation
    To achieve a rollover effect, Lisa needs to use a minimum of two images. This is because a rollover effect typically involves two states of an image - one when the mouse is not hovering over it, and another when the mouse hovers over it. By using two images, Lisa can create the desired effect where the image changes when the mouse is hovered over it.

    Rate this question:

  • 19. 

    Denny is designing a Web site for his school's sporting events. This Web site will list event results for the school. When site visitors click a hyperlink for a specific event, a new page containing information about the sporting event will appear, including the teams involved the location of the event, scores, key plays and specific accomplishments by contestants. Which of the following should Denny do to build this site?

    • Use database integration.

    • Create static pages for each event.

    • Use one page and modify it after each event.

    • Copy and paste Web pages from other schools' sites.

    Correct Answer
    A. Use database integration.
    Explanation
    Denny should use database integration to build this site. This will allow him to store and retrieve information about each sporting event dynamically. By using a database, Denny can create a single page template and populate it with relevant information for each event. This approach is more efficient and scalable compared to creating static pages for each event or copying and pasting pages from other schools' sites. With database integration, Denny can easily update and modify the site after each event, ensuring that the information is always accurate and up to date.

    Rate this question:

  • 20. 

    In which of the following formats do graphic files support 24 bits of color information and work well with photographs?

    • GIF

    • SVG

    • BMP

    • JPEG

    Correct Answer
    A. JPEG
    Explanation
    JPEG is the correct answer because it is a commonly used format for graphic files that supports 24 bits of color information. It is particularly well-suited for photographs due to its ability to compress images without significant loss of quality. JPEG files can display millions of colors and are widely supported by various devices and software applications.

    Rate this question:

  • 21. 

    How many fonts are commonly used in Web page design?

    • Two

    • Four

    • Six

    • Eight

    Correct Answer
    A. Two
    Explanation
    In web page design, two fonts are commonly used. This is because using too many fonts can create a cluttered and unprofessional appearance. By limiting the number of fonts, designers can maintain consistency and readability across the website. Having a primary font for headings and a secondary font for body text is a common practice in web design.

    Rate this question:

  • 22. 

    Which of the following plug-ins would be used to view paper-based documents that cannot be easily re-created using XHTML?

    • Microsoft Fax Viewer

    • Word processor applications

    • Scalable Vector Graphics (SVG)

    • Portable Document Format (PDF)

    Correct Answer
    A. Portable Document Format (PDF)
    Explanation
    The Portable Document Format (PDF) would be used to view paper-based documents that cannot be easily re-created using XHTML. PDF files preserve the formatting and layout of the original document, making them ideal for viewing documents that have complex formatting, images, or special fonts. PDF files can be opened and viewed on various devices and operating systems, making them a widely accessible format for sharing and viewing documents.

    Rate this question:

  • 23. 

    You have been asked to create a page that retrieves information from a database. Which of the following is the first step in obtaining information from a database from a Web page?

    • Conduct a database query.

    • Create a connection to the database.

    • Create a recordset to hold the query results.

    • Put the results in a recordset to ensure that the database returns data properly.

    Correct Answer
    A. Create a connection to the database.
    Explanation
    The first step in obtaining information from a database from a web page is to create a connection to the database. This is necessary in order to establish a communication link between the web page and the database. Without a connection, the web page cannot retrieve any information from the database. Once the connection is established, further steps such as conducting a database query, creating a recordset to hold the query results, and putting the results in a recordset can be performed. However, creating a connection to the database is the initial and crucial step in the process.

    Rate this question:

  • 24. 

    Tom wants to display <li> list elements in a row. What should he add to his style sheet?

    • Li {layout:inline}

    • Li {display:inline}

    • Li {display:block}

    • Ul {display:inline}

    Correct Answer
    A. Li {display:inline}
    Explanation
    To display the list elements in a row, Tom should add the CSS rule "li {display:inline}" to his style sheet. This rule sets the display property of the "li" elements to "inline", which allows them to be displayed horizontally in a row.

    Rate this question:

  • 25. 

    Which of the following is the common name for the practice hackers use to trick people into revealing sensitive information?

    • Social engineering

    • Identity exploitation

    • Information probing

    • Intellectual deception

    Correct Answer
    A. Social engineering
    Explanation
    Social engineering is the common name for the practice hackers use to trick people into revealing sensitive information. This technique involves manipulating individuals through psychological manipulation or deception to gain access to confidential data. It often involves tactics such as impersonation, phishing emails, or phone scams to deceive individuals into providing personal information or access to secure systems.

    Rate this question:

  • 26. 

    What is the process for following every link on your site to ensure that it goes to the correct location?

    • Site validation

    • Site optimization

    • Manual link checking

    • Manual link optimization

    Correct Answer
    A. Manual link checking
    Explanation
    Manual link checking is the process of manually reviewing each link on a website to ensure that it goes to the correct location. This involves clicking on each link and verifying that it leads to the intended destination. It is important to manually check links as automated tools may not be able to detect certain issues such as broken links or incorrect redirects. Manual link checking helps to ensure the accuracy and functionality of all links on a website.

    Rate this question:

  • 27. 

    You are working for a financial services company. The company has a Web site that allows its customers to review their statements online. Your Web site uses the Document Object Model (DOM), ActiveX, JavaScript and Java. Which of these technologies is most likely to cause customers problems with their browsers when they try to access information?

    • Java

    • ActiveX

    • JavaScript

    • Document Object Model (DOM)

    Correct Answer
    A. ActiveX
    Explanation
    ActiveX is most likely to cause customers problems with their browsers when they try to access information. ActiveX is a technology developed by Microsoft that allows interactive content to be displayed on web pages. However, it is only supported by Internet Explorer browsers and is not compatible with other browsers such as Chrome or Firefox. This can cause compatibility issues for customers who use different browsers, leading to problems accessing the information on the website.

    Rate this question:

  • 28. 

    You have included a check box on a registration Web page that users accessing your site can select to receive periodic bulk e-mail from your company. What must you include in your bulk email messages to your subscribers?

    • An opt-out option to discontinue receiving the messages

    • An opt-in option to receive similar messages from related companies

    • A section in which recipients can provide feedback about the company

    • Coupons for product specials that can be printed and redeemed on future purchases

    Correct Answer
    A. An opt-out option to discontinue receiving the messages
    Explanation
    In order to comply with email marketing regulations and best practices, it is necessary to include an opt-out option in bulk email messages. This allows subscribers to easily and conveniently unsubscribe from receiving further messages if they no longer wish to receive them. It is important to give recipients the choice and control over their email preferences, and the opt-out option ensures that their wishes are respected.

    Rate this question:

  • 29. 

    Marcus is designing a site and wants to use a ready-made template from a Web development application. One consequence of using predesigned templates is that:

    • They infringe on copyrights.

    • They interfere with the design process.

    • They are unlikely to fulfill all design specifications.

    • They contain business logic that cannot be modified.

    Correct Answer
    A. They are unlikely to fulfill all design specifications.
    Explanation
    Using predesigned templates in web development applications may result in the templates not fully meeting all design specifications. This is because the templates are pre-made and may not perfectly align with the specific requirements and preferences of Marcus's site. While templates can provide a good starting point and save time, they often require customization and adjustments to fully match the desired design and functionality.

    Rate this question:

  • 30. 

    You are designing a medical research site. The content will include medical terminology. When is it acceptable to use industry jargon?

    • When a casual tone is appropriate

    • When the audience will understand the terms

    • When the Web designer understands the jargon

    • When you want to demonstrate the superiority of your site

    Correct Answer
    A. When the audience will understand the terms
    Explanation
    It is acceptable to use industry jargon when the audience will understand the terms. This ensures effective communication and avoids confusion among the readers. Using medical terminology in a medical research site is justified as it caters to a specific audience who are knowledgeable in the field. The use of jargon helps to convey information accurately and efficiently, enhancing the credibility and professionalism of the site.

    Rate this question:

  • 31. 

    You are responsible for administering a Web site for a college program designed to get students to express their perspectives on topical issues. Your supervisor has been asked to ensure that all Web sites for the college are Conformance Level "Triple-A," according to Web Accessibility Initiative (WAI) standards. Which of the following will have to be eliminated from your site?

    • All XHTML tables within the site

    • All HTML content written to 4.01 specifications

    • All audio content without a text-based alternative

    • All visual content without an accessible audio alternative

    Correct Answer
    A. All audio content without a text-based alternative
    Explanation
    All audio content without a text-based alternative will have to be eliminated from the site. This is because Conformance Level "Triple-A" according to Web Accessibility Initiative (WAI) standards requires that all content on the website is accessible to individuals with disabilities. Without a text-based alternative, individuals who are deaf or hard of hearing will not be able to access the audio content. Therefore, it is necessary to remove this content to ensure compliance with accessibility standards.

    Rate this question:

  • 32. 

    Ben has decided to use a MySQL database on a Linux system to store data for his business-tobusiness (B2B) Web site. Which language can he use to request the data?

    • PHP

    • CSS

    • VRML

    • XHTML

    Correct Answer
    A. PHP
    Explanation
    Ben can use PHP to request the data from the MySQL database on his Linux system. PHP is a popular server-side scripting language that is commonly used for web development. It has built-in functions and libraries that allow developers to interact with databases, such as MySQL, and retrieve data. With PHP, Ben can write code to connect to the MySQL database, execute queries, and retrieve the desired data for his business-to-business (B2B) website. CSS, VRML, and XHTML are not programming languages that are typically used for database interaction.

    Rate this question:

  • 33. 

    Certain Web sites are known to be successful. What do these successful Web sites have in common?

    • They all sell books and clothing.

    • They have created a unique metaphor.

    • They focus on fulfilling unmet needs of Web site consumers.

    • They have published a well-documented mind map of their Web site.

    Correct Answer
    A. They focus on fulfilling unmet needs of Web site consumers.
    Explanation
    Successful websites have a common characteristic of focusing on fulfilling unmet needs of their consumers. This means that these websites are able to identify what their target audience wants or lacks, and they provide products, services, or information that cater to those needs. By doing so, they are able to attract and retain a loyal customer base, leading to their success. This approach ensures that the website is relevant and valuable to its users, increasing the chances of its success in the competitive online market.

    Rate this question:

  • 34. 

    Consider the following code: <film> <year>1942</year> <title>Casablanca</title> <director>Michael Curtiz</director> </film> What kind of code is shown in the preceding example?

    • XML

    • HTML

    • VBScript

    • Activescript

    Correct Answer
    A. XML
    Explanation
    The code shown in the example is XML. XML (Extensible Markup Language) is a markup language that is designed to store and transport data. In the given code, the information about a film is enclosed within XML tags, such as , , , and . This structure is characteristic of XML, where data is organized using tags and elements. HTML, VBScript, and activescript are not applicable in this context, as they are different programming languages or markup languages.

    Rate this question:

  • 35. 

    Kara is using FrontPage 2003 to build a new Web site. She has just finished creating a template page that contains the layout, fonts and menu items for all other pages in the site, as well as an editable region for each page's individual content. Other members of Kara's design team are using Dreamweaver to also work on the site. What should Kara name this file?

    • Ktem.dwt

    • KTem.htm

    • KarasTemplate.asp

    • KarasTemplate.tem

    Correct Answer
    A. Ktem.dwt
    Explanation
    Kara should name this file "Ktem.dwt" because the file is a template page that contains the layout, fonts, and menu items for all other pages in the site. The ".dwt" extension is commonly used for Dreamweaver template files, which allows other members of Kara's design team who are using Dreamweaver to also work on the site. Naming the file "Ktem.dwt" helps to indicate that it is a template file and is specific to Kara's project.

    Rate this question:

  • 36. 

    Hal has saved a file as a template in Dreamweaver. If he has not already done so, Dreamweaver will prompt him to add:

    • A content region.

    • An editable region.

    • A CSS style sheet.

    • A tag to hold content.

    Correct Answer
    A. An editable region.
    Explanation
    When Hal saves a file as a template in Dreamweaver, if he has not already done so, Dreamweaver will prompt him to add an editable region. An editable region allows the user to modify specific areas of the template while keeping the rest of the content consistent. This feature is useful for creating templates that can be easily customized without affecting the overall structure and design.

    Rate this question:

  • 37. 

    Which of the following is directly exploited by a brute-force attack?

    • The Web server's available bandwidth

    • The Web server's authentication mechanisms

    • The TCP/IP software installed on the Web server

    • The log file mechanisms that exist on the Web server

    Correct Answer
    A. The Web server's authentication mechanisms
    Explanation
    A brute-force attack is a method used by hackers to gain unauthorized access to a system by systematically trying all possible combinations of passwords or encryption keys until the correct one is found. In this case, the correct answer is "The Web server's authentication mechanisms" because brute-force attacks target the authentication mechanisms of a web server, such as login forms or password authentication systems, in order to gain access to restricted areas or sensitive information. By repeatedly trying different combinations of usernames and passwords, the attacker hopes to find the correct credentials and bypass the authentication process.

    Rate this question:

  • 38. 

    David has designed a home page for an e-commerce Web site. At the left side of the page is a large block of text with product names and prices. The right side features a detailed 100-pixel-by-200-pixel photo of a sample product. David decides that his page appears to be balanced. How did the two elements balance each other?

    • By size

    • By color

    • By value

    • By shape

    Correct Answer
    A. By shape
    Explanation
    The two elements balance each other by shape. The large block of text on the left side is balanced by the detailed photo of a sample product on the right side. The shape of the text block and the shape of the photo create a symmetrical and visually pleasing composition on the page.

    Rate this question:

  • 39. 

    Diamond is the new Web designer for Comet Designs. She has been asked to design the company Web site for its new corporate customer. She knows the following facts: The company distributes party goods. The site will have wide distribution. The site users are technologically unsophisticated. What guidelines will help Diamond design an appropriate new site for the audience?

    • Site users prefer Flash streaming media plug-ins.

    • Most site users do not use plug-ins in their browsers.

    • A resolution of 800x600 pixels is the minimum design standard.

    • Most site users still have modem connections with speeds of 56 Kbps.

    Correct Answer
    A. A resolution of 800x600 pixels is the minimum design standard.
    Explanation
    Diamond should design the new site with a minimum resolution of 800x600 pixels. This is because the site users are technologically unsophisticated and most likely have older devices with lower screen resolutions. By designing the site to accommodate this minimum standard, Diamond ensures that the site will be accessible and user-friendly for the target audience.

    Rate this question:

  • 40. 

    Which of the following is used in Secure XML to verify the origin of a message?

    • Triple DES

    • A digital signature

    • Symmetric-key encryption

    • An open encryption standard known as Gnu Privacy Guard

    Correct Answer
    A. A digital signature
    Explanation
    A digital signature is used in Secure XML to verify the origin of a message. Digital signatures provide a way to ensure the authenticity and integrity of the message by using a cryptographic algorithm to generate a unique signature for the message. This signature can be verified by the recipient using the sender's public key, ensuring that the message has not been tampered with and originated from the claimed sender. Triple DES, symmetric-key encryption, and Gnu Privacy Guard are encryption methods, but they do not specifically address message origin verification like a digital signature does.

    Rate this question:

  • 41. 

    Which of the following languages is used to update a table in a relational database?

    • C#

    • SQL

    • Java

    • PHP

    Correct Answer
    A. SQL
    Explanation
    SQL is the correct answer because it is a language specifically designed for managing and manipulating data in relational databases. It allows users to update, insert, delete, and retrieve data from tables. C#, Java, and PHP are programming languages that can be used to build applications, but they are not specifically designed for updating tables in a relational database.

    Rate this question:

  • 42. 

    You have decided that using a pop-up window is appropriate in a particular situation. Which of the following can you use to ensure that the window is displayed in the proper location?

    • CSS and XHTML

    • XHTML and pseudo-code

    • JavaScript and pseudo-code

    • JavaScript and the Document Object Model (DOM)

    Correct Answer
    A. JavaScript and the Document Object Model (DOM)
    Explanation
    To ensure that a pop-up window is displayed in the proper location, JavaScript and the Document Object Model (DOM) can be used. JavaScript can be used to create and manipulate elements on a webpage, while the DOM provides a way to access and modify the structure and content of a webpage. By using JavaScript and the DOM, you can dynamically position the pop-up window based on specific coordinates or relative to other elements on the page, ensuring that it is displayed in the desired location.

    Rate this question:

  • 43. 

    Your site development team has created a Web site, and you want to test its accessibility. Which of the following do you need to conduct the test?

    • A test pool of very unskilled users

    • A test pool of at least five or six typical users

    • A test pool of at least six members of the Web team

    • A test pool of fewer than five moderately skilled users

    Correct Answer
    A. A test pool of at least five or six typical users
    Explanation
    To conduct a test on the accessibility of a website, it is necessary to have a test pool of at least five or six typical users. These users represent the average audience who will be accessing the website, and their feedback and experience will provide valuable insights into the website's accessibility. By including a diverse group of users, the test results will be more comprehensive and representative of the actual user base. A larger test pool also allows for a wider range of perspectives and ensures that any accessibility issues are identified and addressed effectively.

    Rate this question:

  • 44. 

    Bi-directional text is a function of CSS2. What is the importance of this function?

    • CSS2 determines the display of paged media.

    • The need for the browser proprietary tag is eliminated.

    • A Z-axis allows elements to be stacked on a page and displayed in either direction.

    • Some languages, such as Arabic, can cause documents to render with mixed directionality.

    Correct Answer
    A. Some languages, such as Arabic, can cause documents to render with mixed directionality.
  • 45. 

    The W3C has developed XHTML standards for the World Wide Web. These standards:

    • Allow proprietary software to run in other vendors' browsers.

    • Ensure consistent display in various browsers and platforms.

    • Define a language that incorporates data structures and internal logic.

    • allow markup elements to combine both structure and formatting in a single text file.

    Correct Answer
    A. Ensure consistent display in various browsers and platforms.
    Explanation
    The correct answer is "ensure consistent display in various browsers and platforms." This is because XHTML standards developed by the W3C (World Wide Web Consortium) are designed to provide a consistent display of web content across different browsers and platforms. By adhering to these standards, web developers can ensure that their websites are displayed correctly regardless of the browser or platform being used by the user. This helps to improve the user experience and ensures that the content is accessible to a wider audience.

    Rate this question:

  • 46. 

    What is the name for colors that create black when mixed together?

    • Radial

    • Additive

    • Subtractive

    • Transitional

    Correct Answer
    A. Subtractive
    Explanation
    Subtractive colors are the ones that create black when mixed together. This is because they absorb light and reflect very little, if any, back to our eyes. When all the colors in the subtractive color model (cyan, magenta, and yellow) are combined, they absorb all the light, resulting in the absence of color or black. Therefore, the correct answer is Subtractive.

    Rate this question:

  • 47. 

    Which of the following is one of the advantages that SWF (Flash) files bring to Web-based environments?

    • SWF files are compressed, so files download quickly.

    • SWF files use layers, so animation is linear and parallel.

    • SWF files use vector images, so files can be easily modified.

    • SWF files can stream images, so files can be uploaded quickly.

    Correct Answer
    A. SWF files are compressed, so files download quickly.
    Explanation
    SWF files are compressed, meaning that the file size is reduced, resulting in faster download times. This is advantageous in web-based environments as it allows for quicker loading of content, improving user experience. Compressed files also require less bandwidth, making it easier to stream and upload the files.

    Rate this question:

  • 48. 

    Marcos is writing a client-side JavaScript that asks the user to type a dollar amount that will be used to compute a loan payment amount. Which of the following methods can Marcos use to ask the user for input?

    • Alert(Please enter the loan amount.);

    • Msgbox(Please enter the loan amount.);

    • Prompt(Please enter the loan amount., );

    • Input(Please enter the loan amount., Loan Calculation);

    Correct Answer
    A. Prompt(Please enter the loan amount., );
    Explanation
    Marcos can use the prompt() method to ask the user for input. The prompt() method displays a dialog box with a message and an input field for the user to enter a response. In this case, Marcos wants the user to enter the loan amount, so using prompt("Please enter the loan amount.", ) will display a dialog box with the message "Please enter the loan amount." and wait for the user to input a value.

    Rate this question:

  • 49. 

    Consuela is updating her company's Web site. She wants to add an image that is 1,414 pixels by 724 pixels. Her site audience generally uses a monitor resolution of 1024x768. Using Fireworks, how can she adjust the image to fit the users' monitors?

    • Resample the image to adjust the print size.

    • Resample the image to increase the resolution.

    • Resample the image to decrease the color depth.

    • Resample the image to decrease the pixel dimensions.

    Correct Answer
    A. Resample the image to decrease the pixel dimensions.
    Explanation
    Resampling the image to decrease the pixel dimensions will adjust the image to fit the users' monitors. By reducing the pixel dimensions of the image to match the monitor resolution of 1024x768, Consuela can ensure that the image will be displayed properly on her site audience's monitors without any distortion or cropping.

    Rate this question:

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 25, 2011
    Quiz Created by
    Bcartwri
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.