Web Designing Vocabulary Test! Trivia Quiz

Reviewed by Godwin Iheuwa
Godwin Iheuwa, MS, Computer Science |
Computer Expert
Review Board Member
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.
, MS, Computer Science
Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Panasukk
P
Panasukk
Community Contributor
Quizzes Created: 6 | Total Attempts: 4,283
Questions: 13 | Attempts: 3,277

SettingsSettingsSettings
Web Designing Vocabulary Test! Trivia Quiz - Quiz


Do you know anything about web design? There are two significant jobs involved in creating a website. These include the web designer and web developer, who often work directly together on a website. The web designers are accountable for the graphical aspect, including layout, coloring, and typography of web pages. Web designers will also have a working knowledge of mark-up languages such as HTML, and if you want to know more, complete this quiz.


Questions and Answers
  • 1. 

    Web Tracking

    • A.

      The unauthorized use or close imitation of the language and thoughts of another author and the representation of them as one's own original work.

    • B.

      Is the analysis of visitor behavior on a website.

    • C.

      A simple electronic connector consisting of a thin, stiff, bare wire intended to fit into a corresponding socket.

    • D.

      Is a single character.

    Correct Answer
    B. Is the analysis of visitor behavior on a website.
    Explanation
    The correct answer is "Is the analysis of visitor behavior on a website." This answer is supported by the fact that the term "Web Tracking" refers to the process of analyzing and monitoring the behavior of visitors on a website. It involves collecting data on various metrics such as page views, clicks, time spent on site, and conversion rates to gain insights into user behavior and improve the website's performance.

    Rate this question:

  • 2. 

    Cookie

    • A.

      A data file written to a hard drive by some websites contains information the site can use to track such things as passwords, login, registration or identification, user preferences, online shopping cart information, and lists of pages visited.

    • B.

      Not losing information when power is interrupted.

    • C.

      Coding used for internet language.

    • D.

      Is the fastest type of computer

    Correct Answer
    A. A data file written to a hard drive by some websites contains information the site can use to track such things as passwords, login, registration or identification, user preferences, online shopping cart information, and lists of pages visited.
    Explanation
    A cookie is a data file written to a hard drive by some websites. It contains information that the site can use to track various things such as passwords, login, registration or identification, user preferences, online shopping cart information, and lists of pages visited. Cookies allow websites to remember user information and provide a personalized browsing experience. They are commonly used for authentication, session management, and tracking user behavior on websites.

    Rate this question:

  • 3. 

    Advertising Spyware

    • A.

      A high-speed line or series of connections that forms a major pathway within a network.

    • B.

      An electronic device that receives data (input), processes data, stores data, and produces a result (output).

    • C.

      Pertaining to or dealing with morals or the principles of morality; pertaining to right and wrong in conduct.

    • D.

      Is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.

    Correct Answer
    D. Is a type of malware that can be installed on computers and collects little bits of information at a time about users without their knowledge.
    Explanation
    The correct answer explains that advertising spyware is a type of malware that secretly collects information about users without their knowledge. This means that when advertising spyware is installed on a computer, it operates covertly, gathering small pieces of data about the user's activities, preferences, and behavior without their consent. This information is then typically used for targeted advertising or other purposes without the user's awareness or permission.

    Rate this question:

  • 4. 

    Encryption

    • A.

      The actual machine—wires, transistors, and circuits

    • B.

      Is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

    • C.

      Pertaining to principles of rules, right and wrong

    • D.

      The maximum amount of data that can travel a communications path in a given time, usually measured in seconds.

    Correct Answer
    B. Is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
    Explanation
    The correct answer explains that encryption is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. Encryption is a security measure used to protect sensitive data from unauthorized access or interception. By using a key, the information is scrambled in a way that can only be deciphered by someone with the corresponding key. This ensures that even if the encrypted data is intercepted, it remains unreadable and secure.

    Rate this question:

  • 5. 

    Hot Spots

    • A.

      Address locator at the top of any web page.

    • B.

      Connects your computer to your ISP or online service over a regular telephone line.

    • C.

      A company or organization that provides access to the Internet through its servers, usually for a fee.

    • D.

      Highlights the image as a link

    Correct Answer
    C. A company or organization that provides access to the Internet through its servers, usually for a fee.
    Explanation
    Hot Spots refer to locations or areas where wireless internet access, known as Wi-Fi, is available. These areas are typically provided by companies or organizations that set up wireless routers or access points, allowing individuals to connect to the internet without the need for physical cables. Users can access the internet using Wi-Fi-enabled devices such as laptops, smartphones, or tablets within the range of these Hot Spots.

    Rate this question:

  • 6. 

    Crop tool

    • A.

      Cuts out background noise and highlights the image area you want to keep.

    • B.

      Allows people to interact with a computer and computer-controlled devices.

    • C.

      The software application that allows you to view Internet pages.

    • D.

      Is text, numbers, sound, images, or video.

    Correct Answer
    A. Cuts out background noise and highlights the image area you want to keep.
    Explanation
    The crop tool is a feature in image editing software that allows you to select and remove unwanted parts of an image, while keeping the desired area. It helps to eliminate background noise and focus on the specific portion of the image that you want to highlight or keep. This tool is commonly used in photography and graphic design to enhance the composition and overall appearance of an image.

    Rate this question:

  • 7. 

    Canvas

    • A.

      The computer receives data through an input device, processes the data, stores the data on a storage device, and produces output

    • B.

      Is a unit of measurement of information storage.

    • C.

      The area designated to your image.

    • D.

      A window you can open to adjust various aspects of your computer, such as the volume, fonts, desktop background, mouse speed, and clock.

    Correct Answer
    C. The area designated to your image.
  • 8. 

    Constrain Proportions

    • A.

      A key used to access commands through the keyboard rather than the menus.

    • B.

      Allows your image to contract or contain proportionately.

    • C.

      Used in various online communications, such as e-mail messages or postings to newsgroups or BBSs. It is a communication that finishes the message.

    • D.

      (Also called laptop computers) are small personal computers that contain the monitor with a built-in keyboard.

    Correct Answer
    B. Allows your image to contract or contain proportionately.
    Explanation
    The term "Constrain Proportions" refers to a feature or option that allows an image to be resized while maintaining its original proportions. This means that when the image is scaled down or up, its width and height will be adjusted proportionally, ensuring that the image does not become distorted or stretched. This feature is commonly found in image editing software and is useful when you want to resize an image without compromising its overall appearance.

    Rate this question:

  • 9. 

    Filters

    • A.

      The unique address name for an Internet site.

    • B.

      To save a file onto your computer from another source, like the Internet.

    • C.

      Allows you to manipulate an image or words to change the appearance.

    • D.

      A common method of networking computers in a Local Area Network (LAN)

    Correct Answer
    C. Allows you to manipulate an image or words to change the appearance.
    Explanation
    This answer is correct because it accurately describes what filters do. Filters are used to manipulate an image or words in order to change their appearance. This can include applying effects, adjusting colors, or adding text overlays, among other things. Filters are commonly used in graphic design and photo editing software to enhance or modify images.

    Rate this question:

  • 10. 

    Sharpen

    • A.

      Increases the look of your photo with crispness.

    • B.

      A computer network limited to the immediate area, usually the same building.

    • C.

      Generally is used by small to medium-size companies and can support a few users or hundreds of users. Most are referred to as network servers or application servers.

    • D.

      A software program that performs repetitive functions, such as indexing information on the Internet.

    Correct Answer
    A. Increases the look of your photo with crispness.
  • 11. 

    Unsharp Mask

    • A.

      Protocol that allows users to copy files between their local system and any system they can reach on the network

    • B.

      An integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

    • C.

      Generally can fit into the palm of your hand

    • D.

      Improve the clarity of scanned images without increasing resolution

    Correct Answer
    D. Improve the clarity of scanned images without increasing resolution
    Explanation
    Unsharp Mask is a technique used to enhance the clarity of scanned images without increasing the resolution. It works by increasing the contrast between adjacent pixels, thereby making the edges appear sharper and more defined. This is achieved by creating a blurred version of the original image and then subtracting it from the original, resulting in increased edge contrast. The unsharp mask filter is commonly used in image editing software to improve the overall sharpness and detail of scanned images.

    Rate this question:

  • 12. 

    Dimensions

    • A.

      A measurement of how fast data is transmitted. It is usually used to describe modem speeds or the speed of a digital connection.

    • B.

      Is a personal computer similar in size and thickness to a notepad

    • C.

      Determines the size of your image

    • D.

      A device for storing information in a fixed location within your computer.

    Correct Answer
    C. Determines the size of your image
    Explanation
    The explanation for the given correct answer is that dimensions determine the size of an image. In the context of digital images, dimensions refer to the width and height of the image in pixels or other units of measurement. By specifying the dimensions, you can control the size at which the image will be displayed or printed. Changing the dimensions can either increase or decrease the size of the image, affecting its visual appearance and file size.

    Rate this question:

  • 13. 

    Brightness/Contrast

    • A.

      Are aspects of color in the red, green, and blue (RGB) scheme. These terms are most often used in reference to the color of each pixel in a cathode ray tube (cathode ray tube) display.

    • B.

      The page on the Internet, which most often gives users access to the rest of the Web site. A site is a collection of pages.

    • C.

      The name given to any computer directly connected to the Internet. Host computers are usually associated with running computer networks, online services, or bulletin

    • D.

      A horizontal strip at the top of a window that shows the menus available in a program.

    Correct Answer
    A. Are aspects of color in the red, green, and blue (RGB) scheme. These terms are most often used in reference to the color of each pixel in a cathode ray tube (cathode ray tube) display.
Godwin Iheuwa |MS, Computer Science |
Computer Expert
Godwin is a proficient Database Administrator currently employed at MTN Nigeria. He holds as MS in Computer Science from the University of Bedfordshire, where he specialized in Agile Methodologies and Database Administration. He also earned a Bachelor's degree in Computer Science from the University of Port Harcourt. With expertise in SQL Server Integration Services (SSIS) and SQL Server Management Studio, Godwin's knowledge and experience enhance the authority of our quizzes, ensuring accuracy and relevance in the realm of computer science.

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 16, 2024
    Quiz Edited by
    ProProfs Editorial Team

    Expert Reviewed by
    Godwin Iheuwa
  • Oct 07, 2010
    Quiz Created by
    Panasukk

Related Topics

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.