Discuss setting webpage dimensions, including the most common sizes and the uses of each of these.

What will be an ideal response?


While webpages come in a variety of sizes, most pages usually fall within certain height and width limits. It is important to choose a size for your webpage that will accommodate the majority of users' monitors and screen size settings. Oversized webpages designed on larger screens with resolutions of 1024 x 768 or higher become unreadable when viewing the page using narrower browser widths. The graphics may be too wide to fit the browser window, and unwrapped text might create long, unreadable lines. Web designers constantly analyze and compare existing websites for usage guidelines related to screen colors, screen size, scrolling, graphics, and readability of text.?Another consideration is the possibility that the site visitor will want to print the webpage. Setting the dimensions of the webpage to 800 x 600 pixels will accommodate most users visually, but for webpages destined for print on 8.5 x 11-inch paper, you should try to keep text and graphics within 760 pixels wide and 410 pixels high to account for margins when printed.?

Computer Science & Information Technology

You might also like to view...

Which of the following statements is true?

a. Predicate methods typically test a condition and modify the object on which they're called. b. Predicate methods typically do not test a condition and do not modify the object on which they're called. c. Predicate methods typically test a condition and do not modify the object on which they're called. d. Predicate methods typically do not test a condition and modify the object on which they're called.

Computer Science & Information Technology

When you define a query in your own code, it’s known as a(n) ________ query.

a. dynamic b. static c. active d. passive

Computer Science & Information Technology

Shapes in a SmartArt graphic must be formatted individually

Indicate whether the statement is true or false

Computer Science & Information Technology

What type of attack involves using every possible combination of letters, numbers, and characters to create candidate digests that are then matched against those in a stolen digest file?

A. Space division B. Brute force C. Known ciphertext D. Known plaintext

Computer Science & Information Technology