Chapter 9: Internet, Email, and Online Communication (Set-3)

When a website name is typed, which system usually converts the domain into an IP address

A DNS system
B RAM memory
C PDF reader
D Task scheduler

Which internet protocol is mainly used to transfer web pages from a server to a browser

A SMTP protocol
B IMAP protocol
C HTTP protocol
D FTP only

A slow website response even after loading may happen mainly due to high

A Screen size
B Disk space
C Font setting
D Latency delay

If your browser keeps showing an old version of a page, which action often fixes it

A Clear cache
B Change wallpaper
C Add bookmark
D Rename folder

Which cookie type is most associated with tracking users across different websites

A Session cookie
B Local file cookie
C Third-party cookie
D BIOS cookie

Which browser option helps you open the same pages quickly after a restart

A Screen zoom
B Restore session
C Print preview
D Offline mode

When you click a link and a file starts coming to your device, the file is being

A Uploaded now
B Encrypted only
C Compressed only
D Downloaded now

A search query with many unnecessary words usually leads to

A Faster internet speed
B Better encryption
C Less relevant results
D Larger cache size

Which method helps find information when two words must appear together in exact order

A Quoted phrase
B OR search
C Image filter
D Voice typing

In a Boolean search, which operator broadens results by allowing either term

A AND operator
B OR operator
C NOT operator
D ONLY operator

Which search approach best helps to locate an official PDF form quickly

A clear cookies
B reduce zoom
C filetype:pdf
D refresh browser

A good reason to use “site:gov” or “site:gov.in” in searching is to

A Prefer official sources
B Increase download speed
C Remove browser ads
D Encrypt attachments

Which sign most strongly suggests a webpage might not be reliable for facts

A Clear references shown
B Official domain
C No author info
D Updated date shown

In email, the main purpose of “Compose” is to

A Block spam mails
B Empty the inbox
C Print attachments
D Write new email

Which field is best used to include someone who should be informed but not required to reply

A To field
B BCC field
C CC field
D Draft field

If you accidentally click “Reply All,” which risk is most common in office emails

A Faster data usage
B Better security level
C Unneeded message spread
D Larger storage space

Which email part is most important for quickly understanding the email’s purpose

A Subject line
B Profile photo
C Email font size
D Inbox color

What is the best practice if you are sending multiple attachments in one email

A Use random names
B Remove subject line
C Write in CAPS
D Use clear filenames

An email “signature” usually contains

A Browser settings
B Spam keywords
C Name and contact
D Wi-Fi password

Which type of email is most likely to be automatically filtered into the spam folder

A Suspicious bulk mail
B Personal reply
C Verified invoice
D Calendar invite

In professional netiquette, which style is best for a formal email body

A Long and confusing
B Polite and concise
C All caps text
D Slang language

Why should you avoid sending confidential details to the wrong recipient in email

A Privacy can break
B Cache may clear
C Wi-Fi may stop
D Browser may crash

Cloud storage is most useful when you want to

A Increase CPU speed
B Fix monitor issues
C Access files anywhere
D Replace keyboard

When a cloud file is shared with “edit” permission, others can usually

A Only view file
B Change the file
C Only download file
D Only print file

Which feature helps restore a cloud document after accidental deletion or wrong edits

A Screen rotation
B Bookmark bar
C Pop-up blocker
D Version history

If cloud storage shows “quota exceeded,” the most likely issue is

A Internet is blocked
B Email is hacked
C Storage is full
D Browser is outdated

Which action best protects a shared cloud folder from unwanted editing

A Set view-only
B Share publicly
C Remove file names
D Disable password

What is the main benefit of sharing a cloud link instead of emailing a large attachment

A More spam emails
B Slower reading speed
C Easy access anytime
D Less security always

In video conferencing, what is the main role of a “mute” button

A Stop screen sharing
B Delete chat history
C End the meeting
D Stop your audio

In online meetings, “waiting room” is mainly used to

A Increase screen brightness
B Control participant entry
C Improve bandwidth speed
D Rename attachments

In chat apps, what does “read receipt” usually indicate

A Message was seen
B Message was deleted
C Phone was hacked
D Wi-Fi was boosted

An online form used for exams or surveys often requires “submit” to

A Clear browser cache
B Stop internet service
C Send final response
D Increase storage quota

A “digital footprint” can create long-term risk mainly because online data may

A Increase bandwidth
B Stay for years
C Reduce latency
D Improve cache speed

Which setting helps reduce tracking and risky scripts while browsing

A Disable third-party cookies
B Increase volume level
C Change wallpaper
D Add bookmark folder

Why is using public Wi-Fi risky for logging into accounts without protection

A Cache becomes larger
B Browser becomes faster
C Data can be intercepted
D Email becomes shorter

A “safe download” habit includes checking the file extension mainly to avoid

A Extra bookmarks
B Larger font size
C Faster printing
D Executable malware

In online scams, a message demanding urgent payment is a warning sign of

A Cloud syncing
B Social engineering
C Cache clearing
D Safe browsing

Two-factor authentication is stronger than password-only login because it adds

A Faster internet speed
B Larger email inbox
C Second verification step
D Better screen color

Which action is best when you receive an unknown email attachment unexpectedly

A Do not open
B Install it fast
C Share to friends
D Disable antivirus

Why is using a password manager considered helpful for online safety

A Speeds up Wi-Fi
B Removes all spam
C Fixes screen issues
D Stores strong passwords

When a browser shows a security warning before opening a site, the safest action is

A Ignore and continue
B Disable browser updates
C Avoid proceeding
D Share the link

A common reason to use “sync” on cloud storage is to

A Increase screen resolution
B Keep files updated
C Change email address
D Remove spam mails

What does “ISP” mainly provide to your home router or phone

A Internet connection
B CPU processing
C Email filtering
D Cloud permissions

A firewall in basic internet security is mainly used to

A Increase storage quota
B Speed up downloads
C Create bookmarks
D Block unauthorized traffic

Why should links be checked before clicking in emails or messages

A Increase screen brightness
B Improve cache storage
C Avoid phishing sites
D Reduce file size

What is the best use of “bookmark folders” in a browser

A Organize saved sites
B Speed up CPU
C Remove spam emails
D Encrypt attachments

Which action helps keep your online accounts safer if a data breach happens on one site

A Use same password
B Use unique passwords
C Share OTP quickly
D Disable 2FA

“Data usage management” on mobile is most directly improved by

A Increasing video quality
B Opening many tabs
C Turning off auto-play
D Keeping hotspot on

In online platforms, “block” mainly helps by

A Stopping further contact
B Increasing storage quota
C Improving download speed
D Clearing browsing history

Which practice best supports professionalism in online communication with unknown people

A Use rude jokes
B Use all caps
C Share personal OTP
D Use polite tone

Leave a Reply

Your email address will not be published. Required fields are marked *