Chapter 9: Internet, Email, and Online Communication (Set-3)
When a website name is typed, which system usually converts the domain into an IP address
A DNS system
B RAM memory
C PDF reader
D Task scheduler
DNS (Domain Name System) translates human-friendly domain names into IP addresses. This lets your browser locate the correct server on the internet and load the requested website content.
Which internet protocol is mainly used to transfer web pages from a server to a browser
A SMTP protocol
B IMAP protocol
C HTTP protocol
D FTP only
HTTP is used for delivering web pages and resources to browsers. HTTPS is the secure version of HTTP, adding encryption to protect data during browsing and online login.
A slow website response even after loading may happen mainly due to high
A Screen size
B Disk space
C Font setting
D Latency delay
Latency is the time taken for data to travel between your device and the server. High latency causes delays in clicks and responses, especially noticeable in calls, gaming, and live websites.
If your browser keeps showing an old version of a page, which action often fixes it
A Clear cache
B Change wallpaper
C Add bookmark
D Rename folder
Cached files can make a browser load older stored content. Clearing cache forces the browser to fetch fresh files from the server, often fixing display errors or outdated page content.
Which cookie type is most associated with tracking users across different websites
A Session cookie
B Local file cookie
C Third-party cookie
D BIOS cookie
Third-party cookies are set by domains other than the site you visit, often advertisers. They can track browsing across many sites, so blocking them improves privacy and reduces cross-site tracking.
Which browser option helps you open the same pages quickly after a restart
A Screen zoom
B Restore session
C Print preview
D Offline mode
“Restore session” or “Continue where you left off” reopens previously open tabs. It is useful when working on multiple pages, but should be used carefully on shared computers for privacy.
When you click a link and a file starts coming to your device, the file is being
A Uploaded now
B Encrypted only
C Compressed only
D Downloaded now
Downloading means receiving data from the internet to your device. Examples include saving documents, apps, or images. Uploading is sending data from your device to an online service.
A search query with many unnecessary words usually leads to
A Faster internet speed
B Better encryption
C Less relevant results
D Larger cache size
Too many extra words can confuse search intent and reduce result quality. Using clear keywords, exact phrases, and proper filters usually gives more accurate and useful results.
Which method helps find information when two words must appear together in exact order
A Quoted phrase
B OR search
C Image filter
D Voice typing
Putting words in quotation marks searches for the exact phrase in the same order. This is useful for finding exact definitions, titles, official lines, or a specific statement.
In a Boolean search, which operator broadens results by allowing either term
A AND operator
B OR operator
C NOT operator
D ONLY operator
OR includes results containing either keyword, expanding results. AND narrows results by requiring both terms. NOT excludes results containing a particular term to reduce unwanted matches.
Which search approach best helps to locate an official PDF form quickly
A clear cookies
B reduce zoom
C filetype:pdf
D refresh browser
The “filetype:pdf” operator limits results to PDF files. It is especially useful for finding forms, notifications, manuals, and official documents in PDF format.
A good reason to use “site:gov” or “site:gov.in” in searching is to
A Prefer official sources
B Increase download speed
C Remove browser ads
D Encrypt attachments
The “site:” operator restricts results to a domain. Using official domains like government sites improves reliability for rules, notifications, and verified information compared to random blogs.
Which sign most strongly suggests a webpage might not be reliable for facts
A Clear references shown
B Official domain
C No author info
D Updated date shown
Pages with no author, no references, and unclear purpose are less trustworthy. Reliable sources usually show author, date, citations, and clear organization or official ownership.
In email, the main purpose of “Compose” is to
A Block spam mails
B Empty the inbox
C Print attachments
D Write new email
Compose opens a new message window where you add recipients, subject, and content. You can also attach files and add CC/BCC as needed before sending.
Which field is best used to include someone who should be informed but not required to reply
A To field
B BCC field
C CC field
D Draft field
CC is used to keep others informed. The main action person is usually in To. BCC hides addresses, while CC addresses remain visible to all recipients.
If you accidentally click “Reply All,” which risk is most common in office emails
A Faster data usage
B Better security level
C Unneeded message spread
D Larger storage space
Reply All sends your message to everyone in the email thread. This can create inbox clutter and share information unnecessarily, so it should be used only when all recipients truly need it.
Which email part is most important for quickly understanding the email’s purpose
A Subject line
B Profile photo
C Email font size
D Inbox color
A clear subject helps the receiver understand the topic without opening the email. It improves professional communication, supports quick sorting, and makes searching for the message easier later.
What is the best practice if you are sending multiple attachments in one email
A Use random names
B Remove subject line
C Write in CAPS
D Use clear filenames
Clear filenames help recipients identify files correctly and avoid confusion. Names like “Report_Jan2026.pdf” look professional, reduce mistakes, and make saving and searching easier.
An email “signature” usually contains
A Browser settings
B Spam keywords
C Name and contact
D Wi-Fi password
A signature is a standard ending that often includes your name, designation, phone, and organization. It improves professionalism and helps recipients contact you without asking again.
Which type of email is most likely to be automatically filtered into the spam folder
A Suspicious bulk mail
B Personal reply
C Verified invoice
D Calendar invite
Spam filters detect bulk messages and suspicious patterns like risky links, fake sender domains, and scam phrases. Marking spam helps improve filtering and reduces similar emails in the future.
In professional netiquette, which style is best for a formal email body
A Long and confusing
B Polite and concise
C All caps text
D Slang language
Formal emails should be polite, clear, and brief, with a proper greeting and closing. Short paragraphs, correct grammar, and respectful tone reduce misunderstanding and improve response quality.
Why should you avoid sending confidential details to the wrong recipient in email
A Privacy can break
B Cache may clear
C Wi-Fi may stop
D Browser may crash
Sending private data to the wrong person can cause leakage of sensitive information. Always verify the email address, use correct CC/BCC, and avoid forwarding confidential content unnecessarily.
Cloud storage is most useful when you want to
A Increase CPU speed
B Fix monitor issues
C Access files anywhere
D Replace keyboard
Cloud storage keeps files online, so you can access them from different devices with internet. It supports backup, sharing, and collaboration, reducing dependency on only one computer.
When a cloud file is shared with “edit” permission, others can usually
A Only view file
B Change the file
C Only download file
D Only print file
Edit permission allows users to modify content. This helps teamwork but can risk unwanted changes, so use it only for trusted collaborators and consider version history for recovery.
Which feature helps restore a cloud document after accidental deletion or wrong edits
A Screen rotation
B Bookmark bar
C Pop-up blocker
D Version history
Version history stores earlier document states. You can review changes, identify who edited, and restore a previous version. It is very helpful in shared work and mistake correction.
If cloud storage shows “quota exceeded,” the most likely issue is
A Internet is blocked
B Email is hacked
C Storage is full
D Browser is outdated
Quota exceeded means your cloud space limit is reached. Uploads may stop until you delete files, clear trash, or upgrade storage. Managing large files helps prevent this.
Which action best protects a shared cloud folder from unwanted editing
A Set view-only
B Share publicly
C Remove file names
D Disable password
View-only permission lets people access content without changing it. For important documents, restricting edit rights prevents accidental modifications and keeps the original content safe.
What is the main benefit of sharing a cloud link instead of emailing a large attachment
A More spam emails
B Slower reading speed
C Easy access anytime
D Less security always
Cloud links avoid email size limits and allow access from any device. You can update the file without resending, and you can control access permissions to protect confidentiality.
In video conferencing, what is the main role of a “mute” button
A Stop screen sharing
B Delete chat history
C End the meeting
D Stop your audio
Mute turns off your microphone so others cannot hear background noise. It improves meeting quality, especially in group calls. You can unmute when speaking to avoid interruptions.
In online meetings, “waiting room” is mainly used to
A Increase screen brightness
B Control participant entry
C Improve bandwidth speed
D Rename attachments
Waiting rooms hold participants until the host admits them. This improves security by preventing unknown users from joining immediately and helps manage meeting flow in official calls.
In chat apps, what does “read receipt” usually indicate
A Message was seen
B Message was deleted
C Phone was hacked
D Wi-Fi was boosted
Read receipts show whether a message has been read or seen by the receiver. This can help communication clarity, but it may be turned off in privacy settings on many apps.
An online form used for exams or surveys often requires “submit” to
A Clear browser cache
B Stop internet service
C Send final response
D Increase storage quota
Submit sends your filled data to the server. Without submitting, responses may not be recorded. Many forms also show a confirmation page or receipt after successful submission.
A “digital footprint” can create long-term risk mainly because online data may
A Increase bandwidth
B Stay for years
C Reduce latency
D Improve cache speed
Online posts and shared data can remain stored, copied, or archived for long periods. This can affect privacy, reputation, and security, so careful sharing and privacy settings are important.
Which setting helps reduce tracking and risky scripts while browsing
A Disable third-party cookies
B Increase volume level
C Change wallpaper
D Add bookmark folder
Disabling third-party cookies reduces cross-site tracking by advertisers. Combined with safe browsing settings and careful extension use, it improves privacy and reduces unwanted personalized tracking.
Why is using public Wi-Fi risky for logging into accounts without protection
A Cache becomes larger
B Browser becomes faster
C Data can be intercepted
D Email becomes shorter
Public Wi-Fi may allow attackers to intercept traffic or create fake hotspots. Using HTTPS, avoiding sensitive transactions, and using a VPN or mobile data helps reduce risk.
A “safe download” habit includes checking the file extension mainly to avoid
A Extra bookmarks
B Larger font size
C Faster printing
D Executable malware
Some harmful files are disguised as normal documents. Checking extensions like .exe or unknown installers helps prevent malware. Download only from trusted sources and scan files before opening.
In online scams, a message demanding urgent payment is a warning sign of
A Cloud syncing
B Social engineering
C Cache clearing
D Safe browsing
Social engineering tricks people using fear or urgency to share money or data. Scammers may pretend to be support staff. Verify using official contacts and never share OTPs or passwords.
Two-factor authentication is stronger than password-only login because it adds
A Faster internet speed
B Larger email inbox
C Second verification step
D Better screen color
2FA requires a second proof like an OTP or authenticator code. Even if someone steals your password, they usually cannot log in without the second factor, improving account protection.
Which action is best when you receive an unknown email attachment unexpectedly
A Do not open
B Install it fast
C Share to friends
D Disable antivirus
Unexpected attachments can contain malware. Verify the sender using a trusted channel, scan the file with antivirus, and avoid opening until you are sure it is safe and intended for you.
Why is using a password manager considered helpful for online safety
A Speeds up Wi-Fi
B Removes all spam
C Fixes screen issues
D Stores strong passwords
Password managers create and store strong unique passwords for each site. This reduces reuse risk and makes it easier to use complex passwords without forgetting them.
When a browser shows a security warning before opening a site, the safest action is
A Ignore and continue
B Disable browser updates
C Avoid proceeding
D Share the link
Browser warnings may indicate unsafe certificates, phishing, or malicious content. Avoid entering any personal details. If needed, access the official site by typing the known correct address.
A common reason to use “sync” on cloud storage is to
A Increase screen resolution
B Keep files updated
C Change email address
D Remove spam mails
Sync keeps the same files consistent across devices. Updates on one device appear on others automatically, making work smoother and reducing confusion about which copy is the latest.
What does “ISP” mainly provide to your home router or phone
A Internet connection
B CPU processing
C Email filtering
D Cloud permissions
An ISP provides the connection that links your device to the internet using fiber, cable, or mobile data. It may also provide IP addresses, customer support, and service plans.
A firewall in basic internet security is mainly used to
A Increase storage quota
B Speed up downloads
C Create bookmarks
D Block unauthorized traffic
A firewall filters incoming and outgoing network traffic based on rules. It helps block unauthorized access and reduce attacks, especially when combined with updates and safe browsing habits.
Why should links be checked before clicking in emails or messages
A Increase screen brightness
B Improve cache storage
C Avoid phishing sites
D Reduce file size
Attackers use fake links to steal passwords or install malware. Checking the domain, avoiding short suspicious URLs, and using official apps or typing the address directly helps stay safe.
What is the best use of “bookmark folders” in a browser
A Organize saved sites
B Speed up CPU
C Remove spam emails
D Encrypt attachments
Bookmark folders group useful websites by topic, like “Study,” “Forms,” or “Jobs.” This helps quick access, reduces repeated searching, and improves productivity during regular browsing.
Which action helps keep your online accounts safer if a data breach happens on one site
A Use same password
B Use unique passwords
C Share OTP quickly
D Disable 2FA
Unique passwords prevent attackers from accessing multiple accounts using one leaked password. Using a password manager and enabling 2FA makes accounts much harder to compromise after breaches.
“Data usage management” on mobile is most directly improved by
A Increasing video quality
B Opening many tabs
C Turning off auto-play
D Keeping hotspot on
Auto-play videos consume large data quickly. Turning it off, using data saver mode, and downloading content on Wi-Fi helps control usage, avoid extra charges, and maintain better browsing speed.
In online platforms, “block” mainly helps by
A Stopping further contact
B Increasing storage quota
C Improving download speed
D Clearing browsing history
Blocking prevents a user from messaging or interacting with you. Combined with reporting, it helps protect from harassment, spam, and abuse, improving safety on chat apps and social platforms.
Which practice best supports professionalism in online communication with unknown people
A Use rude jokes
B Use all caps
C Share personal OTP
D Use polite tone
A polite tone with clear words and respectful language builds trust and avoids misunderstanding. Professional communication also includes correct greetings, concise writing, careful sharing, and safe handling of links and files.