Chapter 9: Internet, Email, and Online Communication (Set-5)

In a URL like https://example.com/page, which part tells the browser the connection method to use

A URL scheme
B Domain name
C Page path
D Query string

Which URL part usually comes after the domain and shows the location of a specific page on a website

A Scheme part
B Top domain
C Path section
D Browser cache

In a URL containing ?id=25, what does the part after ? mainly represent

A Domain extension
B HTML title
C Cookie storage
D Query parameters

Which domain part best represents a “top-level domain” in studyclue.com

A .com
B studyclue
C https
D www

A site showing HTTPS is safer, but not always trustworthy because HTTPS mainly guarantees

A True information
B Encrypted connection
C No tracking
D No malware

Which browser storage type disappears automatically when you close the browser in most cases

A Persistent cookies
B Downloaded files
C Session cookies
D Saved bookmarks

Which cookie type can remain on your device for days or months unless you delete it

A Persistent cookies
B Session cookies
C BIOS cookies
D Cache cookies

If a browser shows a page correctly only after pressing Ctrl+F5, the likely issue was old

A Email drafts
B DNS records
C Cloud quota
D Cached files

What is the most accurate meaning of “intranet” for an office environment

A Global public network
B Search engine server
C Internal private network
D Email sending method

If bandwidth is high but web apps still feel slow, which issue is most likely responsible

A High latency
B Low storage
C Small screen
D Weak password

Which statement best matches “bandwidth” in simple technical terms

A Travel time delay
B Website trust level
C Data capacity rate
D Email spam count

What is the most correct purpose of a browser “bookmark”

A Store website files
B Save web address
C Block pop-ups
D Hide IP address

Which search operator helps find pages where a keyword appears in the page title

A intitle: operator
B filetype: operator
C site: operator
D cache: operator

Which operator is most useful when you want results only from PDFs

A site:pdf
B intitle:pdf
C filetype:pdf
D inurl:pdf

If you want results from one trusted site but not its blog subdomain, which method helps most

A Use only quotes
B Combine site and minus
C Increase keywords
D Clear browser cache

Which search technique is best to find an exact phrase and avoid word order changes

A OR operator
B Date filter
C Image filter
D Quotation marks

What does adding a date filter like “Past month” mainly help you do

A Encrypt web traffic
B Block tracking cookies
C Limit by time
D Increase Wi-Fi range

Which practice is the best first step to verify a doubtful claim found on a random website

A Cross-check trusted sources
B Share immediately
C Copy for notes
D Ignore all dates

An email “header” is important in security because it can show

A Screen brightness
B Real sending path
C Cache size
D Cloud permission

A common phishing trick is changing the display name while keeping a different

A Email subject
B Attachment type
C Sender domain
D CC list

What is the primary job of SMTP in email communication

A Sending emails
B Receiving emails
C Blocking spam
D Storing drafts

IMAP is preferred over POP3 for many users because IMAP usually

A Deletes server mail
B Encrypts websites
C Syncs across devices
D Blocks all ads

POP3 often causes confusion on multiple devices because it typically

A Downloads to one device
B Shares live folders
C Sends mail faster
D Encrypts attachments

In email, what is the main benefit of using BCC when sending to many recipients

A Increase attachment size
B Hide recipient addresses
C Speed up internet
D Improve screen share

Which email practice best reduces confusion when a conversation changes topic

A Add more emojis
B Use ALL CAPS
C Remove greeting
D Change subject line

Which option best describes a safe rule for opening unexpected attachments

A Open immediately
B Disable antivirus
C Verify sender first
D Forward to everyone

A compressed file like .zip sent in email is risky mainly because it can

A Hide harmful files
B Increase latency
C Reduce bandwidth
D Clear cache

Which email field should usually be used for the main person expected to act or reply

A CC field
B To field
C BCC field
D Subject field

Netiquette recommends short paragraphs in emails mainly because it

A Improves readability
B Encrypts messages
C Blocks spam faster
D Increases cloud space

Why should sensitive information be shared only with necessary recipients in email

A Increase bandwidth
B Improve screen quality
C Reduce data leakage
D Speed up downloads

In cloud storage, what is the most correct meaning of “sync conflict”

A Internet speed boost
B Spam email increase
C DNS failure only
D Two different versions

If a shared cloud file gets edited wrongly, which feature helps restore earlier content

A Version history
B Pop-up blocker
C Email signature
D URL shortening

Which sharing setting is safest for confidential documents stored in cloud drives

A Anyone with link
B Public on web
C Restricted to users
D No password needed

Why is sharing a cloud link often better than attaching a large file in email

A Removes all scams
B Avoids size limits
C Encrypts every device
D Increases latency

What does “storage quota” in cloud services control

A Total allowed storage
B Internet speed limit
C Email reply speed
D Cookie tracking level

A cloud “shared folder” is mainly helpful because it supports

A Faster CPU work
B BIOS configuration
C Common access area
D Printer alignment

In video conferencing, what is the most common security purpose of a meeting passcode

A Increase video quality
B Prevent unwanted entry
C Reduce bandwidth use
D Hide chat messages

“End-to-end encryption” in messaging apps mainly means messages are readable only by

A Sender and receiver
B ISP staff
C Search engines
D Browser extensions

OTP is safer than a reusable code mainly because an OTP

A Works forever
B Needs no network
C Expires quickly
D Stores in cache

SMS-based OTP can be weaker than app-based OTP mainly due to risks like

A Browser zoom issues
B Low screen resolution
C Extra bookmarks
D SIM swap attacks

Which setting best reduces accidental background data use by apps on mobile networks

A Restrict background data
B Enable auto-play
C Increase video quality
D Keep hotspot on

A common sign of a malicious download page is when it forces you to install a

A Standard PDF reader
B Unknown “required” tool
C Trusted office app
D Known browser update

Which browser permission should be granted carefully because it can track your physical movement

A Font size
B Bookmark save
C Location access
D Cache clear

If a browser extension asks for permission to “read and change all data on websites,” the best action is

A Review and avoid
B Install immediately
C Share with friends
D Disable updates

Why is “Reply All” risky in an email thread containing external recipients

A Clears your inbox
B Improves response time
C Reduces attachment size
D Shares information widely

Which practice best supports professionalism when you must disagree in an email

A Use insults
B Use polite wording
C Use all caps
D Use one-word reply

Which cloud sharing mistake most commonly causes “anyone” to access a file

A Short filename used
B Cache cleared
C Public link enabled
D Low bandwidth

When a website asks to disable your browser security or antivirus to view content, it is most likely

A Unsafe request
B Normal procedure
C Required update
D Cloud sync step

A secure habit for identifying fake job or bank emails is to verify the link by

A Clicking quickly
B Sharing the email
C Typing official URL
D Forwarding to groups

Reporting abuse or scams on online platforms is important mainly because it

A Increases bandwidth
B Helps stop attackers
C Clears cookies
D Improves display

Leave a Reply

Your email address will not be published. Required fields are marked *