Chapter 9: Internet, Email, and Online Communication (Set-8)
When a browser cannot open a site by name but opens by IP, the likely issue is with
A Screen scaling
B Email signature
C Cloud quota
D DNS resolution
DNS converts domain names into IP addresses. If name-based access fails but IP works, DNS lookup is likely failing due to wrong DNS server, cache issue, or network configuration.
If you type a URL and press Enter, the browser first tries to
A Resolve domain IP
B Clear cookie store
C Block pop-up ads
D Save to bookmarks
The browser must find the server’s IP address before connecting. It uses DNS to resolve the domain name, then starts the connection to request the webpage resources.
Which option best describes the difference between cache and cookies in browsing
A Speed vs brightness
B Email vs browsing
C Files vs user data
D RAM vs CPU
Cache stores website files like images and scripts to load pages faster. Cookies store small user-related data like login sessions and preferences, which can also affect privacy and tracking.
Which browser item is best to clear when a page is updated but still shows old images
A Saved bookmarks
B Cached files
C Email drafts
D Contact list
Old images may load from cache instead of the updated server version. Clearing cached files forces fresh downloads, fixing display problems after a website changes its content.
When you add a site to bookmarks, the browser mainly stores its
A Full webpage copy
B Internet bandwidth
C Web address URL
D Email attachment
Bookmarks store the URL so you can reopen the site quickly. They do not usually store the full page content; that job is handled by cache for faster loading.
A safe browsing habit before clicking a link in an email is to
A Share link quickly
B Check link domain
C Disable antivirus
D Reply with OTP
Phishing links often look real but use a fake domain. Checking the exact domain reduces risk of scams and malware. When unsure, type the official website address directly.
If downloads are fast but video calls feel laggy, which factor is most likely high
A Storage quota
B Screen resolution
C Email spam
D Network latency
Downloads depend mainly on bandwidth, but video calls need low latency for real-time response. High latency causes delays, voice lag, and poor interaction even when speed seems good.
Which term best describes the maximum data transfer capacity of your internet plan
A Browser cache
B Cookie policy
C Bandwidth limit
D Email quota
Bandwidth is the data capacity of the connection. Higher bandwidth supports faster downloads and smoother streaming, especially when multiple users or devices share the same internet line.
What does a search engine primarily maintain to show results quickly
A Cloud storage files
B Indexed web pages
C Email contact list
D Browser extensions
Search engines crawl and index web content in large databases. When users search, the engine quickly matches keywords to indexed pages and ranks results by relevance and other signals.
Which search method is most useful when you want exact words in exact order
A Quoted phrase search
B OR operator search
C Image-only filter
D Random keyword mix
Quotation marks force searching for the exact phrase in the same order. This improves accuracy for definitions, titles, official lines, and specific sentences that may appear in many forms.
Using AND in a search query usually
A Broadens results
B Clears cache files
C Narrows results
D Hides browsing history
AND requires both terms to be present, so results become more specific. It helps reduce irrelevant pages when searching for topics with many possible meanings or broad keywords.
Using OR in a search query usually
A Narrows results
B Broadens results
C Blocks pop-ups
D Encrypts traffic
OR allows either term to appear, so the search engine returns results for both possibilities. This is useful when two different words may describe the same topic or concept.
Which operator helps restrict results to a particular domain like gov.in
A filetype: operator
B intitle: operator
C cache: operator
D site: operator
site: limits results to a specified website or domain. Using site:gov.in helps find official government information and reduces unreliable pages from unknown sources.
Which operator is best when you want results only in PDF format
A site:pdf
B intitle:pdf
C filetype:pdf
D intext:pdf
filetype:pdf filters results to PDF documents. It helps locate forms, reports, manuals, and study notes that are often provided as downloadable PDFs.
What is the most common purpose of a “filter” option on search results pages
A Refine search results
B Increase bandwidth
C Create email drafts
D Save cloud storage
Filters narrow results by date, language, region, or content type. They reduce irrelevant pages and help users find more accurate information faster without changing the main keywords.
Which part of an email address identifies the mail service domain
A Before @ sign
B After @ sign
C Inbox folder
D Subject line
The part after @ is the domain, such as gmail.com or office.org. It indicates the email provider or organization and helps route messages to the correct mail server.
When you attach a file to an email, it is best first to check
A Screen brightness
B Browser cache
C File size limit
D DNS records
Many email services have attachment size limits. If the file is large, use compression or share via cloud link. Checking size prevents sending failures and inbox storage issues.
Which email action sends a response to the sender and also to all CC recipients
A Reply all
B Reply only
C Forward mail
D Archive mail
Reply All responds to the sender and everyone included in To and CC fields. Use it only when all recipients need the response to avoid unnecessary messages and information exposure.
Which option is best when you want to send the same email to many people privately
A Use CC
B Use BCC
C Use Reply All
D Use Drafts
BCC hides recipient addresses from each other. It protects privacy and reduces reply-all confusion. It is ideal for announcements to large groups where recipients do not know each other.
Which email folder typically stores messages you started but did not send
A Inbox folder
B Sent folder
C Drafts folder
D Spam folder
Drafts store unfinished emails so you can complete and send later. This helps when you need to verify details, add attachments, or write a careful professional message.
A clear subject line mainly helps with
A Higher bandwidth
B Faster CPU speed
C Better cloud sync
D Quick understanding
A clear subject tells the purpose of the email immediately. It improves professional communication, helps recipients prioritize, and makes searching for the email easier later.
Why should you avoid using ALL CAPS in professional email writing
A It slows internet
B It looks rude
C It clears cookies
D It blocks downloads
ALL CAPS often feels like shouting and can appear aggressive. Professional emails should use normal text, polite wording, and clear formatting to communicate respectfully.
Which netiquette habit best reduces misunderstandings in email communication
A Use slang words
B Skip greeting line
C Proofread before sending
D Use emojis only
Proofreading catches spelling errors, wrong names, missing attachments, and unclear sentences. It improves clarity and reduces confusion, especially in official emails that require accurate information.
A good file naming practice for email attachments is to use
A Clear descriptive name
B Random letters only
C Many “final” words
D No file extension
Descriptive names like “Leave_Application_Feb2026.pdf” help recipients identify files quickly. It reduces mistakes and looks professional compared to unclear names like “final_final2.doc”.
Cloud storage is most helpful when you want to
A Increase RAM size
B Access files anywhere
C Fix printer errors
D Change keyboard layout
Cloud storage keeps files online so they can be opened from different devices. It supports backup, sharing links, and collaboration, reducing dependence on a single computer.
When you share a cloud file with “view” permission, others can
A Edit and delete
B Change ownership
C Read not edit
D Access all files
View permission allows opening and reading without making changes. It protects content from unwanted edits while still allowing others to access the information safely.
If you want teammates to correct a shared document, which permission is needed
A View permission
B No access
C Print permission
D Edit permission
Edit permission allows users to modify the document. It supports collaboration but should be given carefully, and version history can help undo mistakes or restore earlier versions.
What does “sync” in cloud storage mainly ensure
A More screen brightness
B Latest files everywhere
C Faster email delivery
D Less browser history
Sync keeps your cloud files updated across devices. When you edit on one device, the change appears on others, reducing confusion about which copy is the most recent.
Version history in cloud documents is useful to
A Increase internet speed
B Block phishing mails
C Restore older version
D Remove browser ads
Version history keeps earlier copies of the document. It helps recover content after accidental deletion or wrong editing, especially when multiple people collaborate on the same file.
A storage quota warning in cloud apps usually means
A Space limit reached
B Internet is down
C Email is hacked
D Browser is outdated
Storage quota is the maximum space allowed for your account. When it fills, uploads and syncing may stop. Deleting large files or emptying trash restores space.
During video conferencing, muting your microphone is useful to
A Increase video quality
B Clear browser cache
C Reduce background noise
D Add cloud storage
Muting stops your mic from sending sound, reducing disturbance from background noise. This improves meeting quality and helps others listen clearly, especially in group meetings.
A waiting room in a meeting app mainly helps to
A Increase bandwidth
B Control participant entry
C Remove chat history
D Change email subject
Waiting rooms keep participants outside until admitted by host. It improves security by preventing unknown users from joining immediately and gives hosts better control over meetings.
A digital footprint can affect users because online data may
A Reduce bandwidth
B Increase storage
C Improve latency
D Stay long time
Online activity like posts, comments, and shared images can remain stored or copied for years. This affects privacy and reputation, so users should share carefully and set privacy controls.
Two-factor authentication is stronger than password-only login because it requires
A Two verification steps
B Longer email subject
C More browser tabs
D Higher screen zoom
2FA adds a second proof like OTP or app code, so even if someone gets your password, they cannot log in without the second factor, improving account security.
OTP should never be shared because it can
A Improve internet speed
B Clear cookies
C Allow account access
D Increase cloud quota
OTPs confirm identity for logins or payments. Sharing an OTP can let someone access your account or complete a transaction, leading to account theft or financial loss.
Private browsing mode mainly
A Blocks all tracking
B Avoids saving history
C Removes malware
D Increases bandwidth
Private mode usually does not save browsing history and clears cookies after closing. It helps privacy on shared devices, but websites and network providers may still track activity.
Public Wi-Fi risk is higher because attackers may
A Increase cloud space
B Reduce spam mails
C Intercept your data
D Improve download speed
Public networks can be insecure and may allow traffic interception or fake hotspots. Avoid sensitive logins and use HTTPS, VPN, or mobile data for important tasks.
Which action best reduces risk from suspicious pop-ups on websites
A Close without clicking
B Enter OTP quickly
C Disable pop-up block
D Install unknown app
Suspicious pop-ups may trick users into malware installs or fake warnings. Closing without interacting and using pop-up blockers helps avoid accidental clicks and improves browsing safety.
Which practice helps ensure safe downloads
A Disable antivirus
B Ignore file type
C Share installer link
D Use trusted sources
Downloading from official sites or trusted stores reduces malware risk. Also check file extension, scan downloads, and avoid “required” unknown installers offered by suspicious pages.
An ad-blocker mainly reduces
A Cloud storage size
B Intrusive advertisements
C Email attachments
D DNS resolution
Ad-blockers reduce disruptive ads and some tracking scripts. This can improve page comfort and sometimes speed, but users should still keep browsers updated for security.
Phishing messages are dangerous because they try to
A Increase bandwidth
B Clear browser cache
C Steal login details
D Improve email storage
Phishing attempts trick users into entering passwords, OTPs, or card details on fake pages. Always verify sender and website address, and use official apps or typed URLs.
Reporting abuse on platforms is important because it
A Clears cache files
B Helps stop misuse
C Improves screen quality
D Increases data speed
Reporting alerts the platform about scams or harassment. Moderation teams can block offenders or remove harmful content, improving safety for the reporter and other users.
Which cloud action is best if you want to stop others from editing a shared file
A Change to view-only
B Increase storage quota
C Clear browsing history
D Disable two-factor
Changing permission to view-only prevents edits while still allowing access. It protects the document from unwanted changes and is useful when the file becomes final or confidential.
A common reason cloud syncing fails on mobile is
A Screen brightness low
B Keyboard language change
C Background data off
D Bookmark bar hidden
If background data is restricted, cloud apps cannot sync automatically. Allow background data, check battery optimization settings, and ensure the app has permissions to upload and update files.
Which is the best simple step to avoid “Reply All” mistakes in office emails
A Use emojis
B Check recipient list
C Use all caps
D Remove subject
Before sending, confirm whether the reply should go only to sender or to all recipients. This avoids sharing internal details widely and reduces unnecessary email traffic.
When sending a large file, which is usually better than attaching it in email
A Add more CC
B Use Reply All
C Use ALL CAPS
D Share cloud link
Email services have attachment size limits. Sharing a cloud link avoids failures, keeps one updated version, and allows you to control access permissions or revoke the link later.
Browser security updates are important because they
A Increase cloud quota
B Block all emails
C Fix security bugs
D Reduce storage used
Updates patch vulnerabilities that attackers can exploit through malicious sites. Keeping browsers updated improves protection, supports modern security features, and reduces risk of malware and data theft.
A safe sign of an unsafe website link is
A Known official site
B Misspelled domain
C Clear HTTPS lock
D Trusted domain name
Scam sites often use similar-looking but misspelled domains to trick users. Always read the domain carefully and avoid clicking links from unknown senders or urgent warning messages.
A password manager helps security mainly by
A Creating unique passwords
B Increasing bandwidth
C Clearing spam emails
D Blocking all ads
Password managers generate and store strong unique passwords for each site. This prevents password reuse, reduces account takeover risk, and makes secure login easier without memorizing many passwords.
Blocking a user in chat apps mainly helps by
A Improving Wi-Fi speed
B Increasing cloud space
C Stopping further contact
D Clearing browser history
Blocking prevents messages and calls from a user, protecting you from spam or harassment. Using block and report together improves safety and helps platforms take action against misuse.