Chapter 9: Internet, Email, and Online Communication (Set-9)
When a website loads but login fails repeatedly, a common fix is to clear saved
A Screen brightness
B Email drafts
C Cloud quota
D Cookies and cache
Explanation: Corrupted cookies or outdated cached files can break login sessions. Clearing them forces a fresh session, removes stale tokens, and often fixes repeated login errors without changing your password.
If a browser shows “Page not found” for a URL that worked earlier, the most likely cause is
A ISP plan expired
B Keyboard language changed
C Link changed or removed
D Screen resolution low
Explanation: A 404 error usually means the page location changed or the content was removed. Trying the site search, checking spelling, or navigating from the homepage can help find the new page.
Which browser feature helps reduce risk from unauthorized access on a shared computer after you finish browsing
A Sign out accounts
B Increase zoom level
C Save passwords
D Keep tabs open
Explanation: Signing out closes active sessions so the next user cannot access your email, cloud, or social accounts. Also avoid saving passwords and consider clearing browsing data on shared devices.
When a browser warns “Not secure,” it often means the website is using
A High bandwidth
B Low latency
C HTTP not HTTPS
D Safe cookies
Explanation: “Not secure” typically appears when a site uses HTTP, which does not encrypt data. Avoid entering passwords or payment details on such pages, especially on public Wi-Fi.
A website can track your visits across sessions mainly using
A Pop-up blocker
B Persistent cookies
C Browser theme
D Download folder
Explanation: Persistent cookies remain stored until expiry or deletion, allowing sites to remember logins, preferences, and visit patterns over time. This can help convenience but also raises privacy concerns.
If a page opens correctly in one browser but not in another, a common reason is
A Extension conflict
B Low battery power
C Wrong keyboard type
D No cloud storage
Explanation: Some extensions block scripts, ads, or trackers and can break page functions. Disabling extensions or testing in private mode helps identify whether an extension is causing loading issues.
Which setting most directly reduces cross-site advertising tracking in modern browsers
A Increase font size
B Clear bookmarks
C Block third-party cookies
D Disable JavaScript
Explanation: Third-party cookies are used by advertisers to track across many websites. Blocking them reduces cross-site tracking while still allowing basic site functions through first-party cookies.
If you want search results from reliable sources for rules, the best choice is to prefer
A Random comments
B Viral reels
C Meme pages
D Official portals
Explanation: Official portals publish verified rules, notices, and procedures. Checking official domains and cross-verifying reduces misinformation risk compared to unverified posts, forwarded messages, or anonymous forums.
When searching, adding -pdf after a keyword mainly helps to
A Exclude PDF results
B Only show PDFs
C Encrypt downloads
D Increase bandwidth
Explanation: The minus sign removes results containing a term. Using “-pdf” can reduce document links when you want normal webpages, improving relevance without changing the main keyword intent.
The main advantage of using filetype:ppt in search is to
A Find only images
B Block trackers
C Find presentations
D Clear history
Explanation: The filetype operator filters results to a chosen format. Using filetype:ppt or pptx helps quickly locate slide presentations such as lectures, training decks, and classroom notes.
Which search feature is most useful to find information published recently
A Spell checker
B Date filter
C Dark mode
D Bookmark bar
Explanation: Date filters narrow results to a time window like past week or past year. This helps find updated guides and new policies while reducing outdated pages that may no longer be valid.
When quoting exact text from the web in notes, the best practice is to
A Remove author name
B Hide website name
C Mention the source
D Change meaning
Explanation: Crediting the source avoids plagiarism and allows others to verify information. Even when writing in your own words, noting the source improves trust and supports accurate referencing.
In email, which action is best when you want to add a new person into an existing conversation thread
A Forward with note
B Reply only
C Delete message
D Mark as spam
Explanation: Forwarding shares the email content with a new person and lets you add context. Replying keeps the same recipients; forwarding is better when a new person must see the thread.
If you reply to an email but also need to keep a manager informed, you should usually
A Add manager in BCC
B Use only subject
C Add manager in CC
D Remove attachments
Explanation: CC is used to inform additional people transparently. Use BCC mainly for privacy with large groups. CC is common in offices when a supervisor should be aware of communication.
Which email habit best reduces spam and scam risk over time
A Click unsubscribe always
B Share OTP to verify
C Open unknown links
D Avoid replying spam
Explanation: Replying to spam confirms your address is active and may increase spam. Report spam, block senders, and avoid clicking unknown links to reduce exposure to scams and malware.
A suspicious email asking for OTP is dangerous because OTP can
A Approve access or payment
B Increase inbox size
C Clear browser cache
D Improve Wi-Fi range
Explanation: OTPs verify identity for logins and transactions. Sharing an OTP can allow account takeover or unauthorized payments. Legitimate services never ask you to share OTP via email or calls.
Which email feature helps you add automatic closing details like name and phone
A Spam folder
B Draft storage
C Email signature
D CC field
Explanation: A signature adds standard details at the end of messages, improving professionalism and saving time. It helps recipients quickly know who you are and how to contact you.
If you accidentally send a file to the wrong person, the biggest risk is
A Browser slowdown
B Confidentiality breach
C Higher bandwidth use
D Bigger inbox view
Explanation: Wrong recipients may access sensitive data. Always verify addresses and attachments before sending. For confidential files, use restricted sharing links and avoid including unnecessary recipients in CC.
A good subject line for a formal request email should be
A Specific and short
B Funny and long
C Empty always
D Only emojis
Explanation: A specific subject helps the receiver understand purpose quickly, such as “Request for Leave Approval.” Short, clear subjects make emails searchable and improve office communication efficiency.
Cloud storage is safer than only local storage mainly because it supports
A Faster keyboard typing
B Brighter screen display
C Backup and recovery
D More browser tabs
Explanation: Cloud storage keeps copies online so files can be restored if the device fails, is lost, or gets damaged. It also enables access from multiple devices with proper permissions.
If you share a cloud file as “anyone with link,” the main risk is
A Faster editing speed
B More storage quota
C Better battery life
D Unwanted access
Explanation: Anyone who gets the link can open the file, and the link may be forwarded. For confidential files, restrict access to specific accounts and choose view-only or limited permissions.
When a shared file should not be edited by others, the correct permission is
A Edit access
B Owner access
C View only
D Admin access
Explanation: View-only lets recipients read without changing content. This prevents accidental edits and protects final documents. For teamwork, edit permission can be used with version history as backup.
Which cloud feature is most helpful to undo mistakes made by collaborators
A Screen rotation
B Version history
C Browser bookmarks
D Email drafts
Explanation: Version history records earlier document states. It helps restore a previous version after accidental deletions or wrong edits, and may also show who changed what during collaboration.
A sync conflict is most likely when the same file is
A Edited on two devices
B Downloaded once
C Printed to PDF
D Bookmarked online
Explanation: If the same file is edited in two places before syncing, the cloud service may create multiple versions. This prevents overwriting and lets you choose which changes to keep.
In a video meeting, turning off camera mainly helps when you need to
A Increase brightness
B Fix DNS issue
C Save bandwidth
D Clean browser cache
Explanation: Video uses more data than audio. Turning off camera reduces bandwidth use and can improve call stability on slow connections, especially when multiple participants are present.
The safest habit before screen sharing in a meeting is to
A Save passwords
B Disable updates
C Share full desktop
D Close private tabs
Explanation: Screen sharing can reveal notifications, documents, and browser tabs. Closing private content and sharing only one window reduces accidental exposure of confidential information during official meetings.
In chat apps, muting a group helps mainly to
A Reduce interruptions
B Block all members
C Delete group history
D Hide your number
Explanation: Muting stops frequent notifications but keeps messages accessible. It helps focus during study or work while still allowing you to read updates later when free.
End-to-end encryption in messaging mainly means the messages are readable by
A Any ISP staff
B Search engines
C Only chat users
D Browser extensions
Explanation: End-to-end encryption ensures only sender and receiver can read the message content. Even the service provider typically cannot read the content, improving privacy for chats and files.
A digital footprint becomes larger when you
A Use private mode
B Post personal details
C Block third-party cookies
D Clear history often
Explanation: Posting photos, location, and personal data adds permanent or long-lasting traces online. Reducing oversharing and using privacy settings helps control what remains searchable or shareable later.
Browser private mode mainly prevents the device from saving
A ISP network logs
B Website server records
C Local browsing history
D All tracking forever
Explanation: Private mode usually prevents saving history and clears cookies after closing. However, websites and internet providers may still log activity, so it is not complete anonymity.
Which option best reduces risk from fake “update required” pop-ups
A Close without clicking
B Enter OTP quickly
C Install suggested tool
D Disable pop-up block
Explanation: Scam pop-ups often push fake updates or malware installers. Closing without interaction and updating software only through official settings or trusted stores helps avoid malware infections.
A safe download practice includes verifying the
A Screen brightness
B Email signature
C Publisher or source
D Bookmark folder
Explanation: Checking the official publisher, trusted website, and correct file type reduces malware risk. Avoid unknown “required downloaders,” scan files with antivirus, and prefer official app stores.
Which browser permission should be given carefully because it can reveal your location
A Font permission
B Zoom permission
C Cache permission
D Location permission
Explanation: Location permission can share your approximate or exact location with a site. Allow it only for trusted services like maps and deny it for unnecessary sites to protect privacy.
When a site asks you to disable antivirus to download a file, it is most likely
A Unsafe request
B Normal practice
C Required by law
D Speed improvement
Explanation: Legitimate sites rarely ask users to disable security. Such requests often indicate scams or malware. Keep protection enabled and use official sources for downloads and updates.
Two-factor authentication is important because it reduces risk from
A Low bandwidth
B High latency
C Stolen password
D Full storage
Explanation: If a password leaks, 2FA still blocks login without the second factor. It greatly reduces account takeover risk, especially for email and banking accounts used for OTPs and recovery.
SMS OTP can be less secure than app codes mainly due to
A Extra storage used
B SIM swap risk
C Lower bandwidth
D Browser cache
Explanation: Attackers may hijack your mobile number through SIM swap to receive OTPs. Authenticator apps keep codes on the device and often provide stronger protection than SMS messages.
Which practice best prevents “Reply All” problems in office emails
A Use many emojis
B Remove subject line
C Check To and CC
D Use ALL CAPS
Explanation: Before sending, confirm whether only the sender needs the reply or the full group does. This prevents accidental sharing of internal information and reduces unnecessary inbox clutter.
When sending large files, the best method is to
A Share cloud link
B Send as many emails
C Use Reply All
D Remove file extension
Explanation: Cloud links avoid email attachment limits and allow access control. You can update the same file without resending and can revoke access later, which is useful for official documents.
A reliable sign of a suspicious URL is
A Known official domain
B Clear HTTPS lock
C Misspelled domain
D Trusted site name
Explanation: Fake sites often use similar-looking misspelled domains to trick users. Always read the domain carefully, avoid shortened links from unknown sources, and type official URLs directly when unsure.
Which action best improves account safety after a known data breach on one website
A Add more bookmarks
B Increase screen zoom
C Clear cache only
D Change reused passwords
Explanation: If you reused the same password elsewhere, attackers may access multiple accounts. Change passwords to unique ones and enable 2FA to reduce damage from leaked credentials.
A password manager helps security mostly by
A Increasing bandwidth
B Storing unique passwords
C Blocking pop-ups
D Clearing cookies
Explanation: Password managers generate and store strong unique passwords for every site. This avoids reuse, reduces guessing risk, and helps you manage many secure logins safely.
If cloud uploads stop with a “quota exceeded” message, the correct fix is to
A Free or upgrade space
B Change email subject
C Clear browser history
D Disable two-factor
Explanation: Quota exceeded means your storage limit is full. Delete large files, empty trash, or upgrade storage. Once space is available, uploading and syncing usually resume normally.
In cloud sharing, restricting access to “specific people” mainly improves
A Video quality
B Browser speed
C Confidentiality control
D Email storage
Explanation: Restricting access requires sign-in by chosen accounts, so forwarded links won’t work for outsiders. This is important for official documents, personal data, and files that must stay private.
When you share a folder with edit access, a good safety step is to
A Disable updates
B Share publicly
C Remove file names
D Keep version history
Explanation: Version history lets you recover from mistakes or unwanted edits. With many editors, it provides accountability and quick restoration, reducing the risk of permanent damage to shared documents.
Reporting scams and abuse on platforms matters because it
A Boosts bandwidth
B Clears cookies
C Helps remove offenders
D Improves screen
Explanation: Reports help platforms detect patterns, block accounts, and remove harmful content. This protects you and other users from repeated scams, harassment, and unsafe behavior.
A secure email habit for links is to
A Type official address
B Click urgent links
C Share OTP for check
D Disable HTTPS checks
Explanation: Typing the known official URL avoids phishing pages hidden behind email links. It reduces risk of credential theft and ensures you log in only on the real site or official app.
Which behavior most increases your long-term digital footprint
A Clearing cache often
B Public personal posts
C Blocking pop-ups
D Using data saver
Explanation: Public posts can be copied, archived, and searched for years. Limiting personal details, using privacy controls, and thinking before posting helps reduce long-term privacy and reputation risks.
When a meeting link is shared publicly, the safest host setting is
A Auto-join enabled
B Screen share all
C Waiting room enabled
D Mic unmuted all
Explanation: Waiting rooms allow the host to approve participants, reducing unauthorized entry. Combined with passcodes and limited screen sharing, it protects meetings from disruption and privacy problems.
Cloud “share link” is convenient, but safest use requires checking
A Permission and audience
B Screen resolution
C Email font size
D Browser theme
Explanation: Always confirm whether the link is restricted or public and whether recipients can view or edit. Correct permission settings prevent unintended access and protect important files.
A quick way to reduce mobile data consumption while streaming is to
A Enable auto-play
B Open many tabs
C Lower video quality
D Turn off Wi-Fi
Explanation: Lower resolution reduces data per second, decreasing usage and buffering. Combining it with turning off auto-play and using Wi-Fi for downloads helps manage data costs and stability.