Chapter 9: Internet, Email, and Online Communication (Set-10)
If DNS cache stores a wrong IP for a domain, the quickest fix on a device is to
A Increase bandwidth
B Disable cookies
C Flush DNS cache
D Save new bookmark
Explanation: DNS cache may keep an outdated or wrong mapping of domain to IP. Flushing clears stored entries so the device requests fresh DNS data, often fixing “site not opening” issues.
When a browser uses HTTPS, which security mechanism most directly protects data in transit
A DNS caching
B TLS encryption
C Cookie policy
D Ad blocking
Explanation: HTTPS uses TLS to encrypt data between browser and server, protecting credentials and messages from interception on networks. It ensures confidentiality and integrity during transmission, especially on public Wi-Fi.
A phishing site can still show HTTPS because the certificate mainly proves
A Content truth
B No malware
C Official authority
D Domain control
Explanation: A certificate usually proves the site controls the domain name, not that the site is trustworthy. Attackers can register look-alike domains and use HTTPS, so users must verify domain spelling.
Which browser feature most directly reduces tracking by advertising networks across sites
A Increase zoom level
B Clear bookmarks
C Block third-party cookies
D Change home page
Explanation: Third-party cookies allow ad networks to track activity across many sites. Blocking them reduces cross-site tracking while keeping basic site functions, improving privacy without breaking most browsing.
If a web page looks updated on one device but not another, the most likely reason is different
A Screen resolution
B Cached content
C Keyboard layout
D Email settings
Explanation: One device may still load older cached files like CSS and images. Clearing cache or doing a hard refresh forces new downloads so both devices show the latest version.
When many tabs slow down a browser, the most common resource being consumed is
A RAM memory
B DNS servers
C ISP quota
D POP3 storage
Explanation: Each tab can store page scripts, images, and background processes, using RAM. High RAM usage can slow the browser or system, so closing tabs or disabling heavy extensions helps.
In advanced search, site:gov.in filetype:pdf is mainly used to
A Block unsafe links
B Increase search speed
C Find official PDFs
D Remove cookies
Explanation: Combining operators restricts results to government domains and PDF format. This is useful for finding official forms, notifications, and circulars quickly from trusted sources.
The intitle: operator is most useful when you want results where the keyword appears in the
A Image alt text
B Download folder
C Browser cache
D Page title
Explanation: intitle: focuses results with the term in the page title, often improving relevance. It helps find official pages, documentation, or pages with specific headings matching your topic.
If you must exclude a word from search results, the most correct method is using
A OR operator
B Minus operator
C Quotes only
D Date filter
Explanation: The minus sign removes results containing the unwanted term, like “java -coffee.” This helps reduce irrelevant meanings and improves precision without changing the main search keyword.
A reliable way to detect copied content in your notes is to check for
A Unchanged long phrases
B Short keywords only
C Extra bookmarks
D More cache files
Explanation: Keeping long sentences exactly the same as a source is a common sign of copying. Writing in your own words, summarizing, and citing sources avoids plagiarism and improves understanding.
In email security, SPF and DKIM checks mainly help reduce
A Browser pop-ups
B Cloud quota errors
C Video call lag
D Sender spoofing
Explanation: SPF and DKIM are mechanisms used to verify that a domain is allowed to send mail and that messages are not tampered. They help detect spoofed sender addresses in phishing attempts.
Which email component is best for quickly detecting suspicious spoofing patterns
A Subject line
B Signature block
C Email headers
D Draft folder
Explanation: Headers contain technical routing details and authentication results. They can reveal mismatched domains, strange servers, or failed checks, helping investigate suspicious emails beyond the display name.
A safe practice when emailing many external recipients is to use
A Reply All
B BCC field
C CAPS subject
D No subject
Explanation: BCC hides recipient addresses from each other, protecting privacy and reducing reply-all storms. It is best for announcements where recipients do not need to see each other’s addresses.
In netiquette, replying late without any update is considered unprofessional mainly because it
A Clears cache files
B Improves privacy
C Increases bandwidth
D Delays coordination
Explanation: Many emails involve tasks with deadlines. If you cannot respond fully, a short acknowledgment helps. It shows responsibility, reduces confusion, and allows others to plan and proceed.
The best subject line improvement for “Important” is to make it
A Specific and action-based
B Longer than body
C All caps words
D Emoji filled
Explanation: “Important” is vague. A subject like “Submit report by 5 PM” clearly states the action and deadline. This improves clarity, sorting, and faster response in professional communication.
If you share a Drive link publicly by mistake, the fastest corrective action is to
A Delete your email
B Clear browser history
C Change link permissions
D Increase storage quota
Explanation: Immediately restricting the link to specific people or turning off link sharing prevents further access. This is faster than asking everyone to delete it and helps restore confidentiality quickly.
A cloud “anyone with link” setting is risky because link access can be
A Encrypted always
B Forwarded easily
C Limited by ISP
D Locked to device
Explanation: Anyone who receives the link can open it if permission allows. The link may be shared without your knowledge. For sensitive files, use restricted access to specific accounts.
In cloud collaboration, the strongest protection against accidental edits is having
A More bookmarks
B Higher bandwidth
C Dark mode
D Version history
Explanation: Version history lets you restore earlier versions if someone edits incorrectly or deletes content. It provides recovery and accountability, especially when multiple editors work on shared documents.
A sync conflict typically happens when the same document is edited
A Only on server
B Offline on two devices
C Only read online
D Printed to PDF
Explanation: If two devices modify the same file before syncing, the cloud service may create separate versions to avoid overwriting. Users must merge changes or choose the correct version.
In video meetings, the biggest privacy risk of “share desktop” is exposing
A Bandwidth speed
B DNS settings
C Notifications and files
D Keyboard layout
Explanation: Sharing the full desktop can reveal pop-up notifications, personal messages, and confidential documents. Sharing a single window and closing private tabs reduces accidental exposure.
Waiting rooms and passcodes are mainly designed to prevent
A Email spam
B Cache overflow
C Storage full
D Unauthorized joining
Explanation: These controls limit who can enter meetings, reducing disruption and privacy leaks. They are essential when meeting links are shared broadly or when sessions contain sensitive information.
End-to-end encryption differs from normal encryption mainly because the provider
A Stores all messages
B Cannot read content
C Controls your device
D Removes spam
Explanation: With end-to-end encryption, only sender and receiver hold the keys to read messages. The service provider typically cannot access message content, improving privacy for chats and file sharing.
SMS OTP is sometimes weaker than app OTP mainly because SMS can be
A Hijacked via SIM swap
B Stored in cache
C Encrypted by browser
D Blocked by bookmarks
Explanation: SIM swap attacks can let criminals receive your SMS OTPs by taking over your number. App-based authenticators keep codes on the device, reducing this specific risk.
If an attacker knows your password, 2FA still helps because it requires
A Bigger mailbox
B Faster connection
C Second proof factor
D More bookmarks
Explanation: Two-factor authentication adds another verification step like OTP or authenticator code. Without the second factor, attackers usually cannot log in even with the correct password.
A strong password policy for multiple accounts should focus on
A Same everywhere
B Only birthdays
C Short length
D Unique per site
Explanation: Unique passwords prevent one leaked password from unlocking multiple accounts. Password managers help maintain unique strong passwords, and 2FA further reduces risk of account takeover.
The most effective way to avoid phishing from email links is to
A Click urgent link
B Type official URL
C Share OTP to verify
D Disable security checks
Explanation: Typing the known official website address avoids fake links disguised in emails. It reduces the chance of landing on a phishing page and keeps logins limited to trusted sites.
A browser warning about an invalid certificate is most risky because it may indicate
A More bandwidth
B Better privacy
C Man-in-middle risk
D Faster download
Explanation: Invalid certificates can mean the connection is not secure or is being intercepted. Avoid entering sensitive data and use official addresses. Certificate warnings should not be ignored.
On public Wi-Fi, the safest general rule is to avoid
A Bookmarking sites
B Reading PDFs
C Using search filters
D Sensitive logins
Explanation: Public Wi-Fi may be insecure. Avoid banking and sensitive account logins unless protected (HTTPS and VPN). Using mobile data for important tasks reduces interception and fake hotspot risks.
A common sign of a malicious “download” button is that it installs an
A Verified store app
B Official update package
C Unknown extra installer
D PDF reader only
Explanation: Scam sites often use download buttons to push unwanted installers, toolbars, or malware. Prefer official sources and direct downloads, and scan files before opening or installing.
A browser extension is risky when it requests permission to
A Change font size
B Read all site data
C Add bookmarks
D Print pages
Explanation: “Read and change all data on websites” can expose logins and private information. Install extensions only from trusted sources, review permissions, and remove extensions you do not need.
The main benefit of clearing browser cache during troubleshooting is to
A Force fresh files
B Save more bookmarks
C Increase RAM permanently
D Block all phishing
Explanation: Clearing cache removes stored copies so the browser downloads updated resources. It fixes issues caused by outdated scripts or styles and helps ensure the newest site version loads correctly.
A digital footprint is hard to remove mainly because online data can be
A Cleared by refresh
B Blocked by ISP
C Deleted by cookies
D Copied and archived
Explanation: Content can be shared, copied, indexed, or archived by others. Even if you delete a post, copies may remain. Limiting what you share and using privacy settings helps control exposure.
The most professional response to a heated email thread is to
A Reply in caps
B Use insults
C Use calm tone
D Reply immediately
Explanation: Calm, factual language reduces conflict and keeps communication productive. Focus on the issue, propose a solution, and avoid emotional words. This supports professionalism and better outcomes.
In email attachments, the highest risk file type to open from unknown senders is
A Image file
B Executable file
C Text document
D PDF file
Explanation: Executables like .exe can directly run programs and install malware. Unknown attachments should be avoided or scanned. Verify the sender through trusted channels before opening anything suspicious.
A safe method to share sensitive documents for review is to
A Public link sharing
B Reply all with file
C Post on social
D Restricted cloud sharing
Explanation: Restricted sharing requires specific accounts, reducing access if the link is forwarded. You can set view or edit permissions and revoke access later, improving confidentiality for official documents.
In cloud storage, emptying “trash” matters because it can
A Reduce latency
B Block spam
C Free quota space
D Encrypt links
Explanation: Deleted files often remain in trash and still count toward storage quota. Emptying trash permanently removes them and frees space, allowing uploads and syncing to resume when quota is full.
In search results, the safest first step before trusting a medical or legal claim is to
A Trust top result
B Verify official sources
C Trust comments
D Share instantly
Explanation: High-stakes topics need verified sources like official institutions and trusted references. Cross-checking reduces misinformation risk, because search ranking does not guarantee correctness or authority.
The best reason to avoid “Reply All” on a message with external recipients is to prevent
A Data leakage
B Faster response
C Email encryption
D Folder creation
Explanation: Reply All shares content with everyone in To and CC, including outsiders. This can leak internal details. Use Reply to sender or carefully select recipients when confidentiality matters.
If your cloud link is set to “editor,” the biggest risk is
A Slow downloads
B DNS failures
C Email spam
D Unauthorized changes
Explanation: Editor access allows modifications and deletions. If the link spreads, someone can change content. Use view-only for sharing final documents and rely on version history for controlled editing.
A simple way to reduce background data usage without blocking internet is to
A Enable auto-play
B Restrict background data
C Use highest quality
D Keep hotspot on
Explanation: Restricting background data prevents apps from consuming data when not actively used. This helps control costs and keeps bandwidth available for important tasks like calls or downloads.
A meeting host should limit screen sharing to reduce risk of
A Higher bandwidth
B Longer emails
C Accidental exposure
D Better sound
Explanation: If anyone can share screens, private content may be shown unintentionally. Limiting screen sharing to host or trusted presenters reduces privacy risks and prevents disruptions in meetings.
When using a password manager, the biggest safety rule is protecting the
A Bookmark folder
B Email subject
C Cloud quota
D Master password
Explanation: The master password unlocks all stored passwords. It should be long, unique, and protected with 2FA where possible. If it is compromised, many accounts can be exposed.
The safest behavior after receiving a “bank account locked” email is to
A Click given link
B Contact official support
C Share OTP quickly
D Reply with details
Explanation: Such emails may be phishing. Do not click links or share details. Use the official app or known phone number to verify the issue, preventing credential theft and fraud.
In cloud collaboration, “viewer” role prevents
A Editing content
B Downloading file
C Reading content
D Opening link
Explanation: Viewer permission typically allows reading but not changing the file. This protects content from edits. Depending on settings, download/copy can also be restricted by the owner for extra control.
Using “incognito” mode does NOT prevent
A Local history saving
B Cookie retention
C Website server logs
D Form autofill saving
Explanation: Incognito prevents saving history locally and clears cookies after closing, but websites and servers can still log requests. Your ISP or office network may also record activity.
The most accurate benefit of ad-blockers is reducing
A Password theft always
B DNS failures
C Cloud storage
D Tracking scripts and ads
Explanation: Ad-blockers can reduce ads and some trackers, improving page experience. They do not fully protect from phishing or malware, so updates, safe browsing, and antivirus are still needed.
A reliable check to confirm a domain is official is comparing it with
A Random blog claim
B Official portal address
C Unverified screenshots
D Group forward message
Explanation: Compare the domain with the official site listed by the organization, government portal, or trusted documentation. Look-alike domains are common in scams, so exact matching matters.
If you must share a file but prevent recipients from seeing others’ emails, use
A CC field
B Reply all
C BCC field
D Subject line
Explanation: BCC hides all recipient addresses from each other. This is useful for sending announcements, forms, or instructions to many recipients while protecting privacy and preventing reply-all loops.
The best reason to use cloud links instead of email attachments in a team is that links
A Remove need internet
B Encrypt all devices
C Block spam mails
D Keep one latest version
Explanation: A shared link points to a single file that can be updated. Everyone accesses the latest version without resending attachments, reducing confusion from multiple copies and improving collaboration.
When a browser asks to allow notifications on an unknown site, the safest choice is
A Allow always
B Allow temporarily
C Block or deny
D Disable antivirus
Explanation: Unknown notification permissions can lead to spam alerts and scam links. Denying reduces nuisance and risk. Allow notifications only for trusted sites you truly need, like mail or calendars.