Chapter 9: Internet, Email, and Online Communication (Set-2)
Which part of a URL usually shows the website domain name that identifies the server
A Page title
B Domain name
C Taskbar icon
D File explorer
The domain name (like example.com) identifies the website’s server on the internet. Browsers use it to locate the server via DNS and then request the required web pages or files.
When a browser shows “https” in the address bar, it mainly indicates
A Faster internet speed
B Free Wi-Fi access
C Encrypted web connection
D Large storage quota
HTTPS uses encryption (TLS) to protect data between your device and the website. It reduces the risk of data being read or changed by attackers during login or online transactions.
If a website loads slowly due to many devices sharing one connection, the most likely reason is low
A Bandwidth availability
B Screen resolution
C Email storage
D Keyboard response
When many users share the same connection, available bandwidth per device drops. This can slow downloads, streaming, and page loading because the connection’s data capacity is divided among users.
Which browser feature stores your visited page list and can be cleared for privacy
A Bookmarks folder
B Email drafts
C Browsing history
D Printer queue
Browsing history records pages you visited. Clearing it can improve privacy on shared devices and may remove auto-suggestions, but it does not necessarily delete cookies or cached files unless selected.
Which action best reduces tracking by websites during browsing
A Increase screen zoom
B Add more bookmarks
C Use larger fonts
D Block third-party cookies
Third-party cookies can track activity across different sites. Blocking them reduces cross-site tracking. You can still allow necessary site cookies while limiting advertisers and trackers.
A “download manager” is mainly useful because it can
A Pause and resume
B Change file owner
C Repair hardware faults
D Create email folders
Download managers can pause and resume downloads, manage multiple files, and sometimes recover from connection drops. This is helpful for large files or unstable internet connections.
What is the primary purpose of a search filter like “Past year” in search results
A Increase bandwidth
B Encrypt downloads
C Limit by date
D Remove all ads
Date filters show results from a chosen time period, helping you find more recent or specific information. This is useful when older pages are outdated or when you need the latest guides.
Which search method helps when you know the exact words of a definition or quote
A Random browsing
B Phrase search
C Image search
D Offline lookup
Phrase search uses quotation marks to find the exact wording in the same order. It improves accuracy when searching for a specific sentence, definition, rule, or official statement.
If you want results excluding a word, which common search technique helps most
A Use minus sign
B Use only capitals
C Add extra spaces
D Refresh the page
Many search engines support using a minus sign to exclude terms, like “jaguar -car” to focus on the animal. This removes irrelevant results and improves search accuracy.
Opening a PDF from the web is mainly an example of using
A Hardware driver
B System registry
C BIOS setting
D Web resource file
A PDF is a common web document format used for forms, notes, manuals, and reports. Browsers can open PDFs directly or download them for offline reading and sharing.
Which practice best helps avoid plagiarism when using an online PDF for study notes
A Copy exact sentences
B Remove page numbers
C Write in own words
D Hide source name
Plagiarism is copying content without proper credit. Reading, understanding, and writing in your own words avoids plagiarism and improves learning. When required, mention the source properly.
When verifying online information, which source is usually most reliable for official rules
A Government portal
B Random blog post
C Unknown forum reply
D Social media comment
Government and official organization websites typically publish verified rules, notifications, and procedures. Checking official portals reduces the risk of misinformation compared to anonymous posts or forwarded messages.
In email, the “To” field should usually contain
A Hidden recipients
B Spam senders
C Browser contacts
D Main recipients
The “To” field is for the primary receiver(s) who must act or respond. CC is for people who should be informed, and BCC is used when recipient addresses should remain private.
Which email feature helps you send the same message to multiple people while hiding addresses
A CC field
B Subject line
C BCC field
D Draft folder
BCC hides recipients from each other. It is useful for announcements to many people, protecting privacy and reducing unwanted reply-all chains or accidental sharing of email addresses.
What is the best reason to keep an email subject short and specific
A Faster internet speed
B Easier understanding
C Larger attachments
D More storage quota
A clear subject helps recipients know the purpose quickly and improves future searching. Short, specific subjects reduce confusion and make professional communication more effective.
Which action is most appropriate when you want to answer only the sender’s question
A Reply all
B Forward email
C Reply email
D Mark as spam
Reply sends your response to only the sender by default. It avoids unnecessary messages to others, which is good netiquette unless everyone in the conversation truly needs the reply.
Which email option sends a received message to a new person along with the original content
A Forward message
B Reply only
C Archive inbox
D Create contact
Forwarding shares an email with another recipient, including the original text and attachments if selected. It is used for passing information to the correct person or department.
What does an email attachment typically represent
A Saved bookmark
B Browser cookie
C ISP setting
D Added file
An attachment is a file sent with the email, like a PDF, image, or document. Attachments should be named clearly and checked for size and relevance before sending.
Which netiquette practice best prevents misunderstanding in professional emails
A Use ALL CAPS
B Use many emojis
C Use clear sentences
D Skip punctuation
Clear, simple sentences reduce confusion. Professional emails should be polite, structured, and concise, with a meaningful subject, correct greeting, and proofreading before sending.
What is the main risk of clicking unknown links in suspicious emails
A Malware infection
B Larger font size
C Faster browsing
D Better Wi-Fi signal
Unknown links may lead to phishing sites or download malware. Safe practice includes checking the sender, hovering to preview links, avoiding urgent requests, and using trusted official websites.
A phishing email is mainly designed to
A Clean browser cache
B Steal personal details
C Improve search results
D Upgrade bandwidth
Phishing emails trick users into sharing passwords, OTPs, or bank details by pretending to be trusted sources. Always verify through official channels and never share OTPs or passwords.
What is the best simple way to reduce spam reaching your inbox over time
A Reply to spam
B Share your email
C Disable spam filter
D Report spam
Reporting spam trains email filters and helps block similar messages. Avoid replying to spam, because it confirms your address is active and may increase future unwanted emails.
In cloud storage, “upload” means
A Copy to printer
B Delete from disk
C Send to cloud
D Format USB drive
Uploading transfers files from your device to cloud servers, enabling access from anywhere. It supports backup and sharing, and it is the opposite of downloading.
A cloud file shared with “view only” permission allows others to
A Read without editing
B Edit and delete
C Change ownership
D Access all folders
“View only” permission lets users open and read the file but prevents editing. This helps protect important content while still allowing people to access information safely.
Which cloud feature is most useful when multiple people edit the same document
A Screen brightness
B Collaboration editing
C Disk partitioning
D BIOS update
Cloud collaboration allows multiple users to edit a shared document, often with live updates and comments. It reduces version confusion and supports teamwork without emailing multiple file copies.
If you want to stop public access to a shared cloud file, the best action is
A Increase storage quota
B Add more bookmarks
C Remove link access
D Clear browser cache
Disabling link sharing or restricting permissions immediately limits who can open the file. This is important when a link was shared accidentally or when the document becomes confidential.
“Backup” in cloud use mainly means
A Faster internet speed
B Spam email removal
C Automatic translation
D Extra copy stored
Backup means keeping an additional copy of important data so it can be restored after loss, deletion, device failure, or ransomware. Cloud backup improves safety compared to only local storage.
OneDrive is best described as
A Search engine tool
B Web browser type
C Cloud storage service
D Email protocol
OneDrive is a cloud storage platform that lets users store, sync, and share files online. It integrates with Microsoft accounts and supports collaboration with Office documents.
Dropbox is mainly used for
A Online file storage
B CPU temperature check
C Printer alignment
D BIOS configuration
Dropbox is a cloud storage and file-sharing service. It allows upload, sync, and sharing links, making it easy to access files across devices and collaborate with others.
During a video call, turning off your camera can help mainly by
A Increasing storage
B Saving bandwidth
C Cleaning cache
D Boosting battery only
Video uses more bandwidth than audio. Turning off the camera reduces data usage and can improve call stability on slow connections, especially when many participants are connected.
What is “screen sharing” in online meetings
A Increase screen size
B Lock the keyboard
C Show your screen
D Delete meeting chat
Screen sharing displays your device screen to meeting participants. It helps for teaching, presentations, troubleshooting, or explaining steps, and it should be used carefully to avoid exposing private data.
In online chats, an emoji is mainly used to
A Show emotion quickly
B Increase internet speed
C Encrypt messages
D Fix typing errors
Emojis help express feelings or tone in short messages, reducing misunderstandings. However, in formal communication, using too many emojis can look unprofessional.
Two-factor authentication usually combines
A Browser plus cache
B Password plus OTP
C Email plus spam
D URL plus cookie
Two-factor authentication requires two types of proof, typically a password and a one-time code from SMS/app. It greatly improves account security even if the password gets leaked.
A strong password generally includes
A Only first name
B Only 123456
C Letters and numbers
D Only small letters
Strong passwords use a mix of upper/lowercase letters, numbers, and symbols, and are not easy to guess. Longer passwords are harder to crack, especially when unique for each account.
Which action helps protect your email account on a shared public computer
A Save password
B Keep tab open
C Disable screen lock
D Sign out properly
Signing out prevents the next user from accessing your account. Also avoid saving passwords, clear browsing data if needed, and use private browsing when accessing sensitive accounts on shared devices.
“Digital footprint” can be reduced mainly by
A Using ALL CAPS
B Posting every day
C Sharing less online
D Clicking unknown ads
Your digital footprint grows with posts, comments, searches, and shared personal details. Using privacy settings, avoiding oversharing, and limiting app permissions helps reduce long-term online exposure.
Browser “private mode” mainly helps by
A Not saving history
B Increasing bandwidth
C Removing all viruses
D Improving Wi-Fi range
Private mode usually prevents storing browsing history, cookies, and form data after the session ends. It improves privacy on shared devices, but it does not make you fully anonymous online.
Clearing cookies mainly causes websites to
A Print faster
B Update BIOS
C Boost GPU speed
D Log you out
Cookies store session information and preferences. Clearing cookies often signs you out of websites and resets settings, which can help privacy or fix login issues, but you may need to sign in again.
What does a browser extension typically do
A Increase RAM size
B Add extra features
C Repair hard disk
D Format documents
Browser extensions add functions like ad blocking, password management, translation, or screenshot tools. Install only from trusted sources, review permissions, and remove unnecessary extensions for safety.
An ad-blocker is most likely to improve browsing by
A Increasing keyboard speed
B Fixing printer issues
C Reducing ad clutter
D Replacing antivirus
Ad-blockers reduce intrusive ads and tracking scripts, making pages cleaner and sometimes faster. They are not a full security tool, so keep browser updates and antivirus protection active.
Which sign suggests a website link might be unsafe
A Strange domain spelling
B Clear HTTPS lock
C Official organization name
D Well-known domain
Scam links often use misspelled domains or extra characters to look real. Always check the full domain carefully, avoid urgent click demands, and use official apps or known websites for login.
Which basic step helps avoid installing malicious software from downloads
A Disable updates
B Ignore file type
C Share installer widely
D Use official sources
Downloading from official websites or trusted app stores reduces malware risk. Also check publisher name, file type, and reviews, and scan downloads with antivirus before installing.
Online “OTP sharing” with anyone is risky mainly because it can
A Improve login speed
B Allow account access
C Increase storage
D Reduce spam
OTPs are security codes meant only for the account owner. Sharing an OTP can let someone log in or complete a transaction as you, causing account theft or financial loss.
What is the main purpose of an online “report abuse” option on platforms
A Increase bandwidth
B Create new accounts
C Flag harmful content
D Clear browser cache
Reporting abuse alerts the platform to harmful behavior like harassment, scams, or illegal content. It helps enforce safety rules and can lead to actions like warnings, content removal, or account blocking.
“Response time” in email etiquette mainly refers to
A Reply within reasonable time
B Increase internet speed
C Reduce screen brightness
D Change file extension
Response time means replying in a suitable timeframe based on urgency, such as within a day for normal work emails. Timely replies show professionalism and prevent delays in tasks.
Which file naming style is best when sending attachments for official work
A Newfile123
B Final_final_final
C Clear and descriptive
D Untitled document
Descriptive file names help recipients quickly understand content, like “Admission_Form_2026.pdf”. It reduces confusion, avoids wrong file use, and looks professional in formal communication.
When sending sensitive data, the best basic practice is
A Use public Wi-Fi only
B Disable security
C Send to many CC
D Share minimal details
Share only necessary information and send it only to the intended person. Use correct permissions, avoid forwarding, and verify recipients to protect confidentiality and reduce the chance of data leaks.
Which device feature helps secure accounts even if someone guesses your password
A Large monitor
B Two-factor login
C Extra bookmarks
D Faster mouse
Two-factor login adds a second verification step like OTP or authenticator app code. Even with a stolen password, attackers usually cannot access the account without the second factor.
A “browser security update” is important mainly because it
A Adds more spam
B Removes all ads
C Fixes security bugs
D Deletes cloud files
Browser updates patch security vulnerabilities and improve protection against malicious websites. Keeping the browser updated reduces the chance of attacks and helps newer security standards work correctly.
Which action helps protect children or families from inappropriate web content on a shared device
A Enable safe browsing
B Increase bandwidth
C Add more cookies
D Disable pop-up blocker
Safe browsing and parental controls can block harmful sites and warn against dangerous downloads. Combined with secure settings and supervision, it improves safer internet use on shared devices.