Chapter 9: Internet, Email, and Online Communication (Set-4)
When you open a website, which step usually happens first to locate the server correctly
A DNS lookup
B File compression
C Screen capture
D Email syncing
Explanation: Before a browser can connect, DNS converts the domain name into an IP address. This lets your device find the correct server on the network and start loading the website resources.
What is the main purpose of a web browser “user agent” string
A Store cloud files
B Block spam emails
C Identify browser type
D Increase bandwidth
Explanation: The user agent tells websites which browser and device you are using. Sites may use it to display compatible layouts or deliver suitable versions of content for your device.
If a webpage opens but images and style look broken, the most common quick fix is to
A Change keyboard layout
B Disable printer spool
C Uninstall antivirus
D Refresh hard reload
Explanation: A hard refresh forces the browser to re-download page files like CSS and images instead of using old cached copies. This often fixes broken layout after updates or caching issues.
Which browser storage is mainly cleared when you choose “Clear cached images and files”
A Contact list
B Email drafts
C Cache memory
D Task history
Explanation: This removes saved website files like images and scripts stored locally to speed loading. Clearing cache may slow first load but helps fix display problems and outdated content.
What does a “cookie consent” popup usually relate to on many websites
A Screen brightness
B Data tracking rules
C Printer settings
D CPU temperature
Explanation: Cookie consent informs users about cookies used for login, preferences, and tracking. Users can accept or reject certain cookie categories, supporting privacy laws and transparency.
Which situation best describes high latency during browsing
A Clicks respond late
B Pages save offline
C Files compress fast
D Ads fully blocked
Explanation: High latency means a longer delay between your action and the server response. Even with good bandwidth, high latency makes websites feel slow, especially in interactive tasks.
When multiple devices stream video at home, buffering may happen mainly due to limited
A Browser cache
B Email storage
C Available bandwidth
D Screen size
Explanation: Streaming uses large continuous data. When many devices share one connection, bandwidth per device decreases, causing buffering. Upgrading plan or reducing video quality can improve streaming.
Which type of URL is most likely used when you search something on a search engine
A BIOS setup URL
B Offline file URL
C Printer queue URL
D Query string URL
Explanation: Search engines often use URLs containing query strings like “?q=term”. These parameters carry the search keywords and settings, allowing the engine to show results for that query.
Which search method is most helpful when your keyword has multiple meanings
A Add context words
B Use only emojis
C Remove all spaces
D Type random letters
Explanation: Adding context words clarifies intent and reduces irrelevant results. For example, “java programming” vs “java island” helps the engine understand the topic and show better results.
What is the main benefit of using “advanced search” options on a search engine
A Bigger screen size
B More precise results
C Faster CPU speed
D Less battery drain
Explanation: Advanced search lets you filter by language, region, date, exact phrases, and excluded words. This reduces irrelevant pages and helps you find targeted information more efficiently.
Which operator is most useful to exclude unwanted results from a search query
A Plus sign (+)
B Equal sign (=)
C Minus sign (-)
D Hash sign (#)
Explanation: Using a minus sign excludes pages containing a word, like “python -snake” to focus on programming. It helps refine results and remove common irrelevant meanings.
If you want results only from a single website, which search operator is best
A site: operator
B filetype: operator
C cache: operator
D mailto: operator
Explanation: “site:” limits results to a domain, such as “site:edu notes”. It is useful for searching within official portals, university sites, or a trusted website only.
Which term best describes copying a paragraph from a website and using it as your own answer
A Bookmarking
B Plagiarism
C Downloading
D Formatting
Explanation: Plagiarism is presenting copied content as your own without proper credit. It is unethical and may lead to penalties. Always write in your own words and cite sources when needed.
Which email protocol is commonly used to send emails from a mail client to a mail server
A IMAP
B POP3
C SMTP
D HTTP
Explanation: SMTP is used for sending emails from a client to a mail server and between mail servers. Receiving emails is usually handled by IMAP or POP3 depending on settings.
Which protocol helps you access your email while keeping messages stored on the server
A SMTP
B FTP
C DNS
D IMAP
Explanation: IMAP syncs emails across devices while keeping mail on the server. This is useful when you use the same mailbox on phone and computer because folders and status stay updated.
POP3 is mainly different from IMAP because POP3 usually
A Downloads to device
B Encrypts web pages
C Sends video calls
D Blocks all spam
Explanation: POP3 typically downloads emails to the local device and may remove them from the server. IMAP keeps messages on the server and synchronizes across devices, better for multi-device use.
Which part of an email address comes after the “@” symbol
A Username only
B File extension
C Domain name
D Browser cache
Explanation: The part after “@” is the domain, which indicates the mail server provider or organization, like “gmail.com”. It helps route email to the correct mail server for delivery.
Which action is best if you want to send the same email to many people without exposing addresses
A Use Reply All
B Use Print option
C Use BCC
D Use Bookmark bar
Explanation: BCC hides recipient addresses from others, protecting privacy. It also reduces reply-all confusion. Use To for the main recipient and CC only when visibility is appropriate.
What is the most professional way to write a subject line for a job-related email
A Just “Hi”
B Clear topic summary
C Only emojis
D All caps words
Explanation: A clear subject like “Application for JOA(IT)” helps the receiver understand the purpose instantly. It supports sorting and makes searching easier later, improving overall communication.
If you attach the wrong file, which step best prevents that before sending
A Increase font size
B Add more CC
C Use slang tone
D Recheck attachments
Explanation: Before sending, confirm the correct file name and content. Many mistakes happen due to similar names. Checking attachments avoids sending private or irrelevant files and saves time.
In netiquette, why should you avoid sending messages in ALL CAPS
A Looks like shouting
B Uses more bandwidth
C Clears cookies
D Adds storage quota
Explanation: ALL CAPS is commonly interpreted as shouting or anger. Using normal text, polite tone, and clear formatting keeps communication respectful and reduces misunderstandings in emails and chats.
Which practice best supports professional email writing in offices
A No subject line
B Many jokes
C Short paragraphs
D Random emojis
Explanation: Short paragraphs make email easier to read and understand quickly. Combined with a clear subject, polite greeting, and direct points, it improves professionalism and helps faster responses.
Why is proofreading important before sending an official email
A Increase download speed
B Reduce mistakes
C Boost Wi-Fi range
D Remove cloud quota
Explanation: Proofreading helps avoid spelling errors, incorrect names, wrong recipients, and missing attachments. It ensures your message is clear, professional, and less likely to cause confusion or delays.
Which email folder usually stores messages you started but did not send yet
A Spam folder
B Trash folder
C Sent folder
D Drafts folder
Explanation: Drafts store unsent messages so you can finish later. This is useful for long emails or when you need to confirm details before sending, reducing mistakes and improving accuracy.
Which cloud feature helps you share a file without sending an attachment
A Screen lock
B Email signature
C Shareable link
D DNS cache
Explanation: A shareable link gives access to the cloud-stored file. It avoids email size limits, allows permission control, and lets you update the file while keeping the same link for recipients.
In cloud sharing, which permission level allows someone to correct content inside a document
A Edit access
B View only
C No access
D Print only
Explanation: Edit access allows users to change text, add content, and modify structure. It helps collaboration but should be given carefully to trusted users and supported with version history.
What is the main use of “sync” in cloud storage apps on phones and laptops
A Increase brightness
B Clean antivirus
C Block popups
D Keep files same
Explanation: Sync keeps files updated across devices automatically. Changes made on one device reflect on others, reducing confusion and ensuring you access the latest version wherever you log in.
Which action is best when you want to limit cloud file access to only specific people
A Share publicly
B Restrict permissions
C Turn off updates
D Clear browser history
Explanation: Restricting access to specific accounts ensures only invited users can open the file. This improves privacy and reduces the risk of link sharing causing unintended access.
In cloud storage, “trash” or “bin” mainly helps because it allows
A Increase bandwidth
B Encrypt all emails
C Recover deleted files
D Block ad tracking
Explanation: Deleted files often go to trash temporarily before permanent deletion. This provides a recovery option if a file was removed accidentally, improving data safety and preventing sudden loss.
In video conferencing, “screen sharing” risk is mainly that it may
A Expose private content
B Increase cloud quota
C Remove spam emails
D Reduce file size
Explanation: Screen sharing can reveal private files, notifications, or personal tabs. Before sharing, close unnecessary windows and use “share one window” when possible to protect confidentiality.
Which meeting setting helps prevent unknown users from joining a call instantly
A Auto-play video
B Dark mode
C Waiting room
D Bookmark bar
Explanation: Waiting rooms allow the host to approve participants. This reduces the chance of unauthorized entry and helps manage attendance in official meetings, classes, or interviews.
In chat apps, what is the main purpose of “mute notifications” for a group
A Increase message speed
B Reduce interruptions
C Delete group admin
D Encrypt attachments
Explanation: Muting notifications stops frequent alerts while keeping messages accessible. It improves focus during work or study and reduces distraction, especially in busy groups with many messages.
Online forms often require “validation” mainly to
A Check correct input
B Improve internet speed
C Clear device cache
D Increase screen size
Explanation: Validation checks entries like email format, required fields, or number ranges. It helps collect correct data, reduces errors, and prevents incomplete submissions in registrations and surveys.
A one-time password (OTP) is considered safer than a fixed code because it
A Works forever
B Uses no network
C Expires quickly
D Stores in cache
Explanation: OTPs are temporary codes valid for a short time. Even if someone sees it later, it cannot be reused. This adds security to logins and transactions, especially with 2FA.
Two-factor authentication mainly protects accounts by requiring
A Larger inbox size
B Faster web browsing
C More bookmarks
D Two proof steps
Explanation: 2FA requires two different proofs, such as password plus OTP or authenticator code. It reduces account takeover risk even if the password is stolen or guessed.
Which practice best reduces risk when using public Wi-Fi for browsing
A Share OTP quickly
B Avoid sensitive logins
C Disable HTTPS checks
D Install unknown apps
Explanation: Public Wi-Fi may be insecure. Avoid banking and sensitive logins, ensure HTTPS is used, and prefer mobile data or VPN for important work to reduce interception and fake hotspot risks.
An “ad-block” tool is mainly helpful because it can
A Increase CPU power
B Fix screen pixels
C Block intrusive ads
D Remove all viruses
Explanation: Ad-blockers reduce unwanted ads and some tracking scripts, improving browsing comfort and sometimes speed. They are not full security solutions, so browser updates and antivirus remain important.
Which sign most strongly indicates a likely phishing attempt in an email
A Urgent password request
B Normal official greeting
C Clear company domain
D Verified support ticket
Explanation: Phishing emails often demand urgent action and ask for passwords, OTPs, or bank details. Legit services rarely ask for such data by email. Always verify through official apps or websites.
If a browser shows “certificate not valid,” the safest basic response is to
A Share the link
B Disable updates
C Save passwords
D Avoid entering data
Explanation: Invalid certificates can mean the connection is not secure or the site is fake. Do not enter login or payment details. Access official sites by typing the known correct address.
Digital footprints increase when you
A Clear browsing history
B Use private mode
C Post personal details
D Block third-party cookies
Explanation: Posting personal information, photos, and location updates adds to your digital footprint. Data can remain online for years and be copied, so privacy settings and cautious sharing are important.
Which tool helps protect an account if the same password was used on many sites
A Screen magnifier
B Password manager
C Print spooler
D Disk defragment
Explanation: Password managers help create and store unique strong passwords for each site. This reduces damage from one breach affecting multiple accounts and makes safe password habits easier to follow.
If cloud files do not upload automatically on mobile, the most common setting issue is
A RAM is low
B DNS is broken
C Sync is off
D BIOS is old
Explanation: If sync is disabled, cloud apps won’t automatically update files. Turning sync on, allowing background data, and checking permissions helps ensure uploads and updates happen properly.
Which cloud action allows multiple people to work on the same document without emailing versions
A Real-time collaboration
B Offline defrag tool
C Screen zoom option
D BIOS flashing
Explanation: Real-time collaboration lets users edit the same file with changes appearing instantly. It reduces version confusion, supports comments, and works well with version history to track edits.
Why is “storage quota” important in cloud services
A Speeds video calls
B Blocks spam emails
C Encrypts websites
D Limits total uploads
Explanation: Cloud services have a storage limit. When quota is full, new uploads may fail and syncing may stop. Managing large files, clearing trash, and upgrading plans are common solutions.
Which action best protects a cloud file link from being accessed by unknown people
A Post link publicly
B Use simple password
C Use restricted sharing
D Disable 2FA
Explanation: Restricted sharing requires sign-in by specific accounts. This prevents unknown people from opening the link even if it is forwarded, improving confidentiality for personal or official documents.
Which email practice helps keep communication organized in long threads
A Use proper subject
B Remove recipients
C Write only emojis
D Avoid punctuation
Explanation: Keeping an accurate subject line and replying in the same thread helps track context. Changing subjects when the topic changes prevents confusion and keeps messages searchable and organized.
When sending a large file, which is usually better than attaching it directly in email
A Reply all option
B Cloud link sharing
C Add many CC
D Use ALL CAPS
Explanation: Cloud links avoid attachment size limits and allow controlled access. You can also update the file without resending and can revoke access later, which is useful for official documents.
A browser “pop-up blocker” mainly protects users from
A Low bandwidth
B Email spam
C Unwanted popups
D Cloud quota
Explanation: Pop-up blockers reduce annoying and sometimes dangerous pop-up windows that may contain scams or misleading ads. Combined with safe browsing settings, they reduce accidental clicks on harmful content.
Which method helps control mobile data usage most while watching online videos
A Lower video quality
B Use highest quality
C Turn off Wi-Fi
D Increase tab count
Explanation: Video quality settings greatly affect data usage. Choosing lower resolution, turning off auto-play, and downloading on Wi-Fi helps manage data, avoid extra charges, and reduce buffering.
In online platforms, reporting abuse is important mainly because it
A Increases bandwidth
B Clears cached files
C Improves screen color
D Triggers platform action
Explanation: Reporting alerts the platform to harmful content or behavior like scams and harassment. It helps moderation teams take action, protect users, and improve safety across the service.