Chapter 9: Internet, Email, and Online Communication (Set-5)
In a URL like https://example.com/page, which part tells the browser the connection method to use
A URL scheme
B Domain name
C Page path
D Query string
Explanation: The scheme (like http or https) tells the browser how to access the resource. It decides whether the connection should be secure (HTTPS) or standard (HTTP) before loading content.
Which URL part usually comes after the domain and shows the location of a specific page on a website
A Scheme part
B Top domain
C Path section
D Browser cache
Explanation: The path (like /page or /docs/file) points to a specific resource or route on the website. It helps the server decide which page or content to return to the browser.
In a URL containing ?id=25, what does the part after ? mainly represent
A Domain extension
B HTML title
C Cookie storage
D Query parameters
Explanation: Query parameters send extra data to the server, often used for searches, filters, or IDs. They help the website show correct content, like a specific result page or record.
Which domain part best represents a “top-level domain” in studyclue.com
A .com
B studyclue
C https
D www
Explanation: The top-level domain (TLD) is the last part like .com, .org, or .in. It helps categorize domains and is part of the full domain name used on the internet.
A site showing HTTPS is safer, but not always trustworthy because HTTPS mainly guarantees
A True information
B Encrypted connection
C No tracking
D No malware
Explanation: HTTPS encrypts data between you and the site, reducing eavesdropping risk. It does not guarantee the site is honest or correct, so you must still check the source and content.
Which browser storage type disappears automatically when you close the browser in most cases
A Persistent cookies
B Downloaded files
C Session cookies
D Saved bookmarks
Explanation: Session cookies usually last only during the browser session and are removed when the browser closes. They commonly store temporary login state or session information for websites.
Which cookie type can remain on your device for days or months unless you delete it
A Persistent cookies
B Session cookies
C BIOS cookies
D Cache cookies
Explanation: Persistent cookies stay until their expiry date or until manually cleared. Websites use them for remembering preferences, keeping you logged in, or tracking behavior over longer periods.
If a browser shows a page correctly only after pressing Ctrl+F5, the likely issue was old
A Email drafts
B DNS records
C Cloud quota
D Cached files
Explanation: Ctrl+F5 forces a hard reload and re-downloads page resources like CSS and scripts. This helps when the browser keeps using outdated cached versions after a site update.
What is the most accurate meaning of “intranet” for an office environment
A Global public network
B Search engine server
C Internal private network
D Email sending method
Explanation: An intranet is a private network inside an organization using internet-like tools. Access is limited to authorized users and is used for internal portals, documents, and communication.
If bandwidth is high but web apps still feel slow, which issue is most likely responsible
A High latency
B Low storage
C Small screen
D Weak password
Explanation: High bandwidth allows more data per second, but latency is delay. If latency is high, actions like clicks, searches, and real-time responses feel slow, especially in interactive services.
Which statement best matches “bandwidth” in simple technical terms
A Travel time delay
B Website trust level
C Data capacity rate
D Email spam count
Explanation: Bandwidth is the maximum data transfer capacity of a connection per unit time. Higher bandwidth supports faster downloads and smoother streaming, especially when many devices share the network.
What is the most correct purpose of a browser “bookmark”
A Store website files
B Save web address
C Block pop-ups
D Hide IP address
Explanation: Bookmarks save website URLs for quick future access. They do not store the full page content like cache does, but they help users revisit important pages without searching again.
Which search operator helps find pages where a keyword appears in the page title
A intitle: operator
B filetype: operator
C site: operator
D cache: operator
Explanation: “intitle:” filters results to pages with the term in the title, often making results more relevant. It is useful when searching for official pages, topics, or specific document titles.
Which operator is most useful when you want results only from PDFs
A site:pdf
B intitle:pdf
C filetype:pdf
D inurl:pdf
Explanation: “filetype:pdf” limits results to PDF documents. This helps find forms, notes, manuals, and official documents quickly without browsing many normal web pages.
If you want results from one trusted site but not its blog subdomain, which method helps most
A Use only quotes
B Combine site and minus
C Increase keywords
D Clear browser cache
Explanation: You can include one domain and exclude another part using minus, like using site:example.com and excluding site:blog.example.com. This improves precision when a site has many sections.
Which search technique is best to find an exact phrase and avoid word order changes
A OR operator
B Date filter
C Image filter
D Quotation marks
Explanation: Quotation marks search the exact phrase in the same order. This is useful for definitions, exact titles, official lines, or fixed terms that may appear differently in broad searches.
What does adding a date filter like “Past month” mainly help you do
A Encrypt web traffic
B Block tracking cookies
C Limit by time
D Increase Wi-Fi range
Explanation: Date filters narrow results to a chosen period. This helps when older pages are outdated or when you want recent guides, announcements, or updated instructions on a topic.
Which practice is the best first step to verify a doubtful claim found on a random website
A Cross-check trusted sources
B Share immediately
C Copy for notes
D Ignore all dates
Explanation: Cross-checking with official sites, textbooks, or well-known references reduces misinformation. Comparing multiple reliable sources and checking author/date helps confirm accuracy before using the information.
An email “header” is important in security because it can show
A Screen brightness
B Real sending path
C Cache size
D Cloud permission
Explanation: Email headers can reveal routing details and server information, helping detect spoofing or phishing. They show technical sending path, which can differ from the display name seen in the inbox.
A common phishing trick is changing the display name while keeping a different
A Email subject
B Attachment type
C Sender domain
D CC list
Explanation: Attackers may use a familiar display name but a fake email domain. Always check the full sender address carefully, especially when the email asks for urgent action or sensitive information.
What is the primary job of SMTP in email communication
A Sending emails
B Receiving emails
C Blocking spam
D Storing drafts
Explanation: SMTP is used to send emails from a client to a mail server and between mail servers. Receiving and syncing messages is normally done using IMAP or POP3.
IMAP is preferred over POP3 for many users because IMAP usually
A Deletes server mail
B Encrypts websites
C Syncs across devices
D Blocks all ads
Explanation: IMAP keeps email on the server and synchronizes folders and read/unread status across devices. This helps when using the same account on phone, laptop, and office computer.
POP3 often causes confusion on multiple devices because it typically
A Downloads to one device
B Shares live folders
C Sends mail faster
D Encrypts attachments
Explanation: POP3 usually downloads emails to a device and may remove them from the server. This can make other devices miss messages, so it is less suitable for multi-device access.
In email, what is the main benefit of using BCC when sending to many recipients
A Increase attachment size
B Hide recipient addresses
C Speed up internet
D Improve screen share
Explanation: BCC protects privacy by hiding recipients from each other. It also reduces accidental “Reply All” loops and prevents sharing of email addresses across a large unknown group.
Which email practice best reduces confusion when a conversation changes topic
A Add more emojis
B Use ALL CAPS
C Remove greeting
D Change subject line
Explanation: When the topic changes, updating the subject keeps threads organized and searchable. It helps recipients understand the new purpose and prevents mixing unrelated discussions in one email chain.
Which option best describes a safe rule for opening unexpected attachments
A Open immediately
B Disable antivirus
C Verify sender first
D Forward to everyone
Explanation: Unexpected attachments may contain malware. Confirm with the sender through a trusted method, scan the file, and check the file type. Avoid opening until you are sure it is legitimate.
A compressed file like .zip sent in email is risky mainly because it can
A Hide harmful files
B Increase latency
C Reduce bandwidth
D Clear cache
Explanation: ZIP files can hide executable malware or scripts. Users may open them without checking contents. Always scan zipped attachments and download only from trusted sources when you expect such files.
Which email field should usually be used for the main person expected to act or reply
A CC field
B To field
C BCC field
D Subject field
Explanation: The To field is for primary recipients who must respond or take action. CC is for people who should be informed, and BCC is used when recipient privacy is needed.
Netiquette recommends short paragraphs in emails mainly because it
A Improves readability
B Encrypts messages
C Blocks spam faster
D Increases cloud space
Explanation: Short paragraphs make emails easier to scan and understand, especially on mobile screens. They reduce confusion, support faster replies, and make professional communication more clear and effective.
Why should sensitive information be shared only with necessary recipients in email
A Increase bandwidth
B Improve screen quality
C Reduce data leakage
D Speed up downloads
Explanation: Email can be forwarded or sent to wrong addresses. Sharing only necessary details with the correct recipients lowers privacy risk and helps maintain confidentiality in professional communication.
In cloud storage, what is the most correct meaning of “sync conflict”
A Internet speed boost
B Spam email increase
C DNS failure only
D Two different versions
Explanation: A sync conflict happens when the same file is edited in different places before syncing. The cloud service may create separate versions to prevent overwriting, so users can choose the correct one.
If a shared cloud file gets edited wrongly, which feature helps restore earlier content
A Version history
B Pop-up blocker
C Email signature
D URL shortening
Explanation: Version history stores earlier versions of a file. You can review edits and restore a previous version after mistakes. It is very helpful in teamwork where multiple people edit documents.
Which sharing setting is safest for confidential documents stored in cloud drives
A Anyone with link
B Public on web
C Restricted to users
D No password needed
Explanation: Restricted sharing requires specific accounts to access the file. Even if the link is forwarded, outsiders cannot open it. This is the best basic approach for confidential or official documents.
Why is sharing a cloud link often better than attaching a large file in email
A Removes all scams
B Avoids size limits
C Encrypts every device
D Increases latency
Explanation: Email systems often limit attachment size. A cloud link lets recipients access the file without size problems, and you can update the file or revoke access later without resending.
What does “storage quota” in cloud services control
A Total allowed storage
B Internet speed limit
C Email reply speed
D Cookie tracking level
Explanation: Storage quota is the maximum space your cloud account can use. When it is full, uploads and syncing may stop. Managing large files and clearing trash helps regain space.
A cloud “shared folder” is mainly helpful because it supports
A Faster CPU work
B BIOS configuration
C Common access area
D Printer alignment
Explanation: Shared folders allow selected users to access the same set of files. It simplifies collaboration, reduces repeated sending of files, and keeps updates in one place with permission control.
In video conferencing, what is the most common security purpose of a meeting passcode
A Increase video quality
B Prevent unwanted entry
C Reduce bandwidth use
D Hide chat messages
Explanation: Passcodes limit who can join the meeting, reducing the chance of strangers entering through shared links. Along with waiting rooms, it helps maintain privacy and control in online sessions.
“End-to-end encryption” in messaging apps mainly means messages are readable only by
A Sender and receiver
B ISP staff
C Search engines
D Browser extensions
Explanation: End-to-end encryption ensures only the communicating users can read message content. Even the service provider typically cannot read it. It improves privacy, especially for sensitive chats and file sharing.
OTP is safer than a reusable code mainly because an OTP
A Works forever
B Needs no network
C Expires quickly
D Stores in cache
Explanation: OTPs are valid only for a short time and usually for one use. Even if someone sees it later, it cannot be reused, making account verification and transactions safer.
SMS-based OTP can be weaker than app-based OTP mainly due to risks like
A Browser zoom issues
B Low screen resolution
C Extra bookmarks
D SIM swap attacks
Explanation: In SIM swap attacks, criminals try to take control of your phone number to receive OTPs. App-based authenticators are often safer because codes stay inside the app on your device.
Which setting best reduces accidental background data use by apps on mobile networks
A Restrict background data
B Enable auto-play
C Increase video quality
D Keep hotspot on
Explanation: Restricting background data stops apps from using mobile data when not actively used. This controls data usage, saves costs, and helps ensure important tasks like video calls get enough bandwidth.
A common sign of a malicious download page is when it forces you to install a
A Standard PDF reader
B Unknown “required” tool
C Trusted office app
D Known browser update
Explanation: Scam sites often push unknown installers to “continue” or “download faster.” These can contain malware. Use official sources, avoid forced installs, and check publisher and file type before installing.
Which browser permission should be granted carefully because it can track your physical movement
A Font size
B Bookmark save
C Location access
D Cache clear
Explanation: Location permission can reveal your approximate or precise location to websites and apps. Allow it only for trusted services that truly need it, and deny it for unknown or unnecessary sites.
If a browser extension asks for permission to “read and change all data on websites,” the best action is
A Review and avoid
B Install immediately
C Share with friends
D Disable updates
Explanation: Such permissions can let an extension see and modify content on any site, including logins. Install extensions only from trusted sources, check reviews, and avoid unnecessary permissions for safety.
Why is “Reply All” risky in an email thread containing external recipients
A Clears your inbox
B Improves response time
C Reduces attachment size
D Shares information widely
Explanation: Reply All sends your message to everyone in To and CC, including external contacts. This can leak internal details. Use Reply All only when every recipient truly needs the information.
Which practice best supports professionalism when you must disagree in an email
A Use insults
B Use polite wording
C Use all caps
D Use one-word reply
Explanation: Polite wording keeps the conversation respectful and productive. State facts clearly, avoid emotional language, and suggest solutions. This reduces conflict and helps maintain a professional relationship.
Which cloud sharing mistake most commonly causes “anyone” to access a file
A Short filename used
B Cache cleared
C Public link enabled
D Low bandwidth
Explanation: When link sharing is set to “anyone with the link,” the file can be accessed by anyone who receives that link. For private data, use restricted sharing to specific accounts.
When a website asks to disable your browser security or antivirus to view content, it is most likely
A Unsafe request
B Normal procedure
C Required update
D Cloud sync step
Explanation: Legitimate sites rarely ask you to disable security tools. Such requests often indicate scams or malicious content. Leave protections on, exit the site, and use trusted sources instead.
A secure habit for identifying fake job or bank emails is to verify the link by
A Clicking quickly
B Sharing the email
C Typing official URL
D Forwarding to groups
Explanation: Instead of clicking a suspicious link, type the known official website address directly in the browser or use the official app. This avoids phishing pages that mimic real sites.
Reporting abuse or scams on online platforms is important mainly because it
A Increases bandwidth
B Helps stop attackers
C Clears cookies
D Improves display
Explanation: Reporting alerts the platform to harmful accounts, scams, and abusive behavior. It can lead to blocking, warnings, or removal, and helps protect other users from the same harmful activity.