Chapter 9: Internet, Email, and Online Communication (Set-7)
When you click a browser back button, it mostly helps you
A Delete cache files
B Return previous page
C Send an email
D Upload cloud files
Explanation: The back button takes you to the previously visited page in the browser history. It helps navigation while browsing websites, especially when moving between search results and web pages.
The “refresh” button in a browser is mainly used to
A Reload current page
B Increase bandwidth
C Clear all cookies
D Create bookmarks
Explanation: Refresh reloads the current webpage from the server or cache. It helps when a page is not loading properly or when you want to see updated content.
Which part of a web address identifies the main website name
A Email inbox
B Subject line
C File manager
D Domain name
Explanation: The domain name is the main address of a website, such as example.com. It helps locate the correct server on the internet using DNS and then loads the requested pages.
In a URL, the “https” part indicates
A Offline browsing
B Higher bandwidth
C Secure connection
D Faster CPU
Explanation: HTTPS indicates encrypted communication between the browser and website using TLS. It protects data like passwords from being easily intercepted, especially on public networks.
Which browser feature helps prevent unwanted pop-up windows
A Screen magnifier
B Download manager
C Task scheduler
D Pop-up blocker
Explanation: A pop-up blocker stops unwanted windows that may contain ads or scams. It improves browsing comfort and reduces the chance of clicking misleading or harmful pop-ups.
Which option saves a website address so you can open it quickly later
A Bookmark
B Cache
C Cookie
D Spam
Explanation: A bookmark stores the URL of a webpage for quick future access. It helps you revisit important pages without searching again and can be organized into folders.
A search engine is mainly used to
A Block malware
B Store cloud files
C Send OTP codes
D Find web pages
Explanation: A search engine finds web pages based on keywords and shows results ranked by relevance. It helps users quickly locate information, websites, documents, and services online.
What does “cache” mainly store in a browser
A Email addresses
B Temporary website files
C Password rules
D Printer drivers
Explanation: Cache stores copies of files like images and scripts to load websites faster next time. Clearing cache can fix display issues when the browser shows outdated page content.
Cookies are mainly used by websites to
A Remember user sessions
B Increase screen size
C Repair internet cable
D Create new folders
Explanation: Cookies store small data like login sessions and preferences. They help websites remember you, but managing cookies improves privacy and can reduce unwanted tracking.
Which of these is an example of a web browser
A Notepad editor
B MS Excel
C Windows Media
D Google Chrome
Explanation: Google Chrome is a web browser used to access websites and online services. Browsers display webpages, handle downloads, and support features like tabs, bookmarks, and history.
ISP in internet services stands for
A Internal Security Program
B Image Search Platform
C Internet Service Provider
D Internet Sharing Protocol
Explanation: An ISP provides internet access to users through fiber, cable, or mobile data. It connects homes and offices to the internet and offers plans with different speeds and data limits.
Bandwidth mainly refers to
A Data transfer rate
B Screen brightness
C Email spam count
D Browser history size
Explanation: Bandwidth is the amount of data that can pass through a connection per second. Higher bandwidth usually supports faster downloads and smoother streaming, especially with many users.
Latency mainly means
A File storage limit
B Network response delay
C Email address type
D Browser theme color
Explanation: Latency is the time delay between sending a request and receiving a response. Lower latency gives smoother video calls and faster feeling responses when using websites and online apps.
Which operator helps restrict search results to a specific website
A link: operator
B filetype: operator
C intitle: operator
D site: operator
Explanation: Using site: limits results to one domain, like site:gov.in. This helps find information from a trusted website and avoids unrelated pages from other sources.
Which operator helps search only PDF documents
A filetype:pdf
B site:pdf
C title:pdf
D inurl:pdf
Explanation: filetype:pdf filters results to PDF format. It is useful for finding forms, notes, reports, and official documents that are often shared as PDF files.
In email, the main place where incoming emails appear is
A Outbox
B Drafts
C Sent
D Inbox
Explanation: The inbox stores received emails. Users can open messages, reply, forward, mark spam, or organize emails into folders and labels for better management.
The “compose” option in email is used to
A Delete old mails
B Write new message
C Block spam mails
D Clear browsing data
Explanation: Compose opens a new email window where you add recipients, subject, message text, and attachments. After checking details, you send it to deliver the email.
“Attachment” in email means
A Added file
B Email subject
C Browser cookie
D Internet speed
Explanation: An attachment is a file included with an email, such as a PDF or image. Always verify the correct file is attached and check size limits before sending.
CC in email is used to
A Hide recipients
B Block spam
C Inform others
D Increase storage
Explanation: CC sends a visible copy to people who should be informed. They are not always expected to reply, but they can see the message and all other To and CC recipients.
BCC in email is used to
A Change password
B Increase bandwidth
C Compress files
D Hide recipients
Explanation: BCC hides recipient addresses from others. It is useful when sending a message to many people to protect privacy and reduce unnecessary reply-all confusion.
Which email part should briefly summarize the message topic
A Subject line
B Signature block
C Inbox folder
D Spam filter
Explanation: A clear subject tells what the email is about. It helps recipients understand quickly and makes messages easier to search later, improving professional communication and organization.
Good email etiquette suggests you should avoid
A Proofreading message
B Using greeting
C Using clear subject
D Using ALL CAPS
Explanation: ALL CAPS looks like shouting and can feel rude. Professional emails should use polite tone, correct formatting, and clear sentences to reduce misunderstanding.
Proofreading an email before sending helps you
A Increase internet speed
B Add more storage
C Catch errors
D Block all ads
Explanation: Proofreading helps avoid spelling mistakes, wrong names, missing attachments, and unclear sentences. It improves clarity and professionalism, especially in official or workplace communication.
Cloud storage is best described as
A Online file storage
B Offline printer tool
C Keyboard shortcut
D Screen setting
Explanation: Cloud storage saves files on internet servers. It allows access from anywhere, supports backup, and makes sharing and collaboration easier compared to keeping files only on one device.
Google Drive is an example of
A Email protocol
B Web browser
C Search engine
D Cloud service
Explanation: Google Drive is a cloud storage platform. Users upload files, organize folders, share links, and work collaboratively on documents with permission controls.
Uploading a file means
A Save to device
B Remove from cloud
C Send to cloud
D Rename file
Explanation: Uploading transfers a file from your device to an online platform like Google Drive. It supports backup, access from other devices, and easy sharing without email attachments.
A sharing link mainly allows others to
A Increase bandwidth
B Access shared file
C Clear browser cache
D Create email account
Explanation: A sharing link lets others open a cloud file without sending it as an attachment. Access depends on permissions like view-only or edit, improving controlled sharing.
Permissions in file sharing decide whether others can
A Block spam
B Change Wi-Fi speed
C Reduce latency
D View or edit
Explanation: Permissions set access levels for shared files. View allows reading, edit allows changes. Proper permissions protect important documents while allowing collaboration with trusted users.
OTP stands for
A One Time Password
B Open Transfer Program
C Online Text Package
D Office Tool Plugin
Explanation: OTP is a temporary code used for verification in logins or payments. It is valid for a short time and helps prevent unauthorized access when used with passwords.
Two-factor authentication improves safety by adding
A Larger email storage
B Second verification step
C Faster internet speed
D More bookmarks
Explanation: Two-factor authentication requires a password plus a second proof like OTP or authenticator code. This protects accounts even if someone learns your password.
Video conferencing is mainly used for
A File compression
B Offline scanning
C Disk formatting
D Online meetings
Explanation: Video conferencing enables real-time meetings with audio and video. It supports online classes, interviews, and office meetings, often including chat and screen sharing features.
Screen sharing in meetings means
A Show your screen
B Clear browsing history
C Send email attachment
D Block pop-up ads
Explanation: Screen sharing lets others see your screen during a call. It is useful for teaching and presentations but should be used carefully to avoid sharing private files or notifications.
A digital footprint refers to
A Mouse speed setting
B CPU heat level
C Online activity record
D Printer ink usage
Explanation: A digital footprint is the trace you leave online through searches, posts, and visits. It can remain for long time, so share carefully and use privacy settings.
Ad-blockers mainly help by
A Increasing RAM size
B Reducing unwanted ads
C Fixing network cable
D Creating new emails
Explanation: Ad-blockers reduce intrusive ads and some tracking scripts. They improve browsing comfort and sometimes speed, but they do not replace antivirus or secure browsing habits.
Pop-up blockers mainly prevent
A DNS failures
B Email spam
C Cloud sync errors
D Unwanted pop-up windows
Explanation: Pop-up blockers stop unwanted windows that may contain misleading ads or harmful links. This reduces accidental clicks and improves browsing safety and comfort.
Public Wi-Fi is risky mainly because
A Data may be intercepted
B Screen becomes smaller
C Storage becomes full
D Cache clears itself
Explanation: Public Wi-Fi can be insecure and may allow attackers to capture data. Avoid sensitive logins, use HTTPS, and prefer VPN or mobile data for important activities.
Phishing messages try to
A Increase bandwidth
B Clear cookies
C Steal sensitive details
D Improve browser speed
Explanation: Phishing emails or messages trick users into sharing passwords, OTPs, or bank details. Verify sender and links, and never share OTPs with anyone.
The safest action for an unknown email attachment is
A Disable antivirus
B Open instantly
C Forward to group
D Do not open
Explanation: Unknown attachments may contain malware. Verify the sender first, scan the file, and open only when you expect it and trust the source.
Clearing cookies often causes
A Faster Wi-Fi
B Log out sessions
C Better CPU speed
D Bigger cloud space
Explanation: Cookies store login sessions and preferences. Clearing them often signs you out of websites and resets settings, which helps privacy but requires logging in again.
Private browsing mode mostly means
A No history saved
B No tracking exists
C Faster browsing
D No virus risk
Explanation: Private mode does not save history and usually clears cookies after closing. It improves privacy on shared devices, but websites and internet providers may still track activity.
Data saver mode helps because it
A Increases video quality
B Clears inbox
C Reduces data usage
D Adds cloud quota
Explanation: Data saver reduces background data and may lower media quality. It helps manage mobile data, avoid extra charges, and keep internet usable longer.
Reporting abuse on platforms helps to
A Improve screen color
B Increase bandwidth
C Clear browser cache
D Take action against misuse
Explanation: Reporting alerts platforms about harassment, scams, or harmful content. It helps moderation teams block or remove offenders, improving safety for you and other users.
A strong password should be
A Long and unique
B Short and same
C Only your name
D Only 123456
Explanation: Strong passwords are long, unique for each account, and hard to guess. Using letters, numbers, and symbols improves security and reduces risk from password reuse.
A password manager is useful because it
A Fixes hardware
B Increases bandwidth
C Clears spam mails
D Stores strong passwords
Explanation: Password managers store and generate strong unique passwords. This avoids reuse, reduces forgetting, and improves account security while making login management easier.
Version history in cloud files helps you
A Increase storage
B Restore older version
C Block popups
D Send emails
Explanation: Version history lets you view and restore previous file versions. It is very helpful when someone edits wrongly or deletes content during collaboration.
Sync in cloud storage mainly means
A Keep files updated
B Delete all files
C Change file type
D Block spam mails
Explanation: Sync keeps files consistent across devices. If you update a file on one device, the cloud updates it and shows the latest version on other connected devices.
A cloud backup is helpful when
A Screen is bright
B Browser is updated
C Email is short
D Device is lost
Explanation: Cloud backup keeps a safe copy online. If your phone or laptop is lost or damaged, you can restore important files, reducing chances of permanent data loss.
Using BCC is best when you want to
A Increase email size
B Speed up Wi-Fi
C Protect recipients privacy
D Clear browser history
Explanation: BCC hides addresses from other recipients. It prevents sharing email IDs widely and reduces reply-all confusion, making it good for announcements to large groups.
Clicking unknown links is risky mainly due to
A Phishing and malware
B Better bookmarks
C Faster loading
D More storage
Explanation: Unknown links can lead to fake login pages or malware downloads. Always check the domain, avoid urgent messages, and use official sites or apps for secure access.
Blocking a user in chat apps mainly does
A Improve bandwidth
B Increase cloud quota
C Clear cookies
D Stop future messages
Explanation: Blocking prevents the person from messaging or calling you. It is useful against spam or harassment, and combined with reporting it improves online communication safety.