0% found this document useful (0 votes)
222 views9 pages

Email Questions

Uploaded by

Alok kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
222 views9 pages

Email Questions

Uploaded by

Alok kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

E-mail MCQ

1. How can you tell the email that you have read from the email that you have not read?
a) The unread mail will be on top
b) The unread mail will be on botton
c) The unread mail will be bold
d) The unread mail will be blue
Ans. c

2. ______ is the exchange of computer stored messages by telecommunication.


a) Download
b) E-mail
c) Upload
d) All of these
Ans. b

3. Which of the following is an advantage of an email?


a) Desired length
b) Ease of communication
c) Lower cost
d) All of these
Ans. d

4. Junk email is also called_______


Ans. Spam

5. Unwanted repetitious messages, such as unsolicited bulk email is known as _______


Ans. Spam

6. SMTP stands for


a) Short mail transmission protocol
b) Small mail transmission protocol
c) Server Mail Transfer Protocol
d) Simple Main Transfer Protocol
Ans. d

7. In MS Office, ______ is the software for managing emails.


(a) MS Access (b) MS Publisher
(c) MS Outlook (d) MS Onenote
Ans. c

8. Transmission and delivery of information containing text, image, video, documents etc. to
targeted recepient(s) over the Internet is called _______ .
(a) email
(b) world wide web
(c) e-commerce
(d) social media
Ans. a

9. E-mail address is made up of ______


a) Single part b) Two parts
c) Three parts d) Four parts
Ans. B
10. The first part of email address identifies ______.
(a) name of individual user
(b) name of the email server
(c) name of the mobile phone operator
(d) name of bank
Ans. a

11. The second part of email address identifies ______ .


(a) name of individual user
(b) name of the email server
(c) name of the mobile phone operator
(d) name of bank
Ans. b

12. The user name and email server parts of an email address are separated by _______ symbol.
(a) @ (b) # (c) $ (d) &
Ans. a

13. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc.


are popular _______ .
(a) FTP servers
(b) social media sites
(c) email servers
(d) none of them
Ans. c

14. An email may contain non-text information which may be _______.


(a) uploaded (b) downloaded
(c) transmitted (d) erased
Ans. b

15. An image displayed on web page can be ________ to download the file.
(a) right click and choose save image as
(b) left click
(c) double click
(d) press delete button
Ans. a

16. Electronic communication between 2 persons having unique identifiers over the Internet is
called _______ .
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d

17. ______ is a technology that allows you to send and receive messages over the Internet
without the delay of traditional postal services.
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d
18. Each user of a email communication should possess _______ .
(a) a unique identifier, called email ID
(b) pen drive
(c) external hard disk
(d) DVD writer
Ans. a

19. The email ID of a person contains _______ parts.


(a) 2 (b) 3
(c) 4 (d) 5
Ans. a

20. In email communication, CC stands for _____.


(a) carbon copy
(b) cold coffee
(c) blind carbon copy
(d) casual copy
Ans. a

21. In email communication, BCC stands for _______.


(a) carbon copy
(b) cold coffee
(c) blind carbon copy
(d) casual copy
Ans. c

22. The email ID of the secondary recipient of email is entered in ______ field.
(a) To (b) CC
(c) BCC (d) Subject
Ans. b

23. The email ID of the anonymous recipient of email is entered in ______ field.
(a) To (b) CC
(c) BCC (d) Subject
Ans. c

24. The crisp essence of email message is entered in ______ field.


(a) To (b) CC
(c) BCC (d) Subject
Ans. d

25. The file attached to an email is called the _______ .


(a) content (b) attachment
(c) subject (d) BCC
Ans. b

26. An email sent from unknown persons for improving the sale, image, appeal or other
characteristics of a product is called_____.
(a) Junk (b) Important
(c) Virus (d) Trojan
Ans. a
27. ______ mail refers to e-mail messages sent by an unknown sender, usually for commercial
purposes.
(a) Junk (b) Important
(c) Virus (d) Trojan
Ans. a

28. Unsolicited emails may be filtered and separated into _______ .


(a) spam bin (b) inbox (c) sent mails (d) draft
Ans. a

29. All emails sent by the user may be saved in _______ .


(a) spam bin (b) inbox (c) sent mails (d) draft
Ans. c

30. A half completed email may be saved for later editing and transmission to the receiver in
______ folder.
(a) spam bin (b) inbox (c) sent mails (d) draft
Ans. d

31. Before entering user ID and password, one should ensure that the browser displays ______
icon for safe communication with the server.
(a) print (b) lock (c) clock (d) lens
Ans. b

32. Logging into an email server from a dedicated application (APP) installed on a smartphone
helps to _______ email messages.
(a) auto delete
(b) hide
(c) periodically check, retrieve and notify
(d) purge
Ans. c

33. It is a good practice to _______ email messages from unknown senders to avoid virus
infection of computer.
(a) avoid opening attachments in
(b) open message and all attachments of
(c) sit looking for
(d) invite more spammers to send
Ans. a

34. Images and videos attached to a junk email may ______.


(a) contain anti-virus
(b) repair troubles in the operating system
(c) help fast working of computers
(d) contain trojens and viruses to attack a computer
Ans. d

35. Opening a new email ID requires entry of _______ in the email opening form.
(a) name and address
(b) date of birth and father name
(c) alternate email ID if necessary
(d) all of them
Ans. D
36. There are Four Scenarios in
a) Servers
b) Domains
c) IP
d) Email
Ans. d

37. In Email, We need two Vas and two pairs of MTAs, When sender is connected to mail server
via
a) MTA and VTA
b) LAN and WAN
c) IP and SMS
d) Email and IP
Ans. b

38. Mail access starts with client when user needs to download e-mail from the
a) Mail Box
b) Mail Server
c) IP server
d) Internet
Ans. a

39. When sender and receiver of an e-mail are on same system, we need only two
a) IP
b) Domain
c) Servers
d) User Agents
Ans. d

40. At beginning of Internet era, messages sent by electronic mail were short and consisted of
a) Words only
b) Line only
c) Text Only
d) Numbers Only
Ans. c

41. When the mail server sends mail to other mail servers it becomes _______
a) SMTP server
b) SMTP client
c) Peer
d) None of these
Ans. b

42. If you have to send multimedia data over SMTP it has to be encoded into ______
a) Binary b) Signal
c) ASCII d) None of these
Ans. c

43. In SMTP, the command to write receivers mail to write receivers mail address is written this
command
a) SEND TO b) RCPT TO
c) MAIL TO d) None of these
Ans. B
44. The underlying Transport layer protocol used by SMTP is
a) TCP
b) UDP
c) Either A or B
d) None of these
Ans. a

45. Choose the statement which is wrong incase of SMTP


a) It requires message to be in 7bit ASCII format
b) It is a pull protocol
c) It transfers files from one mail server to another mail server
d) None of these
Ans. b

46. Internet mail places each object in


a) Separate messages for each object
b) One message
c) Varies with numbers of objects
d) None of these
Ans. b

47. Typically the TCP port used by SMTP is


a) 25
b) 35
c) 50
d) 15
Ans. a

48. A session may include


a) Zero or more SMTP transactions
b) Exactly one SMTP transactions
c) Always more than one SMTP transactions
d) Number of SMTP transactions can’t be determined
Ans. a

49. Example of user agents for e-mail


a) Microsoft Outlook
b) Apple Mail
c) Both A and B
d) None of these
Ans. a

50. When the sender and the receiver of an email are on different systems, we need only _____
a) One MTA
b) Two UAs
c) Two UAs and one pair of MTAs
d) Two UAs and Two pairs of MTAs
Ans. d

51. User Agents does not support this


a) Composing messages b) Reading messages
c) Replying messages d) All of these
Ans. d
52. Simple mail transfer protocol (SMTP) utilizes _____ as the transport layer protocol for
electronic mail transfer.
a) TCP
b) UDP
c) DCCP
d) SCTP
Ans. a

53. SMTP connections secured by SSL are known as


a) SMTPS
b) SSMTP
c) SNMP
d) None of these
Ans. a

54. Which one of the following protocol is used to receive mail messages?
a) SMTP
b) Post office protocol
c) internet message access protocol
d) All of these
Ans. d

55. An email client needs to know the ____ of its initial SMTP server.
a) IP address
b) MAC address
c) URL
d) None of these
Ans. a

56. A SMTP session may include


a) Zero SMTP transaction
b) One SMTP Transaction
c) More than one SMTP transactions
d) all of these
Ans. d

57. SMTP defines


a) message transport
b) message encryption
c) message content
d) none of these
Ans. a

58. Which one of the following is an SMTP server configured in such a way that anyone on the
internet can send e-mail through it?
a) open mail relay
b) wide mail reception
c) open mail reception
d) None of these
Ans. a
1. Your inbox contains over 2000 emails. Many of them are from your boss and many of them
contain attachments. What is the fastest way to find the on huge video file that your boss sent you
months ago?
a) search on the word “video”
b) click all, Arrange by, From, and look for your boss’s name
c) click all, Arrange by, Attachments, and look through the email with attachments
d) click All, Arrange By, Size, and look at the largest emails

2. You’d like each of the emails you sent to display your name and other details automatically at
the end of the message. Which feature helps you to set this up?
a) Footers b) Signatures c) Tables d) Frames

3. You want to send a lesson plan written using Microsoft Word that you have saved in Your
computer to another teacher. The best way to do this is ….
a) Send the file as an attachment to an email
b) Retype the lesson into an email
c) Copy and paste the lesson into an email
d) Print a hard copy of the lesson and bring it to the teacher

4. If you want to send an email you have received to another person, the best way to do so is…
a) Retype it into a new email message
b) Copy and paste it into a new email message
c) Forward the email
d) Ask the original sender to send it to the person for you

5. Who is the father of email?


a) Tim Berners Lee
b) Charles Babbage
c) Paul Buchheit
d) Ray Tomlinson

6. In e-mail, what does e stand for?


a) Electrical
b) Electronic
c) Emerging
d) Effected

7. Which of the following is not an email platform website?


a) Gmail.com
b) Google.com
c) Rediffmail.com
d) Yahoo.com

8. An email address contains ________ parts separated by a @ symbol.


(a) 5 (b) 4 (c) 3 (d) 2

9. Which of the following is a correct format of Email address?


a)name@website@info
b) name@website.info
c)www@ name of website@com
d) name@website.com
10. To download an email attachment, the user_____ the attachment.
(a) clicks (b) right clicks and chooses save
(c) both a & b (d) neither a nor b

11. The email ID of the primary recipient of email is entered in ______ field.
(a) To (b) CC
(c) BCC (d) Subject

12. The actual message of an email is called the _______ .


(a) content (b) attachment
(c) subject (d) BCC

13. The primary place for receiving an email is _______ .


(a) spam bin (b) inbox
(c) sent mails (d) draft

14. Which of these is not a medium of e-mail?


a) Intranet b) Internet
c) Extranet d) Paper

15. Which of these is the easiest way of communication?


a) E-mail b) Telephone
c) Fax d) Letter

16. Which of these should be avoided in an E-mail?


a) Wrong E-mail address b) Subject line
c) Smileys d) Re-reading

17. MIME stands for______


a) Multipurpose Internet Mail Extensions
b) Multipurpose internet Mail Email
c) Multipurpose Internet Mail End
d) Multipurpose Internet Mail Extra

Click here for Answers

GK EDITORIAL
Telegram https://t.me/gkeditorialOfficial

Computer Best MCQ Book in Just Rs.39/- [7000+ Question in English]


https://imojo.in/27ql6f4

Computer GK for Competitive Exams [10000 MCQ in English]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy