Computer Awareness( E-mail) MCQ,s

 

Computer Awareness MCQ,s Email  Very Important Questions


Computer Awareness MCQ,s Part -2 ( HP JOA IT )


1. How can you tell the email that you have read from the email that you have not read?

a) The unread mail will be on top

b) The unread mail will be on bottom

c) The unread mail will be bold

d) The unread mail will be blue

 

2. ______ is the exchange of computer stored messages by telecommunication.

a) Download

 b) E-mail

c) Upload

d) All of these

 

 

3. Which of the following is an advantage of an email?

a) Desired length

b) Ease of communication

c) Lower cost

d) All of these

 

 

4. SMTP stands for

a) Short mail transmission protocol

b) Small mail transmission protocol

c) Server Mail Transfer Protocol

d) Simple Main Transfer Protocol

 

5. in MS Office, ______ is the software for managing emails.

(a) MS Access 

(b) MS Publisher

(c) MS Outlook 

(d) MS One-note

 

6. Transmission and delivery of information containing text, image, video, documents etc. to targeted recipient(s) over the Internet is called _______

(a) Email

(b) World Wide Web

(c) e-commerce

(d) Social media

 

7. E-mail address is made up of ______

a) Single part 

b) Two parts

c) Three parts

d) Four parts

8. The first part of email address identifies ______.

(a) Name of individual user

(b) Name of the email server

(c) Name of the mobile phone operator

(d) Name of bank

 

9. The second part of email address identifies ______.

(a) Name of individual user   

(b) Name of the email server

(c) Name of the mobile phone operator 

(d) Name of bank

 

10. The user name and email server parts of an email address are separated by _______ symbol.

(a) @  

(b) # 

(c) $  

(d) &

 

11. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc. are popular _______.

(a) FTP servers

(b) Social media sites

(c) Email servers

(d) None of them

 

12. An email may contain non-text information which may be _______.

(a) Uploaded  

(b) Downloaded

(c) Transmitted

(d) Erased

 

 

13. An image displayed on web page can be ________ to download the file.

(a) Right click and choose save image as

(b) Left click

(c) Double click

(d) Press delete button

 

 

14. Electronic communication between 2 persons having unique identifiers over the Internet is called _______.

(a) India post

(b) Speed post

(c) Registered post

(d) Email

 

 

15. ______ is a technology that allows you to send and receive messages over the Internet without the delay of traditional postal services.

(a) India post  

(b) Speed post

(c) Registered post 

(d) Email

 

 

16. Each user of an email communication should possess _______.

(a) A unique identifier, called email ID

(b) Pen drive

(c) External hard disk

(d) DVD writer

 

17. The email ID of a person contains _______ parts.

(a) 2 

(b) 3

(c) 4  

(d) 5

 

18. in email communication, CC stands for _____.

(a) Carbon copy

(b) Cold coffee

(c) Blind carbon copy

(d) Casual copy

 

19. in email communication, BCC stands for _______.

(a) Carbon copy

(b) Cold coffee

(c) Blind carbon copy

(d) Casual copy

 

21. The email ID of the secondary recipient of email is entered in ______ field.

(a) To  

(b) CC

(c) BCC 

(d) Subject

 

 

 

22. The email ID of the anonymous recipient of email is entered in ______ field.

(a) To  

(b) CC 

(c) BCC 

(d) Subject

 

23. The crisp essence of email message is entered in ______ field.

(a) To  

(b) CC

(c) BCC

(d) Subject

 

24. The file attached to an email is called the _______.

(a) Content  

(b) Attachment

 (c) Subject  

(d) BCC

 

25. an email sent from unknown persons for improving the sale, image, appeal or other characteristics of a product is called _____.

(a) Junk 

(b) Important 

(c) Virus 

(d) Trojan

 

26. ______ mail refers to e-mail messages sent by an unknown sender, usually for commercial purposes.

(a) Junk 

(b) Important 

(c) Virus 

(d) Trojan

 

27. Unsolicited emails may be filtered and separated into _______.

(a) Spam bin  

(b) Inbox

(c) Sent mails 

(d) Draft

 

 

 

28. Logging into an email server from a dedicated application (APP) installed on a Smartphone helps to _______ email messages.

(A) Auto deletes  

(b) Hide

(c) Periodically check, retrieve and notify

(d) Purge

 

29. A SMTP session may include

a) Zero SMTP transaction

b) One SMTP Transaction

c) More than one SMTP transactions

D) all of these

 

 

30. SMTP defines

a) Message transport

b) Message encryption

c) Message content

d) None of these

 

 

31. Who is the father of email?

a) Tim Burners Lee 

b) Charles Babbage

c) Paul Brochette 

d) Ray Tomlinson

 

 

32. Which of the following is not an email platform website?

a) Gmail.com

b) Google.com

c) Rediff mail.com

d) Yahoo.com

 

 

33. An email address contains ________ parts separated by @ symbol.

(a) 5  

(b) 4 

(c) 3  

(d) 2

 

 

34. The email ID of the primary recipient of email is entered in ______ field.

(a) To  

(b) CC

(c) BCC 

(d) Subject

 

35. The actual message of an email is called the _______.

(a) Content  

(b) Attachment

(c) Subject  

(d) BCC

 

10000+ Computer Awareness MCQ,s List


Post a Comment

Thanks for Your Response

Previous Post Next Post