Internet Technology MCQs: Boost Your Computer Awareness
Update:
... minute read
Welcome to the Computer General Awareness MCQ series! Today, we're focusing on the Internet—a topic frequently covered in government exams like SSC CGL, Banking, and others. Understanding basic internet concepts is key for success in your exams.
Let's break down essential topics and get you exam-ready with some useful information!
The Internet is a global network connecting millions of devices worldwide, allowing them to share data. It is the backbone of modern communication and serves as a platform for services like email, web browsing, cloud storage, and social media.
Here’s a quick overview of key internet concepts you need to know:
Concept
Description
Internet Protocols (IP)
Protocols like TCP/IP are responsible for data transmission between devices.
IP Address
A unique address for devices on the internet (e.g., IPv4, IPv6).
Web Browser
Software to access websites (e.g., Chrome, Firefox, Safari).
Search Engines
Tools for finding information (e.g., Google, Bing, Yahoo!).
Email Services
Platforms for sending/receiving emails (e.g., Gmail, Yahoo Mail).
Cloud Storage
Online storage solutions (e.g., Google Drive, Dropbox).
The Internet is a crucial topic for exams like SSC CGL, Banking, and Railways. Questions often cover:
Basic internet terminology
Internet history and key figures
Common services and applications
Browsers, email, and search engines
Networking basics (LAN, WAN)
PracticeShow All Answers
Q1: Who invented the internet?
A. Steve Jobs
B. Jaap Haartsen
C. Jan Koum
D. Vint Cerf
Vint Cerf, along with Robert Kahn, is credited with inventing the Internet. They developed the TCP/IP protocols that form the basis of the Internet.
Q2: When sending an e-mail, the ________ line describes the contents of the message.
A. Subject
B. To
C. Contents
D. CC
E. None of these
The "Subject" line in an e-mail is used to describe the contents of the message. It helps the recipient understand the purpose of the e-mail before opening it.
Q3: ________ is a device used for data transmission through telecommunication lines.
A. Drives
B. Modem
C. Platform
D. All of these
E. None of these
A modem (modulator-demodulator) is a device that modulates and demodulates signals for data transmission through telecommunication lines, such as telephone lines.
Q4: Unsolicited e-mail is called a ________ .
A. Newsgroup
B. Usenet
C. Backbane
D. Spam
E. None of these
Unsolicited e-mail, often containing advertisements or promotions, is commonly referred to as spam. Spam can clutter inboxes and is often sent in bulk to many recipients.
Q5: Inventor of WWW is ________ .
A. Bill Gates
B. Lee. N. Feyong
C. N. Resscl
D. Tim Berners Lee
Tim Berners-Lee is the inventor of the World Wide Web (WWW). He developed the first web browser and web server, and created the HTML language used to write web pages.
Q6: Which of the following is not a term of information technology?
A. Cyber space
B. Upload
C. Light storage
D. Modem
E. None of these
"Light storage" is not a standard term in information technology. The other options—cyberspace, upload, and modem—are commonly used terms in IT.
Q7: Spam is related to ________ .
A. Computer
B. Art
C. Music
D. Game
E. None of these
Spam is related to computers, specifically to the sending of unsolicited e-mails. It is a significant issue in the field of information technology and cybersecurity.
Q8: Passwords enable users to ________ .
A. Get into the system quickly
B. Make efficient use of time
C. Retain confidentiality of files
D. Simplify file structure
E. None of these
Passwords are used to retain the confidentiality of files and systems by restricting access to authorized users only. They help ensure that only those with the correct credentials can access sensitive information.
Q9: What is an e-mail?
A. An internet standard, which allows users to upload and download files
B. An online area on which a user can converse in written form about any special subject
C. Transmission of files and messages through computer network
D. A real time typed conversation
E. None of these
E-mail (electronic mail) is the transmission of files and messages through a computer network. It allows users to send and receive messages, documents, and other files electronically.
Q10: A chat is-
A. An internet standard, which all users use to upload and download files
B. An online area on which a user can converse in written form about any subject
C. Transmission of files and messages through computer network
D. A real time typed conversation
E. None of these
A chat is a real-time typed conversation that takes place over a computer network. It allows users to communicate with each other in real-time through text-based messages.
Q11: Secret code that restricts entry in the same programs is-
A. Password
B. Passport
C. Entry code
D. Access code
E. None of these
A password is a secret code that restricts entry to programs, systems, or accounts. It is used to authenticate users and ensure that only authorized individuals can access specific resources.
Q12: Sending an e-mail is like a ________ .
A. Creating an image of any event
B. Telling a story
C. Writing a letter
D. Creating an image
E. None of these
Sending an e-mail is similar to writing a letter. Both involve composing a message, addressing it to a recipient, and sending it through a delivery system (e-mail server or postal service).
Q13: The process of a computer receiving information from a server on the internet is known as-
A. Pulling
B. Pasting
C. Downloading
D. Transforming
E. None of these
The process of a computer receiving information from a server on the internet is known as downloading. This involves transferring data from a remote server to a local computer.
Q14: IT stands for-
A. Information technology
B. Integrated technology
C. Intelligent technology
D. Interesting technology
E. None of these
IT stands for Information Technology, which encompasses the use of computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data.
Q15: Sending an e-mail is similar to-
A. Petering an event
B. Narrating a store
C. Writing a letter
D. Creating a drawing
E. None of these
Sending an e-mail is similar to writing a letter. Both involve composing a message, addressing it to a recipient, and sending it through a delivery system (e-mail server or postal service).
Q16: E-commerce allows companies to-
A. Issue important business reports
B. Conduct business over the internet
C. Support decision making processes
D. Keep track of paper based transaction
E. None of these
E-commerce (electronic commerce) allows companies to conduct business over the internet. This includes buying and selling products and services, as well as conducting financial transactions online.
Q17: Junk e-mail is also called-
A. Spam
B. Spoof
C. Sniffer script
D. Spool
E. None of these
Junk e-mail is also called spam. Spam refers to unsolicited, often commercial, e-mails sent in bulk to a large number of recipients.
Q18: The internet allows you to-
A. Send e-mail
B. View web pages
C. Connect to servers all around the world
D. All of the above
E. None of these
The internet allows users to send e-mail, view web pages, and connect to servers all around the world. It is a global network of interconnected computers that facilitates various forms of communication and information sharing.
Q19: A program designed to destroy data on your computer which can travel to infect other computers is called a -
A. Disease
B. Tarpedo
C. Hurricave
D. Virus
E. None of these
A virus is a program designed to destroy data on your computer and can travel to infect other computers. It is a type of malicious software (malware) that can cause significant damage to computer systems.
Q20: What is the most common way to get a virus in your computer's hard disk?
A. By installing games from CD ROMs
B. By opening e-mails
C. By uploading pictures from mobile to the computers
D. By sending e-mails
E. None of these
The most common way to get a virus in your computer's hard disk is by opening e-mails, especially those from unknown or suspicious sources. E-mails can contain malicious attachments or links that, when opened, can infect the computer.
Q21: Marketing of internet banking means-
A. Meeting of banks on the net
B. Net Practice
C. Marketing the usage of banking transactions through internet
D. Transactions with forcing countries
E. None of these
Marketing of internet banking means promoting the usage of banking transactions through the internet. This includes advertising the benefits and convenience of online banking to potential customers.
Q22: ________ are devices used to transmit data over telecommunications lines.
A. Drives
B. Drive bays
C. Modems
D. Platform
E. None of these
Modems are devices used to transmit data over telecommunications lines. They convert digital data into a format suitable for transmission over analog telephone lines.
Q23: Most websites have a main page, the ________ which acts as a doorway to the rest of the website pages.
A. Search engine
B. Home page
C. Browser
D. URL
E. None of these
Most websites have a main page called the home page, which acts as a doorway to the rest of the website pages. The home page is the first page visitors see when they access the website and typically contains links to other sections of the site.
Q24: If you are going to a site you use often, instead of having to type in the address every time, you should
A. Save it as a file
B. Make a copy of it
C. Bookmark it
D. Delete it
E. None of these
If you are going to a site you use often, you should bookmark it. Bookmarking allows you to save the website address in your browser for easy access in the future, eliminating the need to type in the address each time.
Q25: Output which is made up of pictures, sounds, and video is called ________ .
A. COM
B. Hard copy
C. Graphics
D. Multimedia
E. None of these
Output that is made up of pictures, sounds, and video is called multimedia. Multimedia refers to content that uses a combination of different forms of media, such as text, audio, images, animations, and video.
Q26: WWW stands for ________ .
A. World Work Web
B. Wide Work Web
C. Wide World Web
D. World Wide Web
E. None of these
WWW stands for World Wide Web. It is a global network of interconnected websites and web pages, accessible through the internet.
Q27: The vast network of computers that connects millions of people all over the world is called ________ -
A. LAN
B. Web
C. Hypertext
D. Internet
E. None of these
The vast network of computers that connects millions of people all over the world is called the Internet. It is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link devices worldwide.
Q28: Coded entries which are used to gain access to a computer system are called ________ .
A. Entry codes
B. Passwords
C. Security commands
D. Codewords
E. None of these
Coded entries used to gain access to a computer system are called passwords. Passwords are a string of characters used to verify the identity of a user and grant access to a system or account.
Q29: The "home page" of a website is ________ .
A. The largest page
B. The last page
C. The first page
D. The most colorful page
E. None of these
The "home page" of a website is the first page. It is the main page that visitors see when they access the website and typically contains links to other sections of the site.
Q30: The internet is a system of ________ .
A. Software bundles
B. Web page
C. Website
D. Interconnected networks
E. None of these
The internet is a system of interconnected networks. It consists of a global collection of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link devices worldwide.
Q31: The ________ also called the web, contains billions of documents.
A. World Wide Web
B. HTTP
C. Web portal
D. Domain
E. None of these
The World Wide Web, also called the web, contains billions of documents. It is a global network of interconnected websites and web pages, accessible through the internet.
Q32: What is an e-mail attachment?
A. A receipt sent by the recipient
B. A separate document from another program sent along with an e-mail message
C. A malicious parasite that feeds off of your messages and destroys the contents
D. A list of CC or BCC recipients
E. None of these
An e-mail attachment is a separate document from another program sent along with an e-mail message. It allows users to send files, such as documents, images, or other data, along with their e-mail messages.
Q33: Which of the following are all considered advantages of e-mail?
A. Convenience, speed of delivery, generality and reliability
B. Printable, global and exposing
C. Global, convenience and Microsoft word
D. Slow delivery, reliable, global and inexpensive
E. None of these
The advantages of e-mail include convenience, speed of delivery, generality, and reliability. E-mail allows users to send and receive messages quickly and efficiently, from anywhere in the world.
Q34: A ________ is a software program used to view Web pages.
A. site
B. host
C. link
D. browser
E. None of these
A browser is a software program used to view Web pages. It allows users to access and navigate the World Wide Web, displaying web pages and other online content.
Q35: ________ allows voice conversations to travel over the Internet.
A. Internet telephony
B. Instant messaging
C. E-mail
D. E-commerce
E. None of these
Internet telephony allows voice conversations to travel over the Internet. It enables users to make and receive phone calls using the internet, often at a lower cost than traditional phone services.
Q36: Which of the following is not true concerning user IDs and passwords?
A. When you enter your user ID and password, the computer knows it is you
B. If your computer asks for a user ID and password, you can create your own
C. Sometimes you are assigned a user ID and password for security reasons
D. You should share your user ID and password with at least one other person
E. None of these
It is not true that you should share your user ID and password with at least one other person. Sharing user IDs and passwords can compromise the security of your accounts and systems, and it is generally recommended to keep them confidential.
Q37: What is a modem connected to?
A. processor
B. mother board
C. printer
D. phone line
E. None of these
A modem is connected to a phone line. It converts digital data from a computer into a format suitable for transmission over analog telephone lines, and vice versa.
Q38: An e-mail address typically consists of a user ID followed by the ________ sign and the name of the e-mail server that manages the user's electronic post office box.
A. @
B. #
C. &
D. *
E. None of these
An e-mail address typically consists of a user ID followed by the @ sign and the name of the e-mail server that manages the user's electronic post office box. The @ symbol separates the user ID from the domain name of the e-mail server.
Q39: A web ________ consists of one or more Web pages located on a Web server.
A. hub
B. site
C. story
D. template
E. None of these
A web site consists of one or more Web pages located on a Web server. It is a collection of related web pages, images, videos, or other digital assets that are accessible through a common domain name.
Q40: A computer ________ is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files.
A. worm
B. virus
C. trojan horse
D. phishing scam
E. None of these
A computer virus is a set of program instructions that can attach itself to a file, reproduce itself, and spread to other files. It is a type of malicious software that can cause damage to computer systems and data.
Q41: ________ makes it possible for shoppers to make purchases using their computers.
A. E-World
B. E-Commerce
C. E-spend
D. E-business
E. None of these
E-Commerce (electronic commerce) makes it possible for shoppers to make purchases using their computers. It involves the buying and selling of products and services over the internet.
Q42: Programs such as Internet Explorer that serve as navigable windows into the Web are called ________ .
A. Hypertext
B. Networks
C. Internet
D. Web browsers
E. None of these
Programs such as Internet Explorer that serve as navigable windows into the Web are called Web browsers. They allow users to access and navigate the World Wide Web, displaying web pages and other online content.
Q43: ________ . this is the act of copying or downloading a program from a network and making multiple copies of it.
A. Network piracy
B. Plagiarism
C. Software piracy
D. Site-license piracy
E. None of these
Software piracy is the act of copying or downloading a program from a network and making multiple copies of it without proper authorization. It is a form of copyright infringement and is illegal.
Q44: Which of the following is the communications protocol that sets the standard used by every computer that accesses Web-based information?
A. XML
B. DML
C. HTTP
D. HTML
E. None of these
HTTP (Hypertext Transfer Protocol) is the communications protocol that sets the standard used by every computer that accesses Web-based information. It defines how messages are formatted and transmitted, and how web servers and browsers should respond to various commands.
Q45: A ... is a computer attached to the Internet that runs a special Web server software and can send Web pages out to other computers over the Internet.
A. web client
B. web system
C. web page
D. web server
E. None of these
A web server is a computer attached to the Internet that runs special Web server software and can send Web pages out to other computers over the Internet. It hosts websites and web applications, making them accessible to users through the World Wide Web.
Q46: ________ are a type of inexpensive digital camera that remains tethered to a computer and used for videoconferencing, video chatting and live Web broadcast.
A. Webcams
B. Webpics
C. Browsercams
D. Browserpics
E. None of these
Webcams are a type of inexpensive digital camera that remains tethered to a computer and used for videoconferencing, video chatting, and live Web broadcasts. They allow users to capture and transmit video and audio in real-time over the internet.
Q47: The standard protocol of the internet is ________ .
A. TCP/IP
B. Java
C. HTML
D. Flash
E. None of these
The standard protocol of the internet is TCP/IP (Transmission Control Protocol/Internet Protocol). It is a set of communications protocols used to connect network devices on the internet and transmit data between them.
Q48: The acronym HTML stands for ________ .
A. High Transfer Machine Language
B. High Transmission Markup Language
C. Hypertext Markup Language
D. Hypermedia Markup Language
E. None of these
The acronym HTML stands for Hypertext Markup Language. It is the standard language used to create and design web pages, defining the structure and layout of content on the World Wide Web.
Q49: The software that allows users to surf the internet is called a/an ________ .
A. Search engine
B. Internet Service Provider (ISP)
C. Multimedia application
D. Browser
E. None of these
The software that allows users to surf the internet is called a browser. It is a program that enables users to access and navigate the World Wide Web, displaying web pages and other online content.
Q50: A modem ________ .
A. translates analog signals from a computer into digital signals that can travel along conventional telephone lines
B. translates digital signals from a computer into analog signals that can travel along conventional telephone lines
C. demodulates digitals signals from a computer
D. modulates signals an analog telephone line
E. None of these
A modem translates digital signals from a computer into analog signals that can travel along conventional telephone lines. It also converts analog signals back into digital signals, allowing data to be transmitted over telephone lines.
Q51: A Web site address is a unique name that identifies a specific ________ on the Web.
A. Web browser
B. PDA
C. Web site
D. link
E. None of these
A Web site address is a unique name that identifies a specific Web site on the Web. It is also known as a URL (Uniform Resource Locator) and is used to locate and access web pages on the internet.
Q52: The Internet allows you to ________ .
A. send electronic mail
B. view Web pages
C. connect to servers all around the world
D. All of these
E. None of these
The Internet allows you to send electronic mail, view Web pages, and connect to servers all around the world. It is a global network of interconnected computers that facilitates various forms of communication and information sharing.
Q53: Most mail programs automatically complete the following two parts in an e-mail ________ .
A. From : and Body :
B. From : and Date :
C. From : and To :
D. From : and Subject :
E. None of these
Most mail programs automatically complete the "From:" and "Subject:" parts in an e-mail. The "From:" field is automatically filled with the sender's e-mail address, and the "Subject:" field is where the sender can enter a brief description of the e-mail's content.
Q54: What is the most common way to get a virus in your computer's hard disk?
A. By installing games from their CD ROMs
B. By uploading pictures from mobile phones to the computer
C. By opening emails
D. By sending emails
E. None of these
The most common way to get a virus in your computer's hard disk is by opening e-mails, especially those from unknown or suspicious sources. E-mails can contain malicious attachments or links that, when opened, can infect the computer.
Q55: A chat is ________ .
A. an Internet standard that allows users to upload and download files
B. a typed conversation that takes place on a computer
C. an online area in which users conduct written discussions about a particular subject
D. the transmission of messages and files via a computer network
E. None of these
A chat is a typed conversation that takes place on a computer. It allows users to communicate with each other in real-time through text-based messages, often in a chat room or instant messaging application.
Q56: The Internet is ________ .
A. a large network of networks
B. an internal communication system for a business
C. a communication system for the Indian government
D. All of these
E. None of these
The Internet is a large network of networks. It consists of a global collection of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link devices worldwide.
Q57: Junk e-mail is also called ________ .
A. spam
B. spoof
C. sniffer script
D. spool
E. None of these
Junk e-mail is also called spam. Spam refers to unsolicited, often commercial, e-mails sent in bulk to a large number of recipients.
Q58: To view information on the web you must have a ________ .
A. cable modem
B. web browser
C. Domain Name Server
D. hypertext viewer
E. None of these
To view information on the web, you must have a web browser. A web browser is a software program that allows users to access and navigate the World Wide Web, displaying web pages and other online content.
Q59: A word in a web page that, when clicked, opens another document ________ .
A. anchor
B. URL
C. hyperlink
D. reference
E. None of these
A hyperlink is a word in a web page that, when clicked, opens another document. Hyperlinks allow users to navigate between web pages and access related content by clicking on the linked text.
Q60: ________ is the most popular internet activity.
A. Art
B. Shopping
C. Searching
D. Entertainment
E. Communication
Searching is the most popular internet activity. Users frequently use search engines to find information, products, services, and other content on the World Wide Web.
Q61: What is e-commerce?
A. Buying and selling international goods
B. Buying and selling products and services over the internet
C. Buying and selling products and services not found in stores
D. Buying and selling products having to do with computer
E. Buying and selling of electronic goods
E-commerce (electronic commerce) refers to the buying and selling of products and services over the internet. It includes various online transactions, such as online shopping, banking, and ticketing.
Q62: What are the four things needed to connect to the Internet?
A. telephone line, modem, computer, and an ISP
B. modem, computer, PDA, and ISP
C. telephone line, PDA, modem, and computer
D. computer, ISP, modem, and communication software
E. monitor, keyboard, mouse, modem
The four things needed to connect to the Internet are a telephone line, modem, computer, and an ISP (Internet Service Provider). These components allow users to establish an internet connection and access online content and services.
Q63: Which of the following functions are not performed by servers?
A. e-mail processing
B. database sharing
C. processing web sites
D. storage
E. word processing
Word processing is not a function performed by servers. Servers are typically used for e-mail processing, database sharing, processing web sites, and storage, but word processing is usually done on individual computers using word processing software.
Q64: The process of transferring files from a computer on the Internet to your computer is called ________ .
A. downloding
B. uploding
C. FTP
D. JPEG
E. downsizing
The process of transferring files from a computer on the Internet to your computer is called downloading. Downloading involves receiving data from a remote server and saving it to your local computer.
Q65: To reload a Web page, press the ________ button.
A. Bebb
B. Reload
C. Restore
D. Crt
E. Refresh
To reload a Web page, press the Refresh button. The Refresh button is used to reload the current web page, updating its content without having to manually re-enter the URL or reload the page.
Q66: You can use the ________ bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages.
A. menu
B. Title
C. Search
D. Web
E. Address
You can use the Address bar to type a URL and display a Web page, or type a keyword to display a list of related Web pages. The Address bar is located at the top of the web browser and is used to enter web addresses or search queries.
Q67: The collection of links throughout the Internet creates an interconnected network called the ________ .
A. WWW
B. Web
C. World Wide Web
D. All of the above
E. Wide Area Web
The collection of links throughout the Internet creates an interconnected network called the World Wide Web (WWW). The terms WWW, Web, and World Wide Web are often used interchangeably to refer to the global network of interconnected websites and web pages.
Q68: A(n) ________ is composed of several computers connected together to share resources and data.
A. Internet
B. network
C. backbone
D. hyperlink
E. protocol
A network is composed of several computers connected together to share resources and data. Networks allow multiple computers to communicate with each other and access shared resources, such as printers, files, and internet connections.
Q69: A popular way to learn about computers without ever going to a classroom is called ________ .
A. i-learning
B. isolated learning
C. e-learning
D. close learning
E. Distance Learning
E-learning is a popular way to learn about computers without ever going to a classroom. It involves using electronic technologies, such as the internet, multimedia, and virtual classrooms, to deliver educational content and facilitate learning.
Q70: A person who used his or her expertise to gain access to other people's computers to get information illegally or do damage is ________ .
A. spammer
B. hacker
C. instant messenger
D. programmer
E. analyst
A hacker is a person who uses his or her expertise to gain access to other people's computers to get information illegally or do damage. Hackers can exploit vulnerabilities in computer systems and networks to carry out unauthorized activities.
Q71: The ________ folder retains copies of messages that you have started but are not yet ready to send.
A. Inbox
B. Outbox
C. Drafts
D. Sent Items
E. Address Book
The Drafts folder retains copies of messages that you have started but are not yet ready to send. It allows users to save incomplete e-mails and return to them later to finish and send.
Q72: ________ are attempts by individuals to obtain confidential information from you by falsifying their identity.
A. Phishing trips
B. Computer viruses
C. Spyware scams
D. Viruses
E. Phishing scams
Phishing scams are attempts by individuals to obtain confidential information from you by falsifying their identity. Phishing often involves sending fraudulent e-mails or creating fake websites to trick users into revealing sensitive information, such as passwords or credit card numbers.
Q73: Which of the following is not true?
A. Chatting is like e-mail
B. Chatting can only be done with a single person
C. Chatting can involve multiple persons
D. Chatting is an electronic dialogue
E. None of these
It is not true that chatting can only be done with a single person. Chatting can involve multiple persons, allowing groups of users to communicate with each other in real-time through text-based messages.
Q74: What are the two parts of an E-mail address?
A. User name and street address
B. Legal name and phone number
C. Initials and password
D. User name and domain name
E. None of these
The two parts of an E-mail address are the user name and domain name. The user name is the unique identifier for the user, and the domain name is the name of the e-mail server that manages the user's electronic post office box.
Q75: Sending an E-mail is similar to ________ .
A. writing a letter
B. drawing a picture
C. talking on the phone
D. sending a package
E. None of these
Sending an E-mail is similar to writing a letter. Both involve composing a message, addressing it to a recipient, and sending it through a delivery system (e-mail server or postal service).
Q76: If you are going to a site you use often, instead of having to type in the address every time, you should ________ .
A. make a copy of it
B. save it as a file
C. memorise it
D. bookmark it
E. note it in your diary
If you are going to a site you use often, you should bookmark it. Bookmarking allows you to save the website address in your browser for easy access in the future, eliminating the need to type in the address each time.
Q77: What does a Browser do?
A. Looks through magazines and books in the library
B. Reads meterial really fast
C. It wastes your time
D. It provides help menus
E. It is software used to view web pages
A browser is software used to view web pages. It allows users to access and navigate the World Wide Web, displaying web pages and other online content.
Q78: An email account includes a storage area, often called a(n) ________ .
A. attachment
B. hyperlink
C. mailbox
D. IP address
E. None of these
An e-mail account includes a storage area, often called a mailbox. The mailbox is where incoming e-mails are stored, allowing users to access and manage their messages.
Q79: What is a modem connected to?
A. processor
B. mother board
C. printer
D. phone line
E. None of these
A modem is connected to a phone line. It converts digital data from a computer into a format suitable for transmission over analog telephone lines, and vice versa.
Q80: Mr. XYZ wants to send an electronic message to a friend. He should use this type of application ________ .
A. word processing
B. e-mail
C. spreadsheet
D. paper and pencil
E. None of these
To send an electronic message to a friend, Mr. XYZ should use an e-mail application. E-mail applications allow users to compose, send, and receive electronic messages over the internet.
Report Card
Total Questions Attempted: 0
Correct Answers: 0
Wrong Answers: 0
Keep Practicing!
The Internet is essential in today’s world and understanding its basics will help you tackle multiple-choice questions in competitive exams. Make sure to revise key concepts, protocols, and services frequently asked in exams to increase your score.
Computer Awareness Chapters: Learn Key Concepts with MCQs