171. Junk E-mail is also called
171. Junk E-mail is also called
28. Which of the following is an advantage of an email?
28. Which of the following is an advantage of an email?
29. You should _________ your emails before sending. Once they are sent you cannot get them back.
29. You should _________ your emails before sending. Once they are sent you cannot get them back.
30. _____ is the exchange of computer stored messages by telecommunication.
30. _____ is the exchange of computer stored messages by telecommunication.
180. The full form of HTTP is
180. The full form of HTTP is
179. Which of the following is not a term pertaining to E-Mail?
179. Which of the following is not a term pertaining to E-Mail?
178. Which protocol provides E-Mail facility among different hosts?
178. Which protocol provides E-Mail facility among different hosts?
177. A Website is a collection of
177. A Website is a collection of
176. The process of trading goods over the Internet is known as
176. The process of trading goods over the Internet is known as
175. An E-mail address consists of
175. An E-mail address consists of
174. _______________ is a software program used to view Web pages.
174. _______________ is a software program used to view Web pages.
173. Telnet is a
173. Telnet is a
172. What is M-commerce?
172. What is M-commerce?
27. All emails sent by the user may be saved in _______
27. All emails sent by the user may be saved in _______
170. Telnet is a ______________ based computer protocol.
170. Telnet is a ______________ based computer protocol.
169. Which of the following is used by the browser to connect to the location of the Internet resources?
169. Which of the following is used by the browser to connect to the location of the Internet resources?
168. Which among the following is a search engine?
168. Which among the following is a search engine?
167. The standard protocol of the Internet is
167. The standard protocol of the Internet is
166. An educational institution would generally have the following in its domain name.
166. An educational institution would generally have the following in its domain name.
165. A web address is also called
165. A web address is also called
164. Which of the following is not an example of web browser?
164. Which of the following is not an example of web browser?
163. Which protocol helps to transfer files between compuers?
163. Which protocol helps to transfer files between compuers?
162. A cookie
162. A cookie
161. Who is known as the father of Internet?
161. Who is known as the father of Internet?
160. Full form of TCP is
160. Full form of TCP is
16. The email ID of a person contains _______ parts
16. The email ID of a person contains _______ parts
4. The second part of email address identifies ______
4. The second part of email address identifies ______
5. You can _________ an email if you want to remember it is important, and this also puts the email into a special folder for easy access
5. You can _________ an email if you want to remember it is important, and this also puts the email into a special folder for easy access
7. The first part of email address identifies________________
7. The first part of email address identifies________________
6. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc. are popular_________________
6. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc. are popular_________________
8. SMTP stands for__________________
8. SMTP stands for__________________
9. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over the Internet is called ____________
9. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over the Internet is called ____________
10. What is the main folder in Gmail?
10. What is the main folder in Gmail?
11. What do we call the people we send an email to?
11. What do we call the people we send an email to?
12. In MS Office, ______ is the software for managing emails
12. In MS Office, ______ is the software for managing emails
13. _____ is a technology that allows you to send and receive messages over the Internet without the delay of traditional postal services
13. _____ is a technology that allows you to send and receive messages over the Internet without the delay of traditional postal services
14. Each user of a email communication should possess _______
14. Each user of a email communication should possess _______
15. In email communication, CC stands for
15. In email communication, CC stands for
3. An email may contain non-text information which may be __________
3. An email may contain non-text information which may be __________
17. The file attached to an email is called the _______
17. The file attached to an email is called the _______
18. The email ID of the secondary recipient of email is entered in ______ field
18. The email ID of the secondary recipient of email is entered in ______ field
19. Unsolicited emails may be filtered and separated into ____
19. Unsolicited emails may be filtered and separated into ____
20. How do you properly format an email?
20. How do you properly format an email?
-
-
-
-
21. What does BCC stand for when sending an email?
21. What does BCC stand for when sending an email?
22. A half completed email may be saved for later editing and transmission to the receiver in ______ folder.
22. A half completed email may be saved for later editing and transmission to the receiver in ______ folder.
23. There are Four Scenarios in_____________
23. There are Four Scenarios in_____________
116. What is the best defense against email scams?
116. What is the best defense against email scams?
24. What is the term used to describe what Internet scammers do to trick people our of their personal information?
24. What is the term used to describe what Internet scammers do to trick people our of their personal information?
25. At beginning of Internet era, messages sent by electronic mail were short and consisted of
25. At beginning of Internet era, messages sent by electronic mail were short and consisted of
26. Mail access starts with client when user needs to download e-mail from the
26. Mail access starts with client when user needs to download e-mail from the