Email MCQ Questions Email MCQ questions and answers for computer related competitive exam and interview multiple choice MCQs with pdf downlo...
Email MCQ Questions
Email MCQ questions and answers for computer related competitive exam and interview multiple choice MCQs with pdf download. These questions asked in many computer exams.
1. How can you tell the email that you have read from the email that you have not read?
a)
The unread mail will be on top
b)
The unread mail will be on bottom
c)
The unread mail will be bold
d)
The unread mail will be blue
Ans.
c
2.
______ is the exchange of computer stored messages by telecommunication.
a)
Download
b)
E-mail
c)
Upload
d)
All of these
Ans.
b
3.
Which of the following is an advantage of an email?
a)
Desired length
b)
Ease of communication
c)
Lower cost
d)
All of these
Ans.
d
4.
Junk email is also called_______
Ans.
Spam
5.
Unwanted repetitious messages, such as unsolicited bulk email is known as
_______
Ans.
Spam
6.
SMTP stands for
a)
Short mail transmission protocol
b)
Small mail transmission protocol
c)
Server Mail Transfer Protocol
d)
Simple Main Transfer Protocol
Ans.
d
7. In MS Office, ______ is the software for managing emails.
(a) MS Access
(b) MS
Publisher
(c) MS Outlook
(d)
MS Onenote
Ans. c
8. Transmission and delivery of information containing text, image, video,
documents etc. to targeted recepient(s) over the Internet is called _______ .
(a) email
(b) world wide web
(c) e-commerce
(d) social media
Ans. a
9.
E-mail address is made up of ______
a) Single part
b) Two
parts
c) Three parts
d) Four parts
Ans.
B
10. The first part of email address identifies ______.
(a) name of individual user
(b) name of the email server
(c) name of the mobile phone operator
(d) name of bank
Ans. a
11. The second part of email address identifies ______ .
(a) name of individual user
(b) name of the email server
(c) name of the mobile phone operator
(d) name of bank
Ans. b
12. The user name and email server parts of an email address are separated
by _______ symbol.
(a) @
(b) #
(c) $
(d) &
Ans. a
13. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com,
rediffmail.com, fastmail.fm, etc. are popular _______ .
(a) FTP servers
(b) social media sites
(c) email servers
(d) none of them
Ans. c
14. An email may contain non-text information which may be _______.
(a) uploaded
(b)
downloaded
(c) transmitted
(d) erased
Ans. b
15. An image displayed on web page can be ________ to download the file.
(a) right click and choose save image as
(b) left click
(c) double click
(d) press delete button
Ans. a
16. Electronic communication between 2 persons having unique identifiers
over the Internet is called _______ .
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d
17. ______ is a technology that allows you to send and receive messages
over the Internet without the delay of traditional postal services.
(a) India post
(b) Speed post
(c) Registered post
(d) email
Ans. d
18. Each user of a email communication should possess _______ .
(a) a unique identifier, called email ID
(b) pen drive
(c) external hard disk
(d) DVD writer
Ans. a
19. The email ID of a person contains _______ parts.
(a) 2
(b) 3
(c) 4
(d) 5
Ans. a
20. In email communication, CC stands for _____.
(a) carbon copy
(b) cold coffee
(c) blind carbon copy
(d) casual copy
Ans. a
21. In email communication, BCC stands for _______.
(a) carbon copy
(b) cold coffee
(c) blind carbon copy
(d) casual copy
Ans. c
22. The email ID of the secondary recipient of email is entered in ______
field.
(a) To
(b) CC
(c) BCC
(d) Subject
Ans. b
23. The email ID of the anonymous recipient of email is entered in ______
field.
(a) To
(b) CC
(c) BCC
(d) Subject
Ans. c
24. The crisp essence of email message is entered in ______ field.
(a) To
(b) CC
(c) BCC
(d) Subject
Ans. d
25. The file attached to an email is called the _______ .
(a) content
(b)
attachment
(c) subject
(d) BCC
Ans. b
26. An email sent from unknown persons for improving the sale, image,
appeal or other characteristics of a product is called_____.
(a) Junk
(b) Important
(c) Virus
(d) Trojan
Ans. a
27. ______ mail refers to e-mail messages sent by an unknown sender,
usually for commercial purposes.
(a) Junk
(b) Important
(c) Virus
(d) Trojan
Ans. a
28. Unsolicited emails may be filtered and separated into _______ .
(a) spam bin
(b) inbox
(c) sent mails
(d) draft
Ans. a
29. All emails sent by the user may be saved in _______ .
(a) spam bin
(b) inbox
(c) sent mails
(d) draft
Ans. c
30. A half completed email may be saved for later editing and transmission
to the receiver in ______ folder.
(a) spam bin
(b) inbox
(c) sent mails
(d) draft
Ans. d
31. Before entering user ID and password, one should ensure that the
browser displays ______ icon for safe communication with the server.
(a) print
(b) lock
(c) clock
(d) lens
Ans. b
32. Logging into an email server from a dedicated application (APP)
installed on a smartphone helps to _______ email messages.
(a) auto delete
(b) hide
(c) periodically check, retrieve and notify
(d) purge
Ans. c
33. It is a good practice to _______ email messages from unknown senders to
avoid virus infection of computer.
(a) avoid opening attachments in
(b) open message and all attachments of
(c) sit looking for
(d) invite more spammers to send
Ans. a
34. Images and videos attached to a junk email may ______.
(a) contain anti-virus
(b) repair troubles in the operating system
(c) help fast working of computers
(d) containtrojens and virusses to attack a computer
Ans. d
35. Opening a new email ID requires entry of _______ in the email opening form.
(a) name and address
(b) date of birth and father name
(c) alternate email ID if necessary
(d) all of them
Ans. D
36. There are Four Scenarios in
a) Servers
b) Domains
c) IP
d) Email
Ans. d
37. In Email, We need two Vas and two pairs of MTAs, When
sender is connected to mail server via
a) MTA and VTA
b) LAN and WAN
c) IP and SMS
d) Email and IP
Ans. b
38. Mail access starts with client when user needs to
download e-mail from the
a) Mail Box
b) Mail Server
c) IP server
d) Internet
Ans. a
39. When sender and receiver of an e-mail are on same
system, we need only two
a) IP
b) Domain
c) Servers
d) User Agents
Ans. d
40. At beginning of Internet era, messages sent by
electronic mail were short and consisted of
a) Words only
b) Line only
c) Text Only
d) Numbers Only