160. Full form of TCP is
160. Full form of TCP is
174. _______________ is a software program used to view Web pages.
174. _______________ is a software program used to view Web pages.
175. An E-mail address consists of
175. An E-mail address consists of
176. The process of trading goods over the Internet is known as
176. The process of trading goods over the Internet is known as
177. A Website is a collection of
177. A Website is a collection of
178. Which protocol provides E-Mail facility among different hosts?
178. Which protocol provides E-Mail facility among different hosts?
179. Which of the following is not a term pertaining to E-Mail?
179. Which of the following is not a term pertaining to E-Mail?
180. The full form of HTTP is
180. The full form of HTTP is
30. _____ is the exchange of computer stored messages by telecommunication.
30. _____ is the exchange of computer stored messages by telecommunication.
29. You should _________ your emails before sending. Once they are sent you cannot get them back.
29. You should _________ your emails before sending. Once they are sent you cannot get them back.
28. Which of the following is an advantage of an email?
28. Which of the following is an advantage of an email?
173. Telnet is a
173. Telnet is a
172. What is M-commerce?
172. What is M-commerce?
171. Junk E-mail is also called
171. Junk E-mail is also called
161. Who is known as the father of Internet?
161. Who is known as the father of Internet?
162. A cookie
162. A cookie
163. Which protocol helps to transfer files between compuers?
163. Which protocol helps to transfer files between compuers?
164. Which of the following is not an example of web browser?
164. Which of the following is not an example of web browser?
165. A web address is also called
165. A web address is also called
166. An educational institution would generally have the following in its domain name.
166. An educational institution would generally have the following in its domain name.
167. The standard protocol of the Internet is
167. The standard protocol of the Internet is
168. Which among the following is a search engine?
168. Which among the following is a search engine?
169. Which of the following is used by the browser to connect to the location of the Internet resources?
169. Which of the following is used by the browser to connect to the location of the Internet resources?
170. Telnet is a ______________ based computer protocol.
170. Telnet is a ______________ based computer protocol.
27. All emails sent by the user may be saved in _______
27. All emails sent by the user may be saved in _______
26. Mail access starts with client when user needs to download e-mail from the
26. Mail access starts with client when user needs to download e-mail from the
13. _____ is a technology that allows you to send and receive messages over the Internet without the delay of traditional postal services
13. _____ is a technology that allows you to send and receive messages over the Internet without the delay of traditional postal services
12. In MS Office, ______ is the software for managing emails
12. In MS Office, ______ is the software for managing emails
11. What do we call the people we send an email to?
11. What do we call the people we send an email to?
10. What is the main folder in Gmail?
10. What is the main folder in Gmail?
9. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over the Internet is called ____________
9. Transmission and delivery of information containing text, image, video, documents etc. to targeted recepient(s) over the Internet is called ____________
8. SMTP stands for__________________
8. SMTP stands for__________________
6. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc. are popular_________________
6. Gmail.com, yahoo.com, yahoo.co.in, ymail.com, rediff.com, rediffmail.com, fastmail.fm, etc. are popular_________________
7. The first part of email address identifies________________
7. The first part of email address identifies________________
5. You can _________ an email if you want to remember it is important, and this also puts the email into a special folder for easy access
5. You can _________ an email if you want to remember it is important, and this also puts the email into a special folder for easy access
4. The second part of email address identifies ______
4. The second part of email address identifies ______
14. Each user of a email communication should possess _______
14. Each user of a email communication should possess _______
15. In email communication, CC stands for
15. In email communication, CC stands for
16. The email ID of a person contains _______ parts
16. The email ID of a person contains _______ parts
25. At beginning of Internet era, messages sent by electronic mail were short and consisted of
25. At beginning of Internet era, messages sent by electronic mail were short and consisted of
24. What is the term used to describe what Internet scammers do to trick people our of their personal information?
24. What is the term used to describe what Internet scammers do to trick people our of their personal information?
116. What is the best defense against email scams?
116. What is the best defense against email scams?
23. There are Four Scenarios in_____________
23. There are Four Scenarios in_____________
22. A half completed email may be saved for later editing and transmission to the receiver in ______ folder.
22. A half completed email may be saved for later editing and transmission to the receiver in ______ folder.
21. What does BCC stand for when sending an email?
21. What does BCC stand for when sending an email?
20. How do you properly format an email?
20. How do you properly format an email?
-
-
-
-
19. Unsolicited emails may be filtered and separated into ____
19. Unsolicited emails may be filtered and separated into ____
18. The email ID of the secondary recipient of email is entered in ______ field
18. The email ID of the secondary recipient of email is entered in ______ field
17. The file attached to an email is called the _______
17. The file attached to an email is called the _______
3. An email may contain non-text information which may be __________
3. An email may contain non-text information which may be __________