info@uceagra.com
Student Enquery: +91 79005 25060
Franchise Enquery: +91 80771 91427
Work With Us
Home
(current)
Exam Portal
Online Test
Downloads
CCC Admit Card
CCC Form Apply
CCC Certificate
CCC Result
Typing Test
English Typing
Hindi Typing
Gallery
Videos
Contact us
Join us
About Us
Feedback
FAQ's
100 MCQ of E-Mail
Question 1
Which of the following is a correct format of Email address?
A) Name@website@info
B) Name@website.info
C) WWW.nameofebsite.com
D) Name.website.com
Question 2
MIME Stands for.
A) Multipurpose Internet mail Extension
B) Multipurpose Internet mail Email
C) Multipurpose Internet mail End
D) Multipurpose Internet mail Extra
Question 3
There are Four Scenarios in.
A) Server
B) Domains
C) IP
D) Email
Question 4
In EMAIL, We need two VAs and two pairs of MTAs, When sender is connected to mail server via
A) MTA and VTA
B) LAN and WAN
C) IP and SMS
D) Email and IP
Question 5
Mail access starts with client when user needs to download E-Mail from the
A) Mail Box
B) Mail Server
C) IP server
D) Internet
Question 6
When sender and receiver of an E-Mail are on same system, we need only two
A) IP
B) Domain
C) Servers
D) User Agents
Question 7
Post Office Protocol, version 3 (POP3), has two modes, Delete Mode and
A) Outbox Mode
B) Keep Mode
C) Idle Mode
D) Function Mode
Question 8
FTP uses service of
A) TCP
B) UDP
C) SMTP
D) DDNS
Question 9
NVT Stands for
A) Network virtual transmission
B) Network virtual text
C) Network virtual terminal
D) Network virtual Tell
Question 10
Post office protocol version 3(POP3) is simple and limited in
A) Usage
B) Email
C) Servers
D) Functionality
Question 11
At beginning of Internet era, messages sent by electronic mail were short and consisted of
A) Words Only
B) Line only
C) Text Only
D) Numbers Only
Question 12
When the mail server sends mail to other mail server it becomes.
A) SMTP Server
B) SMTP Client
C) Peer
D) None of the mentioned
Question 13
If to have to sends multimedia data over SMTP it has to be encoded into.
A) Binary
B) Signal
C) ASCLL
D) None of the mentioned
Question 14
Expansion of SMTP is
A) Simple mail transfer protocol
B) Simple massage transfer protocol
C) Simple mail transmission protocol
D) Simple massage transmission protocol
Question 15
In SMPT the command to write receivers mail address is written with this command.
A) Send to
B) RCPT to
C) Mail to
D) None of the mentioned
Question 16
The underlying transport layer protocol used by SMTP is.
A) TCP
B) UDP
C) Either A or B
D) None of the mentioned
Question 17
Choose the statement which is wrong incase of SMTP.
A) It requires to be in 7bit ASCLL format
B) It is pull protocol
C) It transfers files from one mail server to another mail server
D) None of the mentioned
Question 18
Internet mail places each object in.
A) Separate massage for each object
B) One massage
C) Varies with number of object
D) None of the mentioned
Question 19
Typically the TCP port used by SMPT is.
A) 25
B) 35
C) 50
D) 15
Question 20
A session may include
A) Zero or more SMTP transactions
B) Exactly one SMTP transactions
C) Always more than one SMTP transactions
D) Number of SMTP transactions cant be determined
Question 21
Example of user agents for E-Mail
A) Microsoft Outlook
B) Apple Mail
C) None of the above
D) All of the mentioned
Question 22
When the sender and the receiver of an email are on different systems, we need only _________
A) One MTA
B) Two UAs
C) Two UAs and one pair of MTAs
D) Two UAs and two pairs of MTAs
Question 23
User agent does not support this
A) Composing messages
B) Reading messages
C) Replying messages
D) All of the mentioned
Question 24
Simple mail transfer protocol (SMTP) utilizes _________ as the transport layer protocol for electronic mail transfer.
A) TCP
B) UDP
C) DCCP
D) SCTP
Question 25
SMTP connections secured by SSL are known as
A) SMTPS
B) SSMTP
C) SNMP
D) None of the mentioned
Question 26
SMTP uses the TCP port.
A) 22
B) 23
C) 24
D) 25
Question 27
Which one of the following protocol is used to receive mail messages?
A) smtp
B) post office protocol
C) internet message access protocol
D) all of the mentioned
Question 28
An email client needs to know the _________ of its initial SMTP server.
A) IP address
B) MAC address
C) URL
D) None of the mentioned
Question 29
A SMTP session may include
A) zero SMTP transaction
B) one SMTP transaction
C) more than one SMTP transaction
D) all of the mentioned
Question 30
SMPT defines
A) Massage transport
B) Massage encryption
C) Massage content
D) None of the mentioned
Question 31
Which one of the following is an SMTP server configured in such a way that anyone on the internet can send E-Mail through it?
A) open mail relay
B) wide mail reception
C) open mail reception
D) none of the mentioned
Question 32
SMTP is used to deliver messages to
A) user’s terminal
B) user’s mailbox
C) both (a) and (b)
D) none of the mentioned
Question 33
कोम ............... प्रकार की व्यवस्था वेब साईट को सुचित करता है।
A) वाणिज्य
B) जटिल
C) कम्पनी
D) उपरोक्त में से कोई नहीं
Question 34
What is Email
A) (Engineering mailing)
B) (Internet mailing)
C) (Instant Messaging)
D) None of these
Question 35
प्रेषक को वापस लौट आने वाला मेल क्या कहलाता है।
A) बैंक मेल
B) बाउंस्ड मेल
C) रिटर्न मेल
D) इनमे से कोई नही
Question 36
व्यवसायिक कंपनियो के द्वारा ई मेल के जरिये भेजा गया संदेश क्या कहलाता है।
A) जंक मेल
B) रफ मेल
C) बाउंस्ड मेल
D) फ्रंटियर मेल
Question 37
Free of cost repair of software bug available at Internet is called ….
A) Version
B) Ad-on
C) Tutorial
D) Path
Question 38
The Internet was originally a project of which agency?
A) ARPA
B) NSF
C) NSA
D) None of the these
Question 39
HTML is used to create
A) Machine language program
B) high level program
C) web page
D) web server
Question 40
The computer jargon - WWWW, stands for :
A) World Wide Web Worm
B) World Wide Wildlife Web
C) World Wide Women's Web
D) World Wide Women's Week
Question 41
The process of transferring files from a computer on the Internet to your computer is called
A) Uploading
B) Forwarding
C) FTP
D) Downloading
Question 42
In internet terminology IP means
A) Internet Provider
B) Internet Protocol
C) Internet Procedure
D) Internet Processor
Question 43
Which one of the following is not a search engine?
A) Bing
B) Google
C) Yahoo
D) Windows
Question 44
Verification of a login name and password is known as:
A) Configuration
B) Accessibility
C) Authentication
D) logging in
Question 45
Internet explorer falls under :
A) Operating System
B) Compiler
C) Browser
D) IP address
Question 46
What is the full form of WWW in web address ?
A) World Wide Web
B) World Wide Word
C) World Wide Wood
D) None of these
Question 47
Full form of HTML is:
A) Hyper Text Markup Language
B) Hyper Text Manipulation Language
C) Hyper Text Managing Links
D) Hyper Text Manipulating Links
Question 48
Moving from one website to another is called :
A) Downloading
B) Browsing
C) Uploading
D) Attachment
Question 49
A computer on internet are identified by :
A) E-Mail address
B) street address
C) IP address
D) None of the above
Question 50
Which of these is not a medium for E-Mail ?
A) Intranet
B) Internet
C) Extranet
D) Paper
Question 51
Which of these defined the internet ?
A) The Federal Networking Council
B) The Federal Network Council
C) The Federal Networking Committee
D) The Federal Network Committee
Question 52
Intranet is a company’s internal web.
A) True
B) False
Question 53
Extranet is a web within a web.
A) True
B) False
Question 54
Which of these is not used by intranet ?
A) TCP
B) BSNL
C) IP
D) HTTP
Question 55
Which of these easiest way of communication ?
A) Email
B) Telephone
C) Fax
D) Letter
Question 56
What is the run command of Google ? गूगल की रन कमांड क्या होती है ?
A) Google
B) Search
C) Explorer
D) Chrome
Question 57
Which of these should be avoided in an E-Mail ?
A) Wrong E-Mail address
B) Subject Line
C) Reply to all
D) Re-reading
Question 58
Which of the following are not required in order to send and receive E-Mail ?
A) Use of internet
B) E-mil accounts
C) Webpage
D) E-Mail program
Question 59
E-Mail address-separate the user name from the domain name of service provider by using the?
A) &
B) @
C) %
D) *
Question 60
A list of E-Mail address that a company has gathered through previous customer contacts, Web sign-ups or other permission-based methods is called in-house list.
A) True
B) False
Question 61
Which of the following an example to toggle case.
A) TOGGLE CASE
B) Toggle case
C) tOGGLE cASE
D) None of these
Question 62
In which year was the first E-Mail sent?
A) 1988
B) 1995
C) 1975
D) 1971
Question 63
When an inbox mail is deleted accidentally it can be recovered/restored from.
A) All mail
B) Sent mail
C) Spam mail
D) Trash
Question 64
In addition to E-Mail access, an E-Mail ser-vice may include.
A) Instant Messaging
B) An online address book
C) An online calendar
D) All of above
Question 65
Generally emails that you receive will appear in your……
A) In contacts
B) In inbox
C) In messenger
D) In task
Question 66
A protocol used for fetching E-Mail form a mailbox is POP3.
A) True
B) False
Question 67
All incoming E-Mail messages are to be stored in the OUTBOX folder.
A) True
B) False
Question 68
Port number 143 is used for IMAP protocol.
A) True
B) False
Question 69
Spam is the term used for unsolicited
A) True
B) False
Question 70
Simple mail transfer protocol (SMTP) utilises ……… as the transport layer protocol for electronic mail transfer.
A) TCP
B) UDP
C) DCCPD
D) SCTP
Question 71
Which to the following is not windows E-Mail programme?
A) Eudora
B) Outlook
C) Paine
D) Pegasus
Question 72
SMTP is used to deliver messages to.
A) Users terminal
B) Users mailbox
C) Block line
D) Crosshair
Question 73
The ….. protocol has features that allow uploading of mail messages.
A) SNMP
B) IMAP
C) POP3
D) HTTP
Question 74
For your E-Mail PGP allows you to.
A) Enhanced
B) Encrypt
C) Decrypt
D) Design
Question 75
Which of the following protocols is used by internet mail ?
A) HTTP
B) TCP/IP
C) FTP
D) None
Question 76
When sending an E-Mail the line describes the contents of the message ?
A) Contents
B) To
C) Subject
D) CC
Question 77
The message sent in E-Mail are controlled by E-Mail client.
A) True
B) False
Question 78
Mail user Agent is a computer program that is used to manage E-Mail.
A) True
B) False
Question 79
By simple mail transfer protocol E-Mails are sent and receive.
A) True
B) False
Question 80
Inventor of email system is ?
A) Alan turing
B) Zukerberg
C) Wint cerf
D) Ray tomilson
Question 81
Unsolicited commercial email is know as…….
A) Spam
B) Malware
C) Virus
D) Spyware
Question 82
How many bits are there in the IPV4 address?
A) 32 bits
B) 64 bits
C) 16 bits
D) 5 bits
Question 83
For browser to connect to other resources the location or address of the resources must be specified these addresses are called.
A) E-Mail forms
B) Packets
C) URLs
D) MSN
Question 84
The E-Mail was first sent via FTP.
A) True
B) False
Question 85
Can our E-Mail address be used by others ?
A) True
B) False
Question 86
An E-Mail can be sent to two or more persons ?
A) True
B) False
Question 87
In email client program by which method you can filter the A-Z just click on header and filter such messages.
A) True
B) False
Question 88
SMTP was introduced to manage offline mails.
A) True
B) False
Question 89
E-Mail component of internet explorer is called outlook express.
A. True
B. False
Question 90
The use of email is for sending the broadcast message but only in a company.
A) True
B) False
Question 91
E-Mails is responsible for sending message based on text.
A) True
B) False
Question 92
The bounce Mail is ……
A) Malware attack
B) Junk mail
C) Informative mail of wrong email
D) Mail delivery information
Question 93
The E-Mail address of a dot matrix printer is measured in …..
A) To
B) From
C) CC
D) BCC
Question 94
CC in the email stands for.
A) Create copy
B) Carbon copy
C) Cyber copy
D) None of these
Question 95
The two parts of any E-Mail is combined by the symbol@.
A) True
B) False
Question 96
URL and E-Mail are similar.
A) True
B) False
Question 97
A Web site's front page/main page is called
A) Browser Page
B) Search Page
C) Home Page
D) Bookmark
Question 98
Which of these do not provide free E-Mail ?
A) Hotmail
B) Rediff
C) What's app
D) Yahoo
Question 99
If you receive an urgent E-Mail that looks like it's from your bank, it may actually be a…….
A) Firewall
B) Phishing attempt
C) Reply to all
D) Signature
Question 100
The person’s home computer address is to the lift of the @ sign ?
A) True
B) False