Tuesday, May 18, 2021

Sample Paper of O Level Set-6(Internet Technology and Web Design) M2-R4

 

SAMPLE QUESTION PAPER 6

(ELECTRONIC MAIL)

 

Multiple choice:-

 

1.    SMTP is a simple:

             a. TCP Protocol

             b. IP Protocol

             c. TCP/IP Protocol

             d. None of the above

     2. A simple protocol used for fetching e-mail from a mailbox is:

            a. POP3

            b. POP2

            c. IMAP

            d. None of the above

     3. A popular application of computer networking is the world wide

         web of Newsgroup called:

a.     News

b.    Gateways

c.     Netnews

d.    (a) and (b) above

     4. E-mail address is made up:

            a. Single parts

            b. Two parts

            c. Three parts

            d. None of the above

     5. The program supplied by VSNL (Videsh Sanchar Nigam Limited)

          When you ask for Internet connection for e-mail is:

a.     ISP

b.    Pine

c.     HotDog

d.    None of the above

     6. SMTP stands for:

            a. Server Mail Transfer Protocol

            b. Simple Mail Transfer Protocol

            c. Small Mail Transmission Protocol

            d. Short Mail Transmission Protocol

     7. The e-mail component of Internet Explorer is called:

            a. Messenger Mailbox

            b. Message box

            c. Outlook Express

            d. None of the above

     8. Messenger Mailbox is present in:

            a. Internet Explorer

            b. Netscape Communicator

            c. Both a and b

            d. None of the above

     9. A convenient place to store contact information for quick

          retrieval is:

a.     Message box

b.    Address box

c.     Address book

d.    None of the above

   10. Which of the following statements is not correct for digital

          signature?

a.     It is a mechanism for authentication

b.    It is the scanned image of one’s signature

c.     It is created by encrypting information

d.     It cannot be duplicated

   11. Which of the following is not a protocol for e-mail?

            a. SMTP

            b. POP

            c. IMAP

            d. UDP

   12. Which one of the following is a valid e-mail address?

            a. enquiries.guilds.co.@.uk

            b. sales@enquiries.guilds.co.uk

            c. @sales.enquiries@guilds.co.uk

            d. sales.enquiries.guilds.co.uk

 

State whether the following statements are True or False:-

 

1.    In SMTP, the message can be of any length.

2.    A protocol used for fetching e-mail from a mailbox is POP1.

3.    UUCP is UNIX-to-UNIX File Copy Protocol.

4.    All incoming e-mail messages are to be stored in the Outbox folder.

5.    The e-mail component of Internet Explorer is called “Outlook Express”.

6.    Netscape Messenger is the e-mail client packaged with Netscape Communicator 4.0.

7.    Mail-header is offset from mail body by a line of asterisks.

8.    Recipient’s log in name must form a part of his e-mail address.

9.    E-mail messages are usually addressed and delivered to only one or two people.

10.                       The two main file formats for images on the Web are GIF and TIFF.

11.                       SMTP is associated with electronic mail.

12.                       E-mail is limited to text-based messages.

13.                       The two parts of e-mail address are separated by the @symbol.

 

Match the following:-

 

1.    ASCII                                           a. MPEG4

 

2.    Remote Mail Box                      b.  POP3

3.    VSNL                                           c.  Pine

 

4.    UUCP                                          d.  Send box moves the

                                                         message a folder named

 

5.    Inbox                                          e.   SMTP

 

6.    Bounced mail                            f.  Mail addressing system

 

 

7.    X.400                                          g.   Flooding an e-mail account/

                                                       server

 

8.    Elm                                              h.  Returned to sender

 

9.    Mail bombing                           i.  Access e-mail without downl-

                                                          oading

 

10.           IMAP                                     j.   Trojan Horse

 

11.           A security attack in             k. UNIX-to-UNIX File Copy

which someone inside                protocol

a company is tricked

into running a compu-

ter program that sends

information from the

person’s computer to

the Outsider.

 

12.           Interactive video                 l. Electronic mail

 

Fill in the blanks:-

 

a. Routing                                                        g. A listserv

b. Secure                                                          h. Inbox

c. Internet                                                        i. Outlook Express

d. Spam                                                            j. Address book

e. VSNL                                                             k. POP3

f. BCC

 

1.    In any good communication system, the message should be safe and_________. It should reach to the person for whom it is meant.

2.    PCs connected with_________ can also be used for education, entertainment, etc.

3.    Unsolicited commercial e-mail is called__________.

4.    __________delivers communications from a large group of people right to your mailbox.

5.    The e-mail component of Internet Explorer is called_________.

6.    The process of directing a message to the recipient’s host is called__________.

7.    To read incoming mail, choose__________.

8.    __________is called Blind Carbon Copy.

9.    A simple protocol used for fetching e-mail from a remote mailbox is ________.

10.                       Messenger allows you to store e-mail address in its________.

 

Descriptive Type Questions:-

1.    What is an e-mail? What is a “mail box”?

 

2.    Write short notes on the following two protocols used for e-mail:

a.     UUCP

b.    SMTP

 

3.    What was the need for MIME? What are the five different headers specified in MIME?

 

4.    What is the role of DNS in the transfer of e-mail? Give a brief procedure of delivering e-mail on the Internet.

 

 

5.    Define the following terms:

a.     List server

b.    E-mail

 

6.    What is mail header? What does it contain?

 

7.    What is Outlook Express? What are its uses?

 

 

8.    What do you mean by e-mail address? Explain with an example.

9.    Describe how e-mail is stored and transmitted by POP and SMTP servers.

 

10.                       Give an overview of SMTP. Discuss its drawbacks. Discuss the enhancements available in MIME to overcome these drawbacks.

 

 

11.                       What is MIME? How does it help in sending binary data via e-mail message?

 

12.                       Discuss the need for MIME? What are the five different headers specified in MIME?

 

 

13.                       Describe the differences and similarities between an URL and an e-mail address.

 

14.                       How does an e-mail address look like? What are the protocols used for sending/receiving e-mail?

 

 

15.                         Write short notes on the following:

a.     E-mail encryption

b.    Address look

c.     Signature file

 

 


No comments:

Post a Comment

MCQ QUESTIONS

Loading…