CBSE Class 9 Computer Science email and Security on Internet MCQs

Refer to CBSE Class 9 Computer Science email and Security on Internet MCQs provided below. CBSE Class 9 Computer Science MCQs with answers available in Pdf for free download. The MCQ Questions for Class 9 Computer Science with answers have been prepared as per the latest syllabus, CBSE books and examination pattern suggested in Class 9 by CBSE, NCERT and KVS. Multiple Choice Questions for email and Security on Internet are an important part of exams for Class 9 Computer Science and if practiced properly can help you to get higher marks. Refer to more Chapter-wise MCQs for CBSE Class 9 Computer Science and also download more latest study material for all subjects

MCQ for Class 9 Computer Science email and Security on Internet

Class 9 Computer Science students should refer to the following multiple-choice questions with answers for email and Security on Internet in Class 9. These MCQ questions with answers for Class 9 Computer Science will come in exams and help you to score good marks

email and Security on Internet MCQ Questions Class 9 Computer Science with Answers

(1) The data can be transferred via internet can be ..........

(A) Pictures (B) Voice (C) Documents  (D) All of these 

(2) ...... refers to the transmission of messages across computer networks in an electronic form.

(A) MMS  (B) SMS (C) E-mail  (D) Letters 

(3) Electronic-Mail is a method of exchanging ....... messages from sender to one or more recipients using Internet.

(A)  Digital  (B) Analog  (C)  Hybrid  (D) Text 

(4)  Time taken for an  E-mail  to reach its recipient is approximately............

(A)  Seconds /minutes (B)  One hour (C)  Two days (D) A week 

(5)Cost of sending an e-mail is .........

(A)  Cost of stamps (B) Free with Internet Facility

(C)  Cost of Paper (D) Cost of Shipping

(6)Which one of these is the correct e-mail address ?

(A)  info#shardayatan.org (B) info@shardayatan.org (C)  info$shardayatan.org (D) info&shardayatan.org

(7) At present variety of information can be sent through mail such as .............

(A) Audio  (B) Video (C) Animation and Text  (D) All of these 

(8) Audio, Video, Animation and text types of information is collectively known as ....... message.

(A) Text (B) Multi-dimensional  (C) Multi-media (D) Animated 

(9) In comparison with the regular post mails, .......facility is faster and cost effective.

(A) MMS (B) SMS  (C) E-mail (D) Letters

(10) People identity the regular post mail as.......... mail.

(A) Slow (B) Snail  (C) Inefficient  (D) Both (A) and (C) 

(11) A benefit of emailing is ...............

(A) It is fast and personal (B)  It is Global

(C) It is cost effective and productive (D)  All of these 

(12) The unnecessary mail is called.........mail.

(A) Spam  (B) Scrap (C) Trash (D) Garbage 

(13) The basic requirements for e-mailing are that both sender and receiver computers must have internet facility and........addresses.

(A) Home (B) Email (C) Post Office (D) All of these 

(14) In a typical e-mail address info@shardayatan.org, info is a.........

(A) Sign  (B) Host name  (C) Domain  (D) User name 

(15) In a typical e-mail address sweety@yahoo.com, yahoo is a.........

(A) Sign  (B) Host name (C) Domain  (D) User name 

(16)  In a typical e-mail address sweety@yahoo.com,  com is a.........

(A) Sign  (B) Host name (C) Domain (D) User name 

(17)  An email address begins with a ........... , which is selected by the user.

(A) Sign  (B) Host name (C) Domain  (D) User name 

(18)  An email address can be up to ............  characters long.

(A) 254  (B) 255  (C) 256  (D) 257 

(19)  An email address can have special characters like  ..........

(A) Full stop (B) Underscore (C) Hyphen  (D) All of these 

(20) ..............is a Mail Service Provider.

(A) Yahoo (B)  Hotmail  (C) Gmail  (D) All of these 

(21)  The process of registration of an email address is often called.........

(A) Sign Up (B)  Registering  (C) Sign In  (D) Processing 

(22)  The process of registration of an email address is carried out ..........

(A) Twice (B)  Once (C) Never (D) All the time 

(23)  After the process of registration of an email address, the user has to ........

(A) Sign Up  (B)  Register (C) Sign In (D) Process 

(24) The typical operations for an email include .

(A) Send  (B)  Compose (C) Reply and Forward  (D) All of these

(25)The .......... to an email can be documents, music or image files.

(A) Attachment (B)  Add-on (C) Connection (D) Extra-part

(26)Once an e-mail is sent from a computer, it goes to the sender's ..........

(A) Computer (B)  Network  (C) Area (D) Internet

(27) An email has to  pass through security features like a ...........  ,  if any.

(A) Protected Area  (B)  Brick Wall  (C) Firewall (D) Spam Wall

(28) ............message is sent by Google after it receives the verification code.

(A) Introduction  (B) Beginner (C) Welcome (D) Verification 

(29) The necessary information to be provided for creating a Gmail account is.........

(A) Name, Username, Password (B) Birthday, Gender, Mobile Phone

(C) Current E-mail address, Location (D) All of these 

(30) ........... is an application that runs on a personal computer and is capable of sending, receiving and organizing e-mail.

(A) Client (B) Gmail (C) E-mail client (D) Hotmail 

(31) ......... is one of the efficient information managers as an e-mail client.

(A) Evolution  (B) Evolve (C) Progress  (D) Development 

(32) ........ can filter unwanted e-mails in secured fashion.

(A) Evolution  (B) Evolve (C) Progress  (D) Development 

(33) When using a mail client, there is no need to be always connected to the...........

(A) Modem  (B)  Internet  (C) Network (D) Both (A) and (C) 

(34) Using a mail client, the e-mails can also be composed and saved when the user is .........

(A) Offline (B)  Online  (C) Downloading mails  (D) Uploading mails 

(35) ......... provide facilities like address book, calendars etc at one place.

(A) Client (B)  Gmail  (C) E-mail client (D) Hotmail 

(36)  E-mail clients can handle .......... e-mail accounts after configuring them once only.

(A) Single  (B)  Double (C) Particular (D) Multiple 

(37)  The Evolution client can be chosen directly from the "....... " menu at the Ubuntu screen.

(A) Applications  (B)  Programs (C) Accessories (D) My Computer 

(38)  Evolution is an ............... software.

(A) Hardware  (B)  Application  (C) System (D) Both (B) and (C) 

(39)  While configuring Evolution, the ............ wizard guides through the steps.

(A)  Evolution setup  (B)  Evolution Setup Assistant

(C)  Evolution Assistant (D) Evolution 

(40)  To configure "Sending Email", the Server Type is  ............

(A)  MAP (B) IMAP  (C)  SMTP (D) GMAP 

(41) The Gmail Server for sending emails is.........

(A) imap.gmail.com (B) imap.gmail.org (C) smtp.gmail.com  (D) smtp.gmail.in 

(42)  Full form of ISP is ..............

(A)  Information Service Provider  (B)  Internal Service Provider

(C)  International Service Provider  (D) Internet Service Provider 

(43)  Whenever information and resources  is shared using a public........ , there is a need to assure that only authentic people would use the resource.

(A)  Internet  (B)  Domain (C) Website (D) Server 

(44)  The..........provides base to share information and services across the world without any geographical barriers. 

(A)  Internet (B)  Domain  (C) Website (D) Server 

(45)  Today all the valuable resources available on the Internet have to be saved from ........

(A) Robbers  (B)  Stealers  (C) Hackers (D) Thieves 

(46)  An organization in a shared environment has to keep the information secured against ............  users.

(A) Authenticated  (B)  Unauthenticated (C) Resourceful  (D) Shared 

(47) .........security counts much when it comes to financial and e-commerce application.

(A) Internet (B) Network (C) Services  (D) Security 

(48) ........ systems are difficult to survive without proper security provisions.

(A) Shopping Sites (B)  Bill Payments  (C) Banking  (D) All of these 

(49)  A ........... is a parasite program that comes along with software.

(A) Bug (B)  Disease  (C) Germ  (D) Virus 

(50) A parasite program is usually attached to some fancy and attractive software.

(A) Bug  (B)  Disease  (C) Germ (D) Virus

(51)When the ......... program is executed, the virus is spread.

(A) Host (B)  Main (C) Application (D) System

(52) ..........antivirus software is an example of free and open source antivirus software.

(A) Cleaner (B) Clam  (C) Worms (D) Bug

(53) Antivirus software is available at.............

(A) www.clamantivirus.com (B)  www.clamvirus.com (C)   www.clamwin.com (D) www.clam.co

(54) A.......... is a program or code segment that hides inside a program and performs a harmful function to computer resources.

(A) Worms  (B) Virus  (C) Trojan Horse  (D) Traps 

(55) The name "........." is given from Greek Mythology and the story of Troy.

(A) Worms (B)  Virus (C) Trojan Horse  (D) Traps 

(56)  Popular example of a Trojan horse is the ........... grabber.

(A) Login  (B)  Password  (C) User name (D) Program 

(57)  A Virus is an independent program where as a Worm is an independent ..........

(A) Service  (B)  Function  (C) Service (D) Utility 

(58)  The  ........ virus hybridizes characteristics of viruses and worms.

(A) Logic Bomb (B)  Melissa  (C) Trojan Horse (D) Trap Doors 

(59)  A ......... is a way of accessing system or resources of the system using  an undocumented way.

(A) Logic Bomb (B)  Melissa (C) Trojan Horse (D) Trap Door 

(60) A......is a program that triggers when some logical conditions are met.

(A) Logic Bomb  (B)  Melissa (C) Trojan Horse (D) Trap Door

(61)  Unauthorized access to any system can be made possible through computers unique ..........  address scanning.

(A) ISP  (B)  HTTP (C) IP  (D) TCIP 

(62)  The ......... attacks are used to shut down or make the system inoperable.

(A) Denial (B)  Sniffing (C) Spoofing  (D) Redirecting 

(63)  Many times spam emails are used as carriers of......... attacks.

(A) Denial (B)  Sniffing (C) Spoofing  (D) Redirecting 

(64) ............is a method of secret writing.

(A) Cryptography  (B)  Crypto  (C) Cipher-text  (D) Encipher 

(65)  ....... is an application of various techniques and principles to transform simple message into unintelligible secret message.

(A) Crypto  (B)  Cryptography  (C) Cipher-text  (D) Encipher 

(66)  Cryptography can be used as a tool to..........

(A) Provide privacy (B) To authenticate the identities

(C) To ensure message integrity (D) All of these 

(67)  In Cryptography Terminology, the original message is called...........

(A) Plain Text (B)  Cipher Text (C) Algorithm  (D) Cipher 

(68)  In Cryptography Terminology, the transformed secret message is called..........

(A) Plain Text  (B)  Cipher Text  (C) Algorithm  (D) Cipher 

(69)  The process of converting plain text to cipher-text is known as .............

(A) Encryption  (B)  Encoding  (C) Enciphering (D) All of these 

(70)  The process of converting cipher-text into plain text is known as ..........

(A) Decryption  (B)  Deciphering  (C) Decoding (D) All of these 

(71) The critical information used for encoding or decoding of messages is called as......

(A) Code (B)  Password (C) Key (D) Cipher 

(72)  The above mentioned critical information is also known as ..........  key.

(A)  Public or private  (B)  Asymmetric / symmetric (C) Both (A) and (B) (D) None of these 

(73) Encrypted text can be retrieved but cannot be decoded in the absence of.........

(A) Code  (B) Password  (C) Key  (D) Cipher 

(74) ..........is  the  study  of  principles  and  methods  of  transforming  an  encrypted  message  back  into meaningful information without the knowledge of the key.

(A) Cryptanalysis (B) Code Breaking (C) Cryptology  (D) Both (A) and (C) 

(75) Both cryptography and cryptanalysis together is known as .............

(A) Cryptanalysis  (B) Code Breaking (C) Cryptology (D) Both (A) and (C) 

(76)  When objects are sent via network, they have to be ...... in order to save memory and bandwidth.

(A) Packed  (B) Compressed (C) Condensed  (D) Stacked 

(77) What type of information can be send through an E-mail ?

(A) Text and voice  (B) Text and numbers  (C) Multimedia  (D) All of these 

(78)  Cryptanalysis is also called

(A) code breaking  (B) logic breaking  (C) design breaking  (D) system breaking 

(79) What is the collective name of both cryptography and cryptanalysis ?

(A) Cryptography (B) Cryptanalysis  (C) Cryptology  (D) All of these

More Study Material

CBSE Class 9 Computer Science email and Security on Internet MCQs

We hope students liked the above MCQs for email and Security on Internet designed as per the latest syllabus for Class 9 Computer Science released by CBSE. Students of Class 9 should download the Multiple Choice Questions and Answers in Pdf format and practice the questions and solutions given in above Class 9 Computer Science MCQs Questions on daily basis. All latest MCQs with answers have been developed for Computer Science by referring to the most important and regularly asked topics which the students should learn and practice to get better score in school tests and examinations. Studiestoday is the best portal for Class 9 students to get all latest study material free of cost.

MCQs for Computer Science CBSE Class 9 email and Security on Internet

Expert teachers of studiestoday have referred to NCERT book for Class 9 Computer Science to develop the Computer Science Class 9 MCQs. If you download MCQs with answers for the above chapter daily, you will get higher and better marks in Class 9 test and exams in the current year as you will be able to have stronger understanding of all concepts. Daily Multiple Choice Questions practice of Computer Science and its study material will help students to have stronger understanding of all concepts and also make them expert on all critical topics. You can easily download and save all MCQs for Class 9 Computer Science also from www.studiestoday.com without paying anything in Pdf format. After solving the questions given in the MCQs which have been developed as per latest course books also refer to the NCERT solutions for Class 9 Computer Science designed by our teachers

email and Security on Internet MCQs Computer Science CBSE Class 9

All MCQs given above for Class 9 Computer Science have been made as per the latest syllabus and books issued for the current academic year. The students of Class 9 can refer to the answers which have been also provided by our teachers for all MCQs of Computer Science so that you are able to solve the questions and then compare your answers with the solutions provided by us. We have also provided lot of MCQ questions for Class 9 Computer Science so that you can solve questions relating to all topics given in each chapter. All study material for Class 9 Computer Science students have been given on studiestoday.

email and Security on Internet CBSE Class 9 MCQs Computer Science

Regular MCQs practice helps to gain more practice in solving questions to obtain a more comprehensive understanding of email and Security on Internet concepts. MCQs play an important role in developing understanding of email and Security on Internet in CBSE Class 9. Students can download and save or print all the MCQs, printable assignments, practice sheets of the above chapter in Class 9 Computer Science in Pdf format from studiestoday. You can print or read them online on your computer or mobile or any other device. After solving these you should also refer to Class 9 Computer Science MCQ Test for the same chapter

CBSE MCQs Computer Science Class 9 email and Security on Internet

CBSE Class 9 Computer Science best textbooks have been used for writing the problems given in the above MCQs. If you have tests coming up then you should revise all concepts relating to email and Security on Internet and then take out print of the above MCQs and attempt all problems. We have also provided a lot of other MCQs for Class 9 Computer Science which you can use to further make yourself better in Computer Science

Where can I download latest CBSE MCQs for Class 9 Computer Science email and Security on Internet

You can download the CBSE MCQs for Class 9 Computer Science email and Security on Internet for latest session from StudiesToday.com

Can I download the MCQs of email and Security on Internet Class 9 Computer Science in Pdf

Yes, you can click on the links above and download topic wise MCQs Questions PDFs for email and Security on Internet Class 9 for Computer Science

Are the Class 9 Computer Science email and Security on Internet MCQs available for the latest session

Yes, the MCQs issued by CBSE for Class 9 Computer Science email and Security on Internet have been made available here for latest academic session

How can I download the email and Security on Internet Class 9 Computer Science MCQs

You can easily access the links above and download the email and Security on Internet Class 9 MCQs Computer Science for each topic

Is there any charge for the MCQs with answers for Class 9 Computer Science email and Security on Internet

There is no charge for the MCQs and their answers for Class 9 CBSE Computer Science email and Security on Internet you can download everything free

How can I improve my MCQs in Class 9 Computer Science email and Security on Internet

Regular revision of MCQs given on studiestoday for Class 9 subject Computer Science email and Security on Internet can help you to score better marks in exams

What are MCQs for Class 9 Computer Science email and Security on Internet

Multiple Choice Questions (MCQs) for email and Security on Internet Class 9 Computer Science are objective-based questions which provide multiple answer options, and students are required to choose the correct answer from the given choices.