Social Media MCQs (201-300)
The term “Netiquette” refers to —
A) Internet manners and etiquette
B) Speed of network
C) Email encryption
D) Online banking
Answer: AThe first email was sent in —
A) 1971
B) 1981
C) 1991
D) 2001
Answer: AThe “Timeline” feature on Facebook shows —
A) User posts in chronological order
B) Friends list
C) Ads only
D) Messages only
Answer: AWhich social media site uses “Pins” to save content?
A) Pinterest
B) Instagram
C) Facebook
D) LinkedIn
Answer: A“Reddit Karma” represents —
A) User reputation points
B) Payment currency
C) Comments only
D) Followers
Answer: AThe first computer virus was named —
A) Creeper
B) ILOVEYOU
C) MyDoom
D) Stuxnet
Answer: AA “Strong Password” should include —
A) Letters, numbers, symbols
B) Only numbers
C) Only lowercase letters
D) Birth date
Answer: A“Google Workspace” includes —
A) Gmail, Drive, Docs, Meet
B) Excel, Word, PowerPoint
C) Safari, Chrome, Edge
D) None
Answer: AThe main purpose of “Cloud Computing” is —
A) Access data remotely
B) Speed up CPU
C) Install OS
D) Manage printers
Answer: A“Bandwidth” refers to —
A) Data transfer rate
B) Number of users
C) Screen size
D) Network security
Answer: AThe full form of GUI is —
A) Graphical User Interface
B) General User Internet
C) Global User Interface
D) Graphical Utility Interface
Answer: A“Followers” are mostly used in —
A) Twitter
B) Instagram
C) Both A & B
D) LinkedIn
Answer: CThe term “Podcast” stands for —
A) Portable On Demand Broadcast
B) Public Online Discussion
C) Programmed Data Cast
D) Playback Recording
Answer: A“Influencer collaboration” is a part of —
A) Social Media Marketing
B) Cybersecurity
C) Data Mining
D) Web Hosting
Answer: A“Hootsuite” is a tool used for —
A) Social media management
B) Video editing
C) Antivirus protection
D) Programming
Answer: A“Digital Footprint” means —
A) Traceable online activity of a user
B) Printed documents
C) Computer storage
D) Software license
Answer: AThe “@” symbol in an email separates —
A) Username and domain
B) Password and username
C) Subject and body
D) None
Answer: A“Spam Filters” are used to —
A) Block junk emails
B) Increase bandwidth
C) Store attachments
D) Share videos
Answer: A“Metadata” means —
A) Data about data
B) Main data
C) Hidden viruses
D) File format
Answer: AWhich one of these is NOT a Google service?
A) Gmail
B) Drive
C) Bing
D) Docs
Answer: C“Cyberbullying” is most common on —
A) Social media
B) Cloud storage
C) File systems
D) Operating systems
Answer: AThe “ICANN” organization manages —
A) Domain names and IP addresses
B) Computer hardware
C) Internet speeds
D) Antivirus software
Answer: A“Cookies” can be cleared from —
A) Browser settings
B) RAM
C) Hard disk
D) BIOS
Answer: AThe first web browser ever created was —
A) WorldWideWeb
B) Internet Explorer
C) Netscape
D) Mosaic
Answer: AThe “Address Bar” in a browser is used to —
A) Enter website URLs
B) Show bookmarks
C) Display ads
D) Block cookies
Answer: AThe “News Feed” feature belongs to —
A) Facebook
B) Instagram
C) Twitter
D) All of these
Answer: DThe full form of SEO is —
A) Search Engine Optimization
B) Secure Engine Output
C) Search Email Option
D) System Enhanced Output
Answer: AThe full form of HTML is —
A) Hyper Text Markup Language
B) High Tech Machine Learning
C) Hyper Transfer Management Line
D) Hyper Tool Markup Line
Answer: A“CSS” in web design stands for —
A) Cascading Style Sheets
B) Computer System Software
C) Central Server Setup
D) Cloud Storage System
Answer: AThe full form of IP address is —
A) Internet Protocol Address
B) Internal Path Address
C) Interconnected Port
D) Internet Port
Answer: AThe “Dark Web” is accessible through —
A) Tor Browser
B) Chrome
C) Safari
D) Edge
Answer: AThe “Recycle Bin” is used to —
A) Restore deleted files
B) Delete temporary files
C) Install software
D) Encrypt data
Answer: A“Cache memory” is used to —
A) Speed up processing
B) Store backups
C) Play videos
D) Delete viruses
Answer: AThe full form of HTTPs —
A) Hyper Text Transfer Protocol Secure
B) High Transfer Technical Protocol
C) Hyper Test Text Processor
D) Hybrid Text Transfer Protocol
Answer: A“Facebook Watch” is for —
A) Video streaming
B) Chat
C) Status
D) File sharing
Answer: AThe “Friend Request” feature is found in —
A) Facebook
B) LinkedIn
C) Snapchat
D) All of these
Answer: D“Bio” on Instagram means —
A) Short description about user
B) Account password
C) Privacy setting
D) Contact information only
Answer: A“Mutual Friends” means —
A) Common friends between two users
B) Blocked friends
C) Suggested friends
D) None
Answer: AWhich social network uses “Boards”?
A) Pinterest
B) Twitter
C) LinkedIn
D) Telegram
Answer: A“Impression” in social media means —
A) Number of times content is displayed
B) Number of followers
C) Comments only
D) Likes only
Answer: AThe main advantage of hashtags is —
A) Easy content discovery
B) Faster download
C) Encrypted posts
D) Long captions
Answer: AThe “Explore Page” helps users —
A) Discover trending content
B) Block users
C) Delete chats
D) Create ads
Answer: AThe “Poll” feature allows —
A) Collecting user opinions
B) Adding music
C) Sharing videos
D) Following pages
Answer: A“Threads” app competes directly with —
A) Twitter (X)
B) YouTube
C) Snapchat
D) Telegram
Answer: A“Facebook Marketplace” is used for —
A) Buying and selling items
B) Posting photos
C) Sending messages
D) Creating reels
Answer: A“LinkedIn Premium” offers —
A) Resume insights and advanced job search
B) Free courses only
C) Photo filters
D) Chat games
Answer: A“YouTube Monetization” allows —
A) Earning money from videos
B) Buying ads
C) Removing ads
D) Downloading videos
Answer: AThe “Community Guidelines” are created to —
A) Maintain user safety
B) Block accounts
C) Promote paid ads
D) Delete content
Answer: A“Social Media Analytics” is used for —
A) Tracking engagement metrics
B) Managing passwords
C) Creating websites
D) Installing software
Answer: A“Data Breach” means —
A) Unauthorized access to confidential data
B) Data backup
C) Internet connection loss
D) File corruption
Answer: A“Incognito Mode” is used for —
A) Private browsing
B) Video download
C) Clearing cache
D) File sharing
Answer: A“Pop-ups” in browsers are —
A) Small advertisement windows
B) Antivirus tools
C) Download files
D) Error messages
Answer: A“Pharming” refers to —
A) Redirecting users to fake websites
B) Planting malware
C) Growing networks
D) Stealing photos
Answer: A“Cyber Forensics” involves —
A) Investigating digital crimes
B) Managing servers
C) Designing hardware
D) Formatting drives
Answer: A“Encryption” converts data into —
A) Secret code
B) Image file
C) Virus
D) Password
Answer: A“Cookies Policy” explains —
A) How a website stores and uses cookies
B) Antivirus updates
C) Wi-Fi connection
D) Download rules
Answer: A“Clickbait” refers to —
A) Misleading headlines to attract clicks
B) Fake accounts
C) Paid promotions
D) Spam emails
Answer: A“Two-Factor Authentication” uses —
A) Password and OTP
B) Password only
C) OTP only
D) Captcha
Answer: AThe “Terms of Service” must be accepted —
A) Before using an app
B) After deletion
C) Before uninstalling
D) Never
Answer: AThe “Cyber Swachhta Kendra” in India was launched by —
A) CERT-In
B) ISRO
C) NITI Aayog
D) RBI
Answer: A“Digital India” was launched in —
A) 2015
B) 2016
C) 2017
D) 2014
Answer: A“E-mail Spoofing” means —
A) Sending fake emails from forged addresses
B) Encrypting mail
C) Spam filtering
D) Drafting mails
Answer: A“Malicious links” are often spread via —
A) Emails and messages
B) Antivirus
C) File compression
D) Password managers
Answer: A“Firewall” monitors —
A) Network traffic
B) CPU usage
C) Screen resolution
D) File extensions
Answer: A“Adware” is software that —
A) Displays unwanted ads
B) Deletes ads
C) Scans for viruses
D) Encrypts files
Answer: AThe term “Cyber Space” means —
A) Virtual environment of the internet
B) Outer space
C) Computer lab
D) Mobile app store
Answer: A“Social Engineering” attack means —
A) Manipulating people to reveal confidential info
B) Creating websites
C) Programming
D) Debugging
Answer: A“Keylogger” records —
A) Keystrokes
B) Passwords only
C) Screen resolution
D) Network logs
Answer: A“Botnet” is —
A) A network of infected computers
B) Antivirus software
C) Social app
D) Cloud server
Answer: AThe full form of SMS gateway is —
A) Short Message Service Gateway
B) Secure Mail System
C) Server Message Setup
D) Smart Messaging System
Answer: A“Bandwidth” is measured in —
A) Mbps
B) Watts
C) Pixels
D) Bytes
Answer: A“Fake followers” can be generated using —
A) Bots
B) Antivirus
C) VPN
D) Spam filters
Answer: A“YouTube Premium” provides —
A) Ad-free experience
B) Paid ads
C) Cloud backup
D) Photo editing
Answer: A“Algorithm” in social media decides —
A) Which content appears on feed
B) User password
C) App updates
D) Internet speed
Answer: A“Cyber Awareness Week” is organized by —
A) CERT-In (India)
B) Facebook
C) Microsoft
D) TRAI
Answer: AThe “Creator Studio” is a tool for —
A) Managing social media content
B) Video conferencing
C) Programming
D) Cloud hosting
Answer: A“Influencer engagement rate” measures —
A) Likes, comments, and shares per post
B) Video upload speed
C) Ad revenue
D) Number of followers only
Answer: A“Fake profile detection” is done using —
A) AI algorithms
B) Firewalls
C) Antivirus
D) Manual entry
Answer: A“Cybersecurity Awareness Month” is observed in —
A) October
B) March
C) May
D) December
Answer: A“Hoax” means —
A) False or misleading online message
B) Secure website
C) Verified information
D) Backup data
Answer: A“Trolling” aims to —
A) Provoke or upset users
B) Spread awareness
C) Share positivity
D) None
Answer: A“Google Trends” is used for —
A) Analyzing search popularity
B) Email filtering
C) Cloud storage
D) Encryption
Answer: AThe “S” in HTTPS stands for —
A) Secure
B) Server
C) Socket
D) System
Answer: A“DMCA” protects —
A) Copyrighted online content
B) Banking passwords
C) Spam filters
D) VPN access
Answer: A“Digital Signature” ensures —
A) Authenticity of sender
B) Speed of email
C) Encrypted attachment
D) None
Answer: AThe first Indian social media app was —
A) Hike
B) ShareChat
C) Koo
D) None
Answer: B“Koo” app is an Indian alternative to —
A) Twitter
B) Instagram
C) YouTube
D) Snapchat
Answer: A“ShareChat” is available in —
A) Regional Indian languages
B) Only English
C) Only Hindi
D) Foreign languages only
Answer: A“Data Mining” refers to —
A) Extracting patterns from large datasets
B) Deleting files
C) Sharing videos
D) Formatting drives
Answer: A“Cloudflare” is used for —
A) Website security and CDN
B) Video editing
C) File compression
D) Email sending
Answer: A“YouTube Shorts” directly competes with —
A) TikTok
B) Gmail
C) Skype
D) Pinterest
Answer: A“ReTweet with comment” feature is called —
A) Quote Tweet
B) Shared Post
C) Thread
D) Mention
Answer: A“Verified badge” ensures —
A) Authenticity of account
B) High followers
C) Paid promotion
D) New user
Answer: A“Facebook Lite” is designed for —
A) Low-speed networks
B) Business pages
C) Gaming
D) Paid ads
Answer: A“Digital Detox” means —
A) Taking a break from screens and social media
B) Deleting files
C) Updating apps
D) Changing passwords
Answer: A“Online Reputation Management” deals with —
A) Managing brand image on internet
B) Hacking prevention
C) Speed optimization
D) None
Answer: A“Meta Horizon Worlds” is related to —
A) Virtual Reality (VR)
B) Antivirus
C) Search Engine
D) AI Chat
Answer: AThe “Notification Bell” icon represents —
A) Alerts and updates
B) Logout
C) Security
D) Privacy settings
Answer: A“Social Media Algorithm Update” impacts —
A) Content visibility
B) CPU performance
C) App installation
D) Hardware drivers
Answer: A“Trending Hashtags” are shown based on —
A) Popularity and engagement
B) Upload time
C) Profile views
D) Paid ads
Answer: A