Social Media MCQs (201-300)

  1. The term “Netiquette” refers to —
    A) Internet manners and etiquette
    B) Speed of network
    C) Email encryption
    D) Online banking
    Answer: A

  2. The first email was sent in —
    A) 1971
    B) 1981
    C) 1991
    D) 2001
    Answer: A

  3. The “Timeline” feature on Facebook shows —
    A) User posts in chronological order
    B) Friends list
    C) Ads only
    D) Messages only
    Answer: A

  4. Which social media site uses “Pins” to save content?
    A) Pinterest
    B) Instagram
    C) Facebook
    D) LinkedIn
    Answer: A

  5. “Reddit Karma” represents —
    A) User reputation points
    B) Payment currency
    C) Comments only
    D) Followers
    Answer: A

  6. The first computer virus was named —
    A) Creeper
    B) ILOVEYOU
    C) MyDoom
    D) Stuxnet
    Answer: A

  7. A “Strong Password” should include —
    A) Letters, numbers, symbols
    B) Only numbers
    C) Only lowercase letters
    D) Birth date
    Answer: A

  8. “Google Workspace” includes —
    A) Gmail, Drive, Docs, Meet
    B) Excel, Word, PowerPoint
    C) Safari, Chrome, Edge
    D) None
    Answer: A

  9. The main purpose of “Cloud Computing” is —
    A) Access data remotely
    B) Speed up CPU
    C) Install OS
    D) Manage printers
    Answer: A

  10. “Bandwidth” refers to —
    A) Data transfer rate
    B) Number of users
    C) Screen size
    D) Network security
    Answer: A

  11. The full form of GUI is —
    A) Graphical User Interface
    B) General User Internet
    C) Global User Interface
    D) Graphical Utility Interface
    Answer: A

  12. “Followers” are mostly used in —
    A) Twitter
    B) Instagram
    C) Both A & B
    D) LinkedIn
    Answer: C

  13. The term “Podcast” stands for —
    A) Portable On Demand Broadcast
    B) Public Online Discussion
    C) Programmed Data Cast
    D) Playback Recording
    Answer: A

  14. “Influencer collaboration” is a part of —
    A) Social Media Marketing
    B) Cybersecurity
    C) Data Mining
    D) Web Hosting
    Answer: A

  15. “Hootsuite” is a tool used for —
    A) Social media management
    B) Video editing
    C) Antivirus protection
    D) Programming
    Answer: A

  16. “Digital Footprint” means —
    A) Traceable online activity of a user
    B) Printed documents
    C) Computer storage
    D) Software license
    Answer: A

  17. The “@” symbol in an email separates —
    A) Username and domain
    B) Password and username
    C) Subject and body
    D) None
    Answer: A

  18. “Spam Filters” are used to —
    A) Block junk emails
    B) Increase bandwidth
    C) Store attachments
    D) Share videos
    Answer: A

  19. “Metadata” means —
    A) Data about data
    B) Main data
    C) Hidden viruses
    D) File format
    Answer: A

  20. Which one of these is NOT a Google service?
    A) Gmail
    B) Drive
    C) Bing
    D) Docs
    Answer: C

  21. “Cyberbullying” is most common on —
    A) Social media
    B) Cloud storage
    C) File systems
    D) Operating systems
    Answer: A

  22. The “ICANN” organization manages —
    A) Domain names and IP addresses
    B) Computer hardware
    C) Internet speeds
    D) Antivirus software
    Answer: A

  23. “Cookies” can be cleared from —
    A) Browser settings
    B) RAM
    C) Hard disk
    D) BIOS
    Answer: A

  24. The first web browser ever created was —
    A) WorldWideWeb
    B) Internet Explorer
    C) Netscape
    D) Mosaic
    Answer: A

  25. The “Address Bar” in a browser is used to —
    A) Enter website URLs
    B) Show bookmarks
    C) Display ads
    D) Block cookies
    Answer: A

  26. The “News Feed” feature belongs to —
    A) Facebook
    B) Instagram
    C) Twitter
    D) All of these
    Answer: D

  27. The full form of SEO is —
    A) Search Engine Optimization
    B) Secure Engine Output
    C) Search Email Option
    D) System Enhanced Output
    Answer: A

  28. The full form of HTML is —
    A) Hyper Text Markup Language
    B) High Tech Machine Learning
    C) Hyper Transfer Management Line
    D) Hyper Tool Markup Line
    Answer: A

  29. “CSS” in web design stands for —
    A) Cascading Style Sheets
    B) Computer System Software
    C) Central Server Setup
    D) Cloud Storage System
    Answer: A

  30. The full form of IP address is —
    A) Internet Protocol Address
    B) Internal Path Address
    C) Interconnected Port
    D) Internet Port
    Answer: A

  31. The “Dark Web” is accessible through —
    A) Tor Browser
    B) Chrome
    C) Safari
    D) Edge
    Answer: A

  32. The “Recycle Bin” is used to —
    A) Restore deleted files
    B) Delete temporary files
    C) Install software
    D) Encrypt data
    Answer: A

  33. “Cache memory” is used to —
    A) Speed up processing
    B) Store backups
    C) Play videos
    D) Delete viruses
    Answer: A

  34. The full form of HTTPs —
    A) Hyper Text Transfer Protocol Secure
    B) High Transfer Technical Protocol
    C) Hyper Test Text Processor
    D) Hybrid Text Transfer Protocol
    Answer: A

  35. “Facebook Watch” is for —
    A) Video streaming
    B) Chat
    C) Status
    D) File sharing
    Answer: A

  36. The “Friend Request” feature is found in —
    A) Facebook
    B) LinkedIn
    C) Snapchat
    D) All of these
    Answer: D

  37. “Bio” on Instagram means —
    A) Short description about user
    B) Account password
    C) Privacy setting
    D) Contact information only
    Answer: A

  38. “Mutual Friends” means —
    A) Common friends between two users
    B) Blocked friends
    C) Suggested friends
    D) None
    Answer: A

  39. Which social network uses “Boards”?
    A) Pinterest
    B) Twitter
    C) LinkedIn
    D) Telegram
    Answer: A

  40. “Impression” in social media means —
    A) Number of times content is displayed
    B) Number of followers
    C) Comments only
    D) Likes only
    Answer: A

  41. The main advantage of hashtags is —
    A) Easy content discovery
    B) Faster download
    C) Encrypted posts
    D) Long captions
    Answer: A

  42. The “Explore Page” helps users —
    A) Discover trending content
    B) Block users
    C) Delete chats
    D) Create ads
    Answer: A

  43. The “Poll” feature allows —
    A) Collecting user opinions
    B) Adding music
    C) Sharing videos
    D) Following pages
    Answer: A

  44. “Threads” app competes directly with —
    A) Twitter (X)
    B) YouTube
    C) Snapchat
    D) Telegram
    Answer: A

  45. “Facebook Marketplace” is used for —
    A) Buying and selling items
    B) Posting photos
    C) Sending messages
    D) Creating reels
    Answer: A

  46. “LinkedIn Premium” offers —
    A) Resume insights and advanced job search
    B) Free courses only
    C) Photo filters
    D) Chat games
    Answer: A

  47. “YouTube Monetization” allows —
    A) Earning money from videos
    B) Buying ads
    C) Removing ads
    D) Downloading videos
    Answer: A

  48. The “Community Guidelines” are created to —
    A) Maintain user safety
    B) Block accounts
    C) Promote paid ads
    D) Delete content
    Answer: A

  49. “Social Media Analytics” is used for —
    A) Tracking engagement metrics
    B) Managing passwords
    C) Creating websites
    D) Installing software
    Answer: A

  50. “Data Breach” means —
    A) Unauthorized access to confidential data
    B) Data backup
    C) Internet connection loss
    D) File corruption
    Answer: A

  51. “Incognito Mode” is used for —
    A) Private browsing
    B) Video download
    C) Clearing cache
    D) File sharing
    Answer: A

  52. “Pop-ups” in browsers are —
    A) Small advertisement windows
    B) Antivirus tools
    C) Download files
    D) Error messages
    Answer: A

  53. “Pharming” refers to —
    A) Redirecting users to fake websites
    B) Planting malware
    C) Growing networks
    D) Stealing photos
    Answer: A

  54. “Cyber Forensics” involves —
    A) Investigating digital crimes
    B) Managing servers
    C) Designing hardware
    D) Formatting drives
    Answer: A

  55. “Encryption” converts data into —
    A) Secret code
    B) Image file
    C) Virus
    D) Password
    Answer: A

  56. “Cookies Policy” explains —
    A) How a website stores and uses cookies
    B) Antivirus updates
    C) Wi-Fi connection
    D) Download rules
    Answer: A

  57. “Clickbait” refers to —
    A) Misleading headlines to attract clicks
    B) Fake accounts
    C) Paid promotions
    D) Spam emails
    Answer: A

  58. “Two-Factor Authentication” uses —
    A) Password and OTP
    B) Password only
    C) OTP only
    D) Captcha
    Answer: A

  59. The “Terms of Service” must be accepted —
    A) Before using an app
    B) After deletion
    C) Before uninstalling
    D) Never
    Answer: A

  60. The “Cyber Swachhta Kendra” in India was launched by —
    A) CERT-In
    B) ISRO
    C) NITI Aayog
    D) RBI
    Answer: A

  61. “Digital India” was launched in —
    A) 2015
    B) 2016
    C) 2017
    D) 2014
    Answer: A

  62. “E-mail Spoofing” means —
    A) Sending fake emails from forged addresses
    B) Encrypting mail
    C) Spam filtering
    D) Drafting mails
    Answer: A

  63. “Malicious links” are often spread via —
    A) Emails and messages
    B) Antivirus
    C) File compression
    D) Password managers
    Answer: A

  64. “Firewall” monitors —
    A) Network traffic
    B) CPU usage
    C) Screen resolution
    D) File extensions
    Answer: A

  65. “Adware” is software that —
    A) Displays unwanted ads
    B) Deletes ads
    C) Scans for viruses
    D) Encrypts files
    Answer: A

  66. The term “Cyber Space” means —
    A) Virtual environment of the internet
    B) Outer space
    C) Computer lab
    D) Mobile app store
    Answer: A

  67. “Social Engineering” attack means —
    A) Manipulating people to reveal confidential info
    B) Creating websites
    C) Programming
    D) Debugging
    Answer: A

  68. “Keylogger” records —
    A) Keystrokes
    B) Passwords only
    C) Screen resolution
    D) Network logs
    Answer: A

  69. “Botnet” is —
    A) A network of infected computers
    B) Antivirus software
    C) Social app
    D) Cloud server
    Answer: A

  70. The full form of SMS gateway is —
    A) Short Message Service Gateway
    B) Secure Mail System
    C) Server Message Setup
    D) Smart Messaging System
    Answer: A

  71. “Bandwidth” is measured in —
    A) Mbps
    B) Watts
    C) Pixels
    D) Bytes
    Answer: A

  72. “Fake followers” can be generated using —
    A) Bots
    B) Antivirus
    C) VPN
    D) Spam filters
    Answer: A

  73. “YouTube Premium” provides —
    A) Ad-free experience
    B) Paid ads
    C) Cloud backup
    D) Photo editing
    Answer: A

  74. “Algorithm” in social media decides —
    A) Which content appears on feed
    B) User password
    C) App updates
    D) Internet speed
    Answer: A

  75. “Cyber Awareness Week” is organized by —
    A) CERT-In (India)
    B) Facebook
    C) Microsoft
    D) TRAI
    Answer: A

  76. The “Creator Studio” is a tool for —
    A) Managing social media content
    B) Video conferencing
    C) Programming
    D) Cloud hosting
    Answer: A

  77. “Influencer engagement rate” measures —
    A) Likes, comments, and shares per post
    B) Video upload speed
    C) Ad revenue
    D) Number of followers only
    Answer: A

  78. “Fake profile detection” is done using —
    A) AI algorithms
    B) Firewalls
    C) Antivirus
    D) Manual entry
    Answer: A

  79. “Cybersecurity Awareness Month” is observed in —
    A) October
    B) March
    C) May
    D) December
    Answer: A

  80. “Hoax” means —
    A) False or misleading online message
    B) Secure website
    C) Verified information
    D) Backup data
    Answer: A

  81. “Trolling” aims to —
    A) Provoke or upset users
    B) Spread awareness
    C) Share positivity
    D) None
    Answer: A

  82. “Google Trends” is used for —
    A) Analyzing search popularity
    B) Email filtering
    C) Cloud storage
    D) Encryption
    Answer: A

  83. The “S” in HTTPS stands for —
    A) Secure
    B) Server
    C) Socket
    D) System
    Answer: A

  84. “DMCA” protects —
    A) Copyrighted online content
    B) Banking passwords
    C) Spam filters
    D) VPN access
    Answer: A

  85. “Digital Signature” ensures —
    A) Authenticity of sender
    B) Speed of email
    C) Encrypted attachment
    D) None
    Answer: A

  86. The first Indian social media app was —
    A) Hike
    B) ShareChat
    C) Koo
    D) None
    Answer: B

  87. “Koo” app is an Indian alternative to —
    A) Twitter
    B) Instagram
    C) YouTube
    D) Snapchat
    Answer: A

  88. “ShareChat” is available in —
    A) Regional Indian languages
    B) Only English
    C) Only Hindi
    D) Foreign languages only
    Answer: A

  89. “Data Mining” refers to —
    A) Extracting patterns from large datasets
    B) Deleting files
    C) Sharing videos
    D) Formatting drives
    Answer: A

  90. “Cloudflare” is used for —
    A) Website security and CDN
    B) Video editing
    C) File compression
    D) Email sending
    Answer: A

  91. “YouTube Shorts” directly competes with —
    A) TikTok
    B) Gmail
    C) Skype
    D) Pinterest
    Answer: A

  92. “ReTweet with comment” feature is called —
    A) Quote Tweet
    B) Shared Post
    C) Thread
    D) Mention
    Answer: A

  93. “Verified badge” ensures —
    A) Authenticity of account
    B) High followers
    C) Paid promotion
    D) New user
    Answer: A

  94. “Facebook Lite” is designed for —
    A) Low-speed networks
    B) Business pages
    C) Gaming
    D) Paid ads
    Answer: A

  95. “Digital Detox” means —
    A) Taking a break from screens and social media
    B) Deleting files
    C) Updating apps
    D) Changing passwords
    Answer: A

  96. “Online Reputation Management” deals with —
    A) Managing brand image on internet
    B) Hacking prevention
    C) Speed optimization
    D) None
    Answer: A

  97. “Meta Horizon Worlds” is related to —
    A) Virtual Reality (VR)
    B) Antivirus
    C) Search Engine
    D) AI Chat
    Answer: A

  98. The “Notification Bell” icon represents —
    A) Alerts and updates
    B) Logout
    C) Security
    D) Privacy settings
    Answer: A

  99. “Social Media Algorithm Update” impacts —
    A) Content visibility
    B) CPU performance
    C) App installation
    D) Hardware drivers
    Answer: A

  100. “Trending Hashtags” are shown based on —
    A) Popularity and engagement
    B) Upload time
    C) Profile views
    D) Paid ads
    Answer: A

Leave a Comment

Your email address will not be published. Required fields are marked *

You cannot copy content of this page

Scroll to Top