Basic Internet MCQs with Answers
Elon Musk walked away from his $44 billion bid to buy ____.
- A. WhatsApp
- B. Facebook
- C. Twitter
- D. Instagram
Which website attracts the most global traffic?
- A. Facebook
- B. YouTube
- C. Google
- D. Instagram
- E. Twitter
Directly after Google, which site ranks second in visits?
- A. YouTube
- B. Facebook
- C. Instagram
- D. Twitter
Jan Koum and Brian Acton founded which messaging service?
- A. Twitter
- B. WhatsApp
- C. YouTube
- D. Facebook
- E. All of these
In what year did Facebook acquire WhatsApp?
- A. 2004
- B. 2018
- C. 2014
- D. 2021
WhatsApp’s headquarters are located in which U.S. state?
- A. Washington
- B. Hawaii
- C. New York
- D. California
- E. None of these
Which year marks the founding of WhatsApp?
- A. 2005
- B. 2009
- C. 2001
- D. 2018
Which of these rarely causes an email to bounce?
- A. Mail server down
- B. Stale file handle
- C. Wrong domain name
- D. Invalid user name
Which is a valid top-level domain?
- A. .com
- B. Http
- C. HTML
- D. URL
Which format is a properly formed email address?
- A. name@website.info
- B. name@website@info
- C. www.nameofwebsite.com
- D. All
What are the tiny data files saved by websites on your drive called?
- A. Codes
- B. Cookies
- C. Trackers
- D. None
Which is NOT a primary role of the Internet?
- A. Email reception
- B. Product advertising
- C. Linking computers
- D. All of these
What tool shields private networks from outside threats?
- A. Cyber Crime
- B. Search Engine
- C. Browser
- D. Firewall
Mozilla Firefox is best described as a ___.
- A. Antivirus
- B. Web browser
- C. URL
- D. Code
What do you call a saved reference to a webpage for quick return?
- A. Footer
- B. Bookmark
- C. Header
- D. Page number
Which protocol sends email, and which retrieves it?
- A. POP and SMTP
- B. SMTP and POP
- C. POP and HTTP
- D. HTTP and SMTP
What term describes navigating from one site to another?
- A. Uploading
- B. Browsing
- C. Downloading
- D. None
Which trio represents the top three social networks today?
- A. Facebook, Myspace, Twitter
- B. Google, Yahoo, Bing
- C. Bebo, Blogster, Facebook
- D. None
In which year did LinkedIn launch?
- A. 2009
- B. 2003
- C. 2012
- D. 2006
Sergey Brin and Larry Page co-founded which company?
- A. Twitter
- B. Facebook
- C. YouTube
- D. Google
Google’s headquarters reside in which country?
- A. France
- B. China
- C. USA
- D. Russia
The misuse of computers and networks is called ____.
- A. Cyber Crime
- B. Search Engine
- C. Browser
- D. Firewall
Which browser feature records pages you’ve visited this session?
- A. History
- B. Cache
- C. Trail
- D. None
Which graphic format is ubiquitous online?
- A. BMP
- B. GIF
- C. TXT
- D. IMP
The term ____—also called the web—refers to all publicly accessible documents.
- A. Web portal
- B. HTFP
- C. World Wide Web
- D. Domain
HTTPS ensures what kind of network communication?
- A. secure
- B. text
- C. voice
- D. video
In the TCP/IP model, data travels up through the layers—what’s the fifth layer at the receiver?
- A. Application
- B. Presentation
- C. Session
- D. Transport
A relational database setup includes all EXCEPT:
- A. users
- B. separate files
- C. database
- D. all of these
Which non-member function can still access a class’s private members?
- A. static
- B. friend
- C. constructor
- D. destructor
When a database copy is duplicated across multiple sites, it’s called a ____.
- A. Replicated database
- B. Distributed database
- C. Hybrid database
- D. None
Which of these is a cloud storage example?
- A. Internet Explorer
- B. Mozilla Firefox
- C. Skype
- D. Dropbox
Which company rolled out the AI-driven NotebookLM app?
- A. Meta
- B. Microsoft
- C. Amazon
- D. Google
Signing into an online account is also known as ____.
- A. Log in
- B. Sign in
- C. Sign out
- D. None of these
The first network that evolved into today’s Internet was ____.
- A. Inet
- B. Vnet
- C. ARPANET
- D. None
Which type of computer is most prevalent worldwide?
- A. Analog
- B. Digital
- C. Supercomputer
- D. None of these
Google’s global headquarters is in which state?
- A. California
- B. Paris
- C. London
- D. Vienna
- E. None
Radio waves serve as an example of ____ signals.
- A. Analog
- B. Digital
- C. Optical
- D. Magnetic
Writing code in a programming language is called ____.
- A. Testing
- B. Debugging
- C. Coding
- D. None
An optical fiber setup is primarily a ____ system.
- A. telecommunication
- B. networking
- C. software
- D. None
Unauthorized access to someone else’s email is known as ____.
- A. Finding password
- B. Finding address
- C. Finding server
- D. Illegal access
To deactivate your email, you should select ____.
- A. Sign Out
- B. Log Out
- C. Exit
- D. Deactivate Account
Gmail stands for ____.
- A. Gold Mail
- B. Great Mail
- C. Grooming Mail
- D. Google Mail
- E. All of the above
Yahoo Mail limits attachments to ____ MB.
- A. 25
- B. 35
- C. 45
- D. 55
When sending mail, the ‘From’ field must contain your ____.
- A. To address
- B. From address
- C. Cc
- D. Bcc
Sent emails are stored in the ____ folder.
- A. Sentbox
- B. Outbox
- C. Inbox
- D. None
Which platform is known for professional networking?
- A. LinkedIn
- B. Email
- C. Instagram
- D. Facebook
WhatsApp operates under which parent company?
- A. Twitter
- B. Instagram
- C. YouTube
- D. Meta
A computer needs a ____ to function at all.
- A. memory
- B. keyboard
- C. program
- D. none
The main identifier for a website’s home page is its ____.
- A. URL
- B. IP address
- C. Windows Explorer
- D. None
One-to-one private chatting apps fall under ____ services.
- A. Instant Messaging
- B. IMO
- C. WhatsApp
- D. None
Internet Explorer is categorized as a ____.
- A. Browser
- B. Operating System
- C. Compiler
- D. None
Which U.S. agency originally developed what became the Internet?
- A. NSA
- B. NSF
- C. ARPA
- D. None
Which represents the largest data storage unit?
- A. KB
- B. MB
- C. GB
- D. TB
The device that originates data signals is called the ____.
- A. Transmitter
- B. Source
- C. Receiver
- D. Transmission system
The component that receives incoming signals is the ____.
- A. Destination
- B. Source
- C. Transmitter
- D. Transmission system
A website’s primary landing page is called the ____.
- A. Home Page
- B. Browser Page
- C. Search Page
- D. None
Spam email is also known as ____.
- A. Spoof
- B. Spill
- C. Spam
- D. Spat
http://www.google.com is an example of a ____.
- A. URL
- B. IP address
- C. Website
- D. None
To access web content you need a ____.
- A. Web browser
- B. Hypertext viewer
- C. Domain name server
- D. Cable modem
The Internet is best described as a ____.
- A. single network
- B. network of networks
- C. country-wide network
- D. None
Connecting multiple computers for sharing resources creates a ____.
- A. Pipeline
- B. Router
- C. Server
- D. Network
Encrypting text means ____ it to protect security.
- A. compressing
- B. expanding
- C. scrambling
- D. hashing
Which protocol handles web page retrieval?
- A. HTTP
- B. TCP
- C. IP
- D. None
Which is not a core function of an operating system?
- A. Linux
- B. DOS
- C. Oracle
- D. Windows
User login verification is known as ____.
- A. authentication
- B. configuration
- C. accessibility
- D. None
Popular online meeting tools include ____.
- A. Google Drive
- B. Amazon cloud
- C. Google Meet, Zoom, Teams
- D. All
A browser’s auto-fill feature is called ____.
- A. auto-complete
- B. feed
- C. web slices
- D. None
Which of these is a commonly used browser?
- A. Paint
- B. PowerPoint
- C. Word
- D. Firefox
Cybersecurity aims to protect ____.
- A. hardware
- B. data
- C. software
- D. All of these
Gmail, Hotmail, and Yahoo Mail are ____ software.
- A. Email servers
- B. User servers
- C. Email clients
- D. None
Who are the two founders of Google?
- A. Sergey Brin
- B. Larry Page
- C. Steve Jobs
- D. Both A & B
Which year did Google begin?
- A. 1991
- B. 2003
- C. 1998
- D. 2001
- E. 1996
The earliest major search engine was ____.
- A. Yahoo
- B. Google
- C. MSN
- D. None
Sites track users via stored data called ____.
- A. proxy
- B. defender
- C. tracker
- D. VPN
To download a file from the Internet is to ____ it.
- A. Forward
- B. Download
- C. Upload
- D. None
The four segments of an IP address are called ____.
- A. octets
- B. coxtex
- C. quads
- D. binary
Which protocol is designed for file transfer?
- A. TCP
- B. IP
- C. UDP
- D. FTP
SMTP represents ____.
- A. Simple Mail Transfer Protocol
- B. Simple Merge Transfer Protocol
- C. Senior Mail Transfer Protocol
- D. None
Which protocol retrieves mail from a server?
- A. HTTP
- B. SMTP
- C. POP
- D. IMAP
Which character is mandatory in an email address?
- A. Period (.)
- B. Space
- C. At sign (@)
- D. Underscore (_)
- E. All
Sending an email parallels ____.
- A. Drawing
- B. Writing a letter
- C. Talking
- D. Shipping a package
The subject line in an email is also called the ____.
- A. Subject
- B. Inbox
- C. Content
- D. None
Software that manages core computer operations is termed ____.
- A. System software
- B. Utility software
- C. Application software
- D. None
Which is not a search engine?
- A. Yahoo
- B. Windows
- C. Google
- D. Bing
HTTP expands to ____.
- A. Hypertext Transfer Protocol
- B. Hypertext Transfer Protection
- C. Hyper Transfer Protocol
- D. None
The Internet is nicknamed ____.
- A. The Net
- B. A network of networks
- C. Both
- D. None
Vint Cerf is known as the ____ of the Internet.
- A. Father
- B. Inventor
- C. Architect
- D. None
Email stands for ____.
- A. Easy Mail
- B. Electronic Mail
- C. Electric Mail
- D. Eye Mail
Hyperlinks may be presented as ____.
- A. Text
- B. Shapes
- C. Images
- D. All
A machine that serves client requests over a network is a ____.
- A. Biometric device
- B. Web server
- C. Operating system
- D. Web page