Q1. The "Semantic Web", which allows data to be shared and reused across application, enterprise, and community boundaries, is often referred to as:

A) Web 1.0

B) Web 2.0

C) Web 3.0

D) Dark Web

E) Deep Web

Answer: C (A web where machines understand the meaning of data).

 

Q2. Which error code indicates "Forbidden" access (the server understood the request but refuses to authorize it)?

A) 404

B) 200

C) 403

D) 500

E) 503

Answer: C

 

Q3. Which error code indicates "Internal Server Error"?

A) 404

B) 400

C) 500

D) 502

E) 401

Answer: C

 

Q4. "Cookies" are small text files stored on the user's computer. "Third-party cookies" are primarily used for:

A) Saving login passwords.

B) Improving site speed.

C) Cross-site tracking and targeted advertising.

D) Virus scanning.

E) Playing videos.

Answer: C

 

Q5. Which Cloud Computing model provides a virtualized computing environment (like virtual machines, storage, and networks) over the internet?

A) SaaS (Software as a Service)

B) PaaS (Platform as a Service)

C) IaaS (Infrastructure as a Service)

D) DaaS (Data as a Service)

E) FaaS (Function as a Service)

Answer: C (Example: Amazon EC2).

 

Q6. "Google Docs" or "Office 365 Online" is a classic example of:

A) IaaS

B) PaaS

C) SaaS

D) Private Cloud

E) Hardware

Answer: C (You use the software directly via web).

 

Q7. "Tor" (The Onion Router) is a browser used to access:

A) The Surface Web

B) The Dark Web

C) Google Drive

D) Social Media only

E) Localhost

Answer: B (It anonymizes traffic).

 

Q8. Which protocol is used to upload files from a local computer to a remote web server?

A) HTTP

B) FTP (File Transfer Protocol)

C) SMTP

D) POP3

E) DHCP

Answer: B

 

Q9. "XML" is designed to store and transport data. It stands for:

A) Extensible Markup Language

B) Extra Markup Language

C) Extended Media Language

D) X-factor Markup Language

E) External Markup Language

Answer: A

 

Q10. What is the main difference between "HTML" and "XML"?

A) HTML displays data; XML describes/stores data.

B) XML displays data; HTML stores data.

C) HTML is stricter than XML.

D) XML is for images.

E) There is no difference.

Answer: A

 

Q11. "JavaScript" code is executed on the:

A) Server Side (mostly).

B) Client Side (in the user's browser).

C) Hard Drive.

D) ISP side.

E) Router.

Answer: B (Though Node.js allows server-side execution, traditionally JS is client-side).

 

Q12. The "Incognito Mode" in a browser ensures that:

A) The ISP cannot see your activity.

B) The websites cannot see your IP.

C) The browser does not save History, Cookies, or Cache locally on the device.

D) You are protected from viruses.

E) You browse faster.

Answer: C

 

Q13. Which organization sets the standards for the World Wide Web (like HTML5)?

A) IEEE

B) W3C (World Wide Web Consortium)

C) ISO

D) ICANN

E) Google

Answer: B

 

Q14. "ICANN" is responsible for:

A) Creating web browsers.

B) Managing IP address allocation and Domain Name Systems (DNS).

C) Designing websites.

D) Setting Wi-Fi standards.

E) Manufacturing routers.

Answer: B

 

Q15. "SEO" stands for:

A) Search Engine Organization

B) Search Engine Optimization

C) System Engine Operation

D) Secure Electronic Operation

E) Site External Optimization

Answer: B

 

Q16. A "Wiki" is a website that allows:

A) Only the admin to edit.

B) Collaborative editing of its content and structure by its users.

C) Video streaming only.

D) Secure banking.

E) Shopping.

Answer: B

 

Q17. "Captcha" is a test used to:

A) Encrypt passwords.

B) Distinguish between human users and bots.

C) Speed up internet.

D) Compress images.

E) Block ads.

Answer: B

 

Q18. "Phishing" involves:

A) Sending emails claiming to be from a legitimate company to induce individuals to reveal personal information (passwords/credit cards).

B) Fishing online.

C) Scanning for viruses.

D) Encrypting files.

E) Improving SEO.

Answer: A

 

Q19. The secure version of HTTP (HTTPS) uses which protocol for encryption?

A) SSH

B) SSL/TLS (Secure Sockets Layer / Transport Layer Security)

C) SFTP

D) IPsec

E) PGP

Answer: B

 

Q20. In a URL, the part www is the:

A) Protocol

B) Subdomain

C) Top Level Domain

D) Path

E) Extension

Answer: B

 

Q21. Which Top-Level Domain (TLD) is reserved for US Government agencies?

A) .com

B) .org

C) .gov

D) .edu

E) .mil

Answer: C

 

Q22. "RSS" Feeds allow users to:

A) Send emails.

B) Subscribe to website updates (News, Blogs) in a standardized format.

C) Chat online.

D) Play games.

E) Scan viruses.

Answer: B

 

Q23. "VoIP" allows phone calls over the internet. Popular examples include:

A) Notepad

B) Skype, WhatsApp Calls, Zoom

C) Excel

D) Photoshop

E) Linux

Answer: B

 

Q24. "Sitemap" is:

A) A map of the world.

B) A file where you list the web pages of your site to tell Google and other search engines about the organization of your site content.

C) A virus.

D) A browser plugin.

E) A Wi-Fi tool.

Answer: B

 

Q25. "Meta Tags" are located in which section of the HTML code?

A) <body>

B) <head>

C) <footer>

D) <div>

E) <script>

Answer: B

 

Q26. "URL" stands for:

A) Uniform Resource Locator

B) Universal Resource Link

C) Unique Resource Location

D) United Resource Locator

E) Uniform Registered Link

Answer: A

 

Q27. The first page of a website is technically called the:

A) Index Page (or Home Page)

B) Front Page

C) Master Page

D) Banner Page

E) Title Page

Answer: A (Often saved as index.html).

 

Q28. "Deep Web" refers to:

A) Illegal sites only.

B) Content not indexed by standard search engines (e.g., private databases, emails, bank accounts).

C) The Dark Web only.

D) Old websites.

E) Deleted sites.

Answer: B

 

Q29. "Search Engine Spiders" (Crawlers) are:

A) Viruses.

B) Bots that browse the web to index pages for search engines.

C) Hardware bugs.

D) Hackers.

E) Web designers.

Answer: B

 

Q30. "Plugin" (or Add-on) extends the functionality of:

A) A Web Browser (or other software).

B) The CPU.

C) The Keyboard.

D) The Mouse.

E) The Internet Cable.

Answer: A

 

Q31. Which of the following is NOT a web browser?

A) Safari

B) Edge

C) Chrome

D) Bing

E) Opera

Answer: D (Bing is a Search Engine).

 

Q32. "Cloud Storage" services include:

A) Dropbox, Google Drive, OneDrive

B) Windows 10

C) Intel

D) GeForce

E) MS Word

Answer: A

 

Q33. "IoT" (Internet of Things) relies heavily on:

A) IPv4

B) IPv6 (Due to the massive number of devices needing addresses).

C) Floppy Disks

D) CD-ROMs

E) Keyboards

Answer: B

 

Q34. "Bitcoin" blockchain is a type of:

A) Centralized Database

B) Distributed Ledger Technology (DLT)

C) Cloud Storage

D) Web Browser

E) Social Media

Answer: B

 

Q35. "Web Hosting" provides:

A) A domain name only.

B) Space on a server to store website files so they are accessible on the internet.

C) Internet connection to your house.

D) A browser.

E) An email address.

Answer: B

 

Q36. "VPN" Tunneling protocols include:

A) PPTP, L2TP, IPsec

B) HTTP, FTP

C) SMTP, POP

D) HTML, CSS

E) SQL

Answer: A

 

Q37. "Hyperlink" color changes to what after it has been visited (by default)?

A) Blue

B) Purple

C) Red

D) Green

E) Black

Answer: B

 

Q38. "404 Not Found" is a:

A) Client-side error (Browser asked for a page that doesn't exist).

B) Server-side error (Server crashed).

C) Network error.

D) Hardware error.

E) Success code.

Answer: A

 

Q39. "Internet of Everything" (IoE) is a concept popularized by:

A) Microsoft

B) Cisco

C) Apple

D) Facebook

E) Tesla

Answer: B

 

Q40. "Blockchain" blocks are linked using:

A) Hyperlinks

B) Cryptographic Hashes

C) IP Addresses

D) URLs

E) Bluetooth

Answer: B

 

Q41. "Edge Computing" is efficient because:

A) It processes data closer to the source (IoT device) reducing latency.

B) It uses the fastest supercomputers.

C) It is cheaper.

D) It is wireless.

E) It is Apple technology.

Answer: A

 

Q42. "MIME" (Multipurpose Internet Mail Extensions) allows email to:

A) Send only text.

B) Send non-ASCII text, audio, video, and attachments.

C) Send faster.

D) Encrypt.

E) Filter spam.

Answer: B

 

Q43. "IMAP" differs from "POP3" because:

A) IMAP downloads and deletes mail.

B) IMAP synchronizes mail across multiple devices (leaves copy on server).

C) IMAP is for sending mail.

D) IMAP is offline.

E) IMAP is older.

Answer: B

 

Q44. Which symbol is used in email addresses?

A) #

B) *

C) @

D) &

E) $

Answer: C

 

Q45. "BCC" in email stands for:

A) Blind Carbon Copy

B) Back Carbon Copy

C) Blank Copy

D) Base Copy

E) Blind Copy Carbon

Answer: A

 

Q46. "Web 2.0" is characterized by:

A) Static pages (Read-only).

B) User-generated content, Social Media, and Interactivity (Read-Write).

C) Semantic Web.

D) AI.

E) VR.

Answer: B

 

Q47. A "Blog" is short for:

A) Web Log

B) Bio Log

C) Basic Log

D) Business Log

E) Binary Log

Answer: A

 

Q48. "Favicon" is:

A) A favorite contact.

B) The small icon displayed in the browser tab next to the page title.

C) A virus.

D) A bookmark.

E) A cookie.

Answer: B

 

Q49. "Firewall" protects against:

A) Viruses on a USB.

B) Unauthorized access from the network/internet.

C) Hardware failure.

D) Power surges.

E) Spam emails.

Answer: B

 

Q50. "Digital Certificate" (SSL Certificate) validates:

A) The speed of the site.

B) The identity of the website owner and encrypts the connection.

C) The HTML code.

D) The user's password.

E) The browser version.

Answer: B

 

Q51. "Social Engineering" relies on:

A) Hacking software.

B) Manipulating human psychology to divulge confidential info.

C) Brute force.

D) SQL Injection.

E) DDoS.

Answer: B

 

Q52. "Ransomware" is a type of malware that:

A) Steals passwords.

B) Encrypts user files and demands payment for the decryption key.

C) Shows ads.

D) Slows down PC.

E) Records keystrokes.

Answer: B

 

Q53. "Two-Factor Authentication" (2FA) adds security by:

A) Asking for two passwords.

B) Requiring a second form of verification (e.g., OTP on phone) in addition to the password.

C) Locking the account.

D) Using two computers.

E) Changing passwords daily.

Answer: B

 

Q54. "Dark Mode" on websites is implemented using:

A) HTML

B) CSS (Cascading Style Sheets) / Media Queries

C) SQL

D) Python

E) HTTP

Answer: B

 

Q55. Which company owns "Instagram" and "WhatsApp"?

A) Google

B) Apple

C) Meta (Facebook)

D) Microsoft

E) Twitter

Answer: C

 

Q56. "Hashtags" (#) are used to:

A) Encrypt messages.

B) Group/Categorize content on social media.

C) Add numbers.

D) Delete posts.

E) Bold text.

Answer: B

 

Q57. "Clickbait" is:

A) High quality news.

B) Sensationalist headlines designed to encourage clicking, often misleading.

C) A virus.

D) An ad blocker.

E) A mouse setting.

Answer: B

 

Q58. "Crowdsourcing" is:

A) Gathering a crowd.

B) Obtaining services/ideas from a large group of people via the internet.

C) Selling to a crowd.

D) Hosting a party.

E) Funding a project.

Answer: B

 

Q59. "E-Commerce" business model "C2C" stands for:

A) Consumer to Consumer (e.g., eBay, OLX).

B) Company to Company.

C) Consumer to Company.

D) Computer to Computer.

E) Cloud to Cloud.

Answer: A

 

Q60. The "Internet of Bodies" (IoB) refers to:

A) Social media.

B) Connected devices that monitor human bodies (Pacemakers, Smartwatches, Smart pills).

C) VR games.

D) Biometric scanners.

E) Fitness gyms.

Answer: B