MCQs for Informatics Practices Class 12 with Answers Societal Impacts
Students of class 12 Informatics Practices should refer to MCQ Questions Class 12 Informatics Practices Societal Impacts with answers provided here which is an important chapter in Class 12 Informatics Practices NCERT textbook. These MCQ for Class 12 Informatics Practices with Answers have been prepared based on the latest CBSE and NCERT syllabus and examination guidelines for Class 12 Informatics Practices. The following MCQs can help you to practice and get better marks in the upcoming class 12 Informatics Practices examination
Chapter Societal Impacts MCQ with Answers Class 12 Informatics Practices
MCQ Questions Class 12 Informatics Practices Societal Impacts provided below have been prepared by expert teachers of grade 12. These objective questions with solutions are expected to come in the upcoming Standard 12 examinations. Learn the below provided MCQ questions to get better marks in examinations.
Question. _______________ are the records and traces that we left behind as we use Internet.
(a) Digital Footprints
(b) Data Protection
(c) Plagiarism
(d) Digital Data
Answer
A
Question. The owner of a work can create _______ different types of CC licenses.
(a) 2
(b) 4
(c) 6
(d) 8
Answer
C
Question. Which of the following is not a typical characteristic of an ethical hacker?
(a) Excellent knowledge of Windows
(b) Understands the process of exploiting network vulnerabilities
(c) Patience, persistence and perseverance
(d) Has the highest level of security for the organization
Answer
D
Question. To grant user the rights to copy, modify, redistribute a Software______ public license is used-
(a) CC
(b) GNU GPL
(c) a and b both
(d) none
Answer
B
Question. __________________ can be implemented by encryption, authentication, and other secure methods to ensure data is accessible by the users.
(a) Privacy of data
(b) username and password
(c) user safety
(d) cybercrime
Answer
A
Question. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
(a) Gray Hat Hackers
(b) White Hat Hackers
(c) Hactivists
(d) Black Hat Hackers
Answer
A
Question. ___________ is the act of unauthorised access to a computer, computer network or any digital system.
(a) phishing
(b) hacking
(c) identity theft
(d) e-commerce
Answer
B
Question. The generally recognized term for the government protection afforded to intellectual property (written and electroni(c) is called _________.
(a) computer security law
(b) aggregate information
(c) copyright law
(d) data security standards
Answer
C
Question. The symbol © signifies
(a) Patent
(b) Copyright
(c) Trademark
(d) Copyleft
Answer
B
Question. Hacking, when done with positive intent is called ____
(a) White Hacking
(b) Cracking
(c) Ethical Hacking
(d) Good hacking
Answer
C
Question. Due to _________, you can face painful condition of wrists and fingers.
(a) overuse of keyboard
(b) overuse of mouse
(c) overuse of mobile
(d) All of these
Answer
A
Question. Which of the following is not correct about about digital footprint?
(a) User doesn’t have any control on how the that data will be used once stored on server
(b) User can delete data anytime including digital footprint
(c) These is no guarantee that digital footprints will fully eliminated from the internet
(d) Digtial footprint can be used to trace location of the device and other usage details
Answer
B
Question. Example of sensitive data is ___________
(a) Name of a person
(b) Credit card detail of a person
(c) Date of birth of a person
(d) None of the above
Answer
B
Question. An/A ________ is an act that violates cyber-security.
(a) Threat
(b) Vulnerability
(c) Exploit
(d) Attack
Answer
D
Question. Spending too much time on the internet can be ____
(a) Internet Passion
(b) Internet Addiction
(c) Metal Disorder
(d) Cyberfobia
Answer
B
Question. ________ are websites or applications that enable users to participate by creating and sharing content with others in the community.
(a) Social media
(b) Social channel
(c) Social networking
(d) None of the above
Answer
A
Question: Which of these is not a cyber crime:
(a) Cyber stalking
(b) Cyber trolling
(c) Copyright
(d) Cyber bullying
Answer
C
Question: Which of the following appears harmless but actually performs malicious functions such as deleting or damaging files.
(a) WORM
(b) Virus
(c) Trojan Horse
(d) Malware
Answer
C
Question: Mr. Sam received an email warning him of closure of his bank accounts if he did not update his banking information immediately. He clicked the link in the email and entered his banking information. Next day, he got to know that he was cheated. This is an example of _______.
(a) Online Fraud
(b) Identity Theft
(c) Plagiarism
(d) Phishing
Answer
A
Fill in the Blanks:-
Question: Stealing someone’s intellectual work and representing it as your own is known as ______________.
Answer
Plagiarism.
Question: Any information about you or created by you that exists in the digital form is referred to as ________________
Answer
Digital Footprint
Question: Creative creations of mind such as patents, trademarks and copyright are ________________ property.
Answer
Intellectual.
Question: Software which usually limit the functionality after a trial period are known as _____________.
Answer
Shareware.
Question: ___________ provide rules and regulations for others to use your work.
Answer
Licenses
Question: ____________ are small text files – bits of information – left on your computer by websites you have visited which let them ‘remember’ things about you.
Answer
Cookies
Question: ____ are group of people habitually looking to steal identifies or information, such as social security information, credit card numbers, all for monetary objectives.
Answer
Phishers.
Question: mail or message sent to a large number of people indiscriminately without their consent is called____________
Answer
spam
Question: Receiving irrelevant and unwanted emails repeatedly is an example of _____
Answer
Spam or spamming
Question: E-waste is the disposal of __________ goods.
Answer
Electronic
Question: Burning of e-waste can cause ________
Answer
Air pollution
Question: Throwing of acid batteries in landfills will cause ___________
Answer
Soil pollution