MCQs for Informatics Practices Class 12 with Answers Societal Impacts
Students of class 12 Informatics Practices should refer to MCQ Questions Class 12 Informatics Practices Societal Impacts with answers provided here which is an important chapter in Class 12 Informatics Practices NCERT textbook. These MCQ for Class 12 Informatics Practices with Answers have been prepared based on the latest CBSE and NCERT syllabus and examination guidelines for Class 12 Informatics Practices. The following MCQs can help you to practice and get better marks in the upcoming class 12 Informatics Practices examination
Chapter Societal Impacts MCQ with Answers Class 12 Informatics Practices
MCQ Questions Class 12 Informatics Practices Societal Impacts provided below have been prepared by expert teachers of grade 12. These objective questions with solutions are expected to come in the upcoming Standard 12 examinations. Learn the below provided MCQ questions to get better marks in examinations.
Question. _______________ are the records and traces that we left behind as we use Internet.
(a) Digital Footprints
(b) Data Protection
(d) Digital Data
Question. The owner of a work can create _______ different types of CC licenses.
Question. Which of the following is not a typical characteristic of an ethical hacker?
(a) Excellent knowledge of Windows
(b) Understands the process of exploiting network vulnerabilities
(c) Patience, persistence and perseverance
(d) Has the highest level of security for the organization
Question. To grant user the rights to copy, modify, redistribute a Software______ public license is used-
(b) GNU GPL
(c) a and b both
Question. __________________ can be implemented by encryption, authentication, and other secure methods to ensure data is accessible by the users.
(a) Privacy of data
(b) username and password
(c) user safety
Question. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
(a) Gray Hat Hackers
(b) White Hat Hackers
(d) Black Hat Hackers
Question. ___________ is the act of unauthorised access to a computer, computer network or any digital system.
(c) identity theft
Question. The generally recognized term for the government protection afforded to intellectual property (written and electroni(c) is called _________.
(a) computer security law
(b) aggregate information
(c) copyright law
(d) data security standards
Question. The symbol © signifies
Question. Hacking, when done with positive intent is called ____
(a) White Hacking
(c) Ethical Hacking
(d) Good hacking
Question. Due to _________, you can face painful condition of wrists and fingers.
(a) overuse of keyboard
(b) overuse of mouse
(c) overuse of mobile
(d) All of these
Question. Which of the following is not correct about about digital footprint?
(a) User doesn’t have any control on how the that data will be used once stored on server
(b) User can delete data anytime including digital footprint
(c) These is no guarantee that digital footprints will fully eliminated from the internet
(d) Digtial footprint can be used to trace location of the device and other usage details
Question. Example of sensitive data is ___________
(a) Name of a person
(b) Credit card detail of a person
(c) Date of birth of a person
(d) None of the above
Question. An/A ________ is an act that violates cyber-security.
Question. Spending too much time on the internet can be ____
(a) Internet Passion
(b) Internet Addiction
(c) Metal Disorder
Question. ________ are websites or applications that enable users to participate by creating and sharing content with others in the community.
(a) Social media
(b) Social channel
(c) Social networking
(d) None of the above
Question: Which of these is not a cyber crime:
(a) Cyber stalking
(b) Cyber trolling
(d) Cyber bullying
Question: Which of the following appears harmless but actually performs malicious functions such as deleting or damaging files.
(c) Trojan Horse
Question: Mr. Sam received an email warning him of closure of his bank accounts if he did not update his banking information immediately. He clicked the link in the email and entered his banking information. Next day, he got to know that he was cheated. This is an example of _______.
(a) Online Fraud
(b) Identity Theft
Fill in the Blanks:-
Question: Stealing someone’s intellectual work and representing it as your own is known as ______________.
Question: Any information about you or created by you that exists in the digital form is referred to as ________________
Question: Creative creations of mind such as patents, trademarks and copyright are ________________ property.
Question: Software which usually limit the functionality after a trial period are known as _____________.
Question: ___________ provide rules and regulations for others to use your work.
Question: ____________ are small text files – bits of information – left on your computer by websites you have visited which let them ‘remember’ things about you.
Question: ____ are group of people habitually looking to steal identifies or information, such as social security information, credit card numbers, all for monetary objectives.
Question: mail or message sent to a large number of people indiscriminately without their consent is called____________
Question: Receiving irrelevant and unwanted emails repeatedly is an example of _____
Spam or spamming
Question: E-waste is the disposal of __________ goods.
Question: Burning of e-waste can cause ________
Question: Throwing of acid batteries in landfills will cause ___________