MCQs for Informatics Practices Class 12 with Answers Societal Impacts

Students of class 12 Informatics Practices should refer to MCQ Questions Class 12 Informatics Practices Societal Impacts with answers provided here which is an important chapter in Class 12 Informatics Practices NCERT textbook. These MCQ for Class 12 Informatics Practices with Answers have been prepared based on the latest CBSE and NCERT syllabus and examination guidelines for Class 12 Informatics Practices. The following MCQs can help you to practice and get better marks in the upcoming class 12 Informatics Practices examination

Chapter Societal Impacts MCQ with Answers Class 12 Informatics Practices

MCQ Questions Class 12 Informatics Practices Societal Impacts provided below have been prepared by expert teachers of grade 12. These objective questions with solutions are expected to come in the upcoming Standard 12 examinations. Learn the below provided MCQ questions to get better marks in examinations.

Question. _______________ are the records and traces that we left behind as we use Internet.
(a) Digital Footprints
(b) Data Protection
(c) Plagiarism
(d) Digital Data 

Answer

A

Question. The owner of a work can create _______ different types of CC licenses.
(a) 2
(b) 4
(c) 6
(d) 8 

Answer

C

Question. Which of the following is not a typical characteristic of an ethical hacker?
(a) Excellent knowledge of Windows
(b) Understands the process of exploiting network vulnerabilities
(c) Patience, persistence and perseverance
(d) Has the highest level of security for the organization

Answer

D

Question. To grant user the rights to copy, modify, redistribute a Software______ public license is used-
(a) CC
(b) GNU GPL
(c) a and b both
(d) none

Answer

B

Question. __________________ can be implemented by encryption, authentication, and other secure methods to ensure data is accessible by the users.
(a) Privacy of data
(b) username and password
(c) user safety
(d) cybercrime 

Answer

A

Question. They are nefarious hackers, and their main motive is to gain financial profit by doing cyber crimes. Who are “they” referred to here?
(a) Gray Hat Hackers
(b) White Hat Hackers
(c) Hactivists
(d) Black Hat Hackers 

Answer

A

Question. ___________ is the act of unauthorised access to a computer, computer network or any digital system.
(a) phishing
(b) hacking
(c) identity theft
(d) e-commerce 

Answer

B

Question. The generally recognized term for the government protection afforded to intellectual property (written and electroni(c) is called _________.
(a) computer security law
(b) aggregate information
(c) copyright law
(d) data security standards 

Answer

C

Question. The symbol © signifies
(a) Patent
(b) Copyright
(c) Trademark
(d) Copyleft 

Answer

B

Question. Hacking, when done with positive intent is called ____
(a) White Hacking
(b) Cracking
(c) Ethical Hacking
(d) Good hacking 

Answer

C

Question. Due to _________, you can face painful condition of wrists and fingers.
(a) overuse of keyboard
(b) overuse of mouse
(c) overuse of mobile
(d) All of these 

Answer

A

Question. Which of the following is not correct about about digital footprint?
(a) User doesn’t have any control on how the that data will be used once stored on server
(b) User can delete data anytime including digital footprint
(c) These is no guarantee that digital footprints will fully eliminated from the internet
(d) Digtial footprint can be used to trace location of the device and other usage details 

Answer

B

Question. Example of sensitive data is ___________
(a) Name of a person
(b) Credit card detail of a person
(c) Date of birth of a person
(d) None of the above 

Answer

B

Question. An/A ________ is an act that violates cyber-security.
(a) Threat
(b) Vulnerability
(c) Exploit
(d) Attack 

Answer

D

Question. Spending too much time on the internet can be ____
(a) Internet Passion
(b) Internet Addiction
(c) Metal Disorder
(d) Cyberfobia 

Answer

B

Question. ________ are websites or applications that enable users to participate by creating and sharing content with others in the community.
(a) Social media 
(b) Social channel
(c) Social networking
(d) None of the above 

Answer

A

Question: Which of these is not a cyber crime:
(a) Cyber stalking
(b) Cyber trolling
(c) Copyright
(d) Cyber bullying 

Answer

C

Question: Which of the following appears harmless but actually performs malicious functions such as deleting or damaging files.
(a) WORM
(b) Virus
(c) Trojan Horse
(d) Malware 

Answer

C

Question: Mr. Sam received an email warning him of closure of his bank accounts if he did not update his banking information immediately. He clicked the link in the email and entered his banking information. Next day, he got to know that he was cheated. This is an example of _______.
(a) Online Fraud
(b) Identity Theft
(c)  Plagiarism
(d)  Phishing 

Answer

A

Fill in the Blanks:-

Question: Stealing someone’s intellectual work and representing it as your own is known as ______________.

Answer

Plagiarism.

Question:  Any information about you or created by you that exists in the digital form is referred to as ________________ 

Answer

Digital Footprint

Question:  Creative creations of mind such as patents, trademarks and copyright are ________________ property.

Answer

 Intellectual.

Question: Software which usually limit the functionality after a trial period are known as _____________.

Answer

Shareware.

Question:  ___________ provide rules and regulations for others to use your work.

Answer

 Licenses

Question:  ____________ are small text files – bits of information – left on your computer by websites you have visited which let them ‘remember’ things about you. 

Answer

Cookies

Question: ____ are group of people habitually looking to steal identifies or information, such as social security information, credit card numbers, all for monetary objectives.

Answer

Phishers.

Question: mail or message sent to a large number of people indiscriminately without their consent is called____________

Answer

spam

Question: Receiving irrelevant and unwanted emails repeatedly is an example of _____

Answer

 Spam or spamming

Question: E-waste is the disposal of __________ goods.  

Answer

Electronic

Question: Burning of e-waste can cause ________  

Answer

Air pollution

Question: Throwing of acid batteries in landfills will cause ___________ 

Answer

 Soil pollution

 

Related Posts

error: Content is protected !!