Societal Impacts MCQ Class 12 Informatics Practices
Please refer to Chapter 6 Societal Impacts MCQ Class 12 Informatics Practices with answers below. These multiple-choice questions have been prepared based on the latest NCERT book for Class 12 Informatics Practices. Students should refer to MCQ Questions for Class 12 Informatics Practices with Answers to score more marks in Grade 12 Informatics Practices exams. Students should read the chapter Societal Impacts and then attempt the following objective questions.
MCQ Questions Class 12 Informatics Practices Chapter 6 Societal Impacts
Societal Impacts MCQ Class 12 Informatics Practices provided below covers all important topics given in this chapter. These MCQs will help you to properly prepare for exams.
Question. The name and logo of the software will be protected by ___________
(a) copyright
(b) patent
(c) registered trademark
(d) None of the above
Answer
C
Question. Which of the following constitute e-waste?
(a) discarded computers
(b) damaged printers
(c) useless CDs
(d) All of the above
Answer
D
Question. Which of the following is not an example of Social media platform?
(a) Facebook
(b) Pinterest
(c) Google+
(d) Social channel
Answer
D
Question. GPL stands for ___________
(a) General Public License
(b) GNU General Private License
(c) GNU General Public License
(d) GNU Public License
Answer
A
Question. Which of the following is not comes under violation of IPR?
(a) Copyright Infringement
(b) Plagiarism
(c) Illegal Download
(d) Phishing
Answer
D
Question. What is another name given to ‘proprietary software’ ?
(a) Open source software
(b) Bespoke software
(c) Tailor Made software
(d) Closed source software
Answer
D
Question. Digital communication includes ________
(a) Email
(b) Texting
(c) Instant messaging
(d) All of the above
Answer
D
Question. Which of the following is/are examples of cyber crime ?
(a) Extracting money from using a person’s netbanking details
(b) Posting/viewing child pornographic material
(c) Taking online payment and not delivering goods
(d) all of the above
Answer
D
Question. When we surf the Internet using smartphones, we leave a trail of data reflecting the activities performed by us online, which is our ___________.
(a) Digital footprint
(b) Digital activities
(c) Online handprint
(d) Internet activities
Answer
A
Question. To deal with cyber crime, cyber fraud, cyber attacks, etc, there is one act in India known as _________.
(a) Internet Act 2000
(b) Cyber Act 2000
(c) IT (Information Technology) Act 2000
(d) None of these
Answer
C
Question. When someone steals someone else’s personal information to commit theft or fraud, it’s called _____.
(a) Identity Theft
(b) Hacking
(c) Computer Piracy
(d) Infringement
Answer
A
Question. Which of the following is not a cyber crime?
(a) Phishing
(b) Ransomware
(c) Hacking
(d) Tracking
Answer
D
Question. The apps and websites that use geo-location to detect a user’s location is which type of digital footprint?
(a) Active digital footprint
(b) Passive digital footprint
(c) Valid digital footprint
(d) On digital foorprint
Answer
B
Question. Which of the following is white hat hacker?
(a) Ethical hacker
(b) Non Ethical hacker
(c) Both of the above
(d) None of the above
Answer
A
Question. Credit card fraud may include :
(a) Stealing of credit card
(b) Unauthorized and illegal use of credit card
(c) Both of the above
(d) Neither
Answer
C
Question. To be a responsible netizen, we should ___________
(a) Choose password wisely
(b) think before upload anything online.
(c) change our password frequently.
(d) All of the above
Answer
D