πŸ§ͺ NCERT Class 12 MCQ Quiz Hub

NCERT Societal Impact MCQ

Choose a topic to test your knowledge and improve your NCERT Class 12 skills

_____________ are the records and traces that we left behind as we use Internet.





βœ… Correct Answer: 1

Digital footprints are also known as _





βœ… Correct Answer: 1

Digital footprints are stored _





βœ… Correct Answer: 2

Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____





βœ… Correct Answer: 1

There are _________ kinds of Digital footprints.





βœ… Correct Answer: 2

Which of the following is type of Digital Footprints?





βœ… Correct Answer: 3

The digital data trail we leave online unintentionally is called _____





βœ… Correct Answer: 2

The digital data trail we leave online intentionally is called ___





βœ… Correct Answer: 1

Which of the following activity is an example of leaving Active digital footprints?





βœ… Correct Answer: 3

Our digital footprint can be created by _





βœ… Correct Answer: 4

Our digital footprints are stored in local web browser in the form of __





βœ… Correct Answer: 4

Our digital foot prints are stored in ________





βœ… Correct Answer: 3

Digital footprints can be used to _





βœ… Correct Answer: 4

Anyone who uses digital technology along with Internet is a __





βœ… Correct Answer: 3

In this era of digital society, we can do ____





βœ… Correct Answer: 4

Which of the following are Net Etiquette?





βœ… Correct Answer: 4

Being a responsible digital citizen, we should _





βœ… Correct Answer: 4

Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __





βœ… Correct Answer: 1

______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.





βœ… Correct Answer: 3

Digital communication includes _





βœ… Correct Answer: 4

Communication etiquette include to _____





βœ… Correct Answer: 4

Which of the following is example of Social media?





βœ… Correct Answer: 4

Which of the following is not an example of Social media platform?





βœ… Correct Answer: 4

______ are websites or applications that enable users to participate by creating and sharing content with others in the community.





βœ… Correct Answer: 1

A responsible netizen must abide by _





βœ… Correct Answer: 4

In social media platform, we can share _____





βœ… Correct Answer: 4

Is having the same password for all your accounts on different websites is safe





βœ… Correct Answer: 2

To be a responsible netizen, we should _





βœ… Correct Answer: 4

We should be very careful while uploading anything online?





βœ… Correct Answer: 1

Every information available on internet is always correct





βœ… Correct Answer: 2

Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __





βœ… Correct Answer: 1

Example of sensitive data is ____





βœ… Correct Answer: 2

IPR stands for ______





βœ… Correct Answer: 2

Code of the software will be protected by __





βœ… Correct Answer: 1

Functional expression of the idea/invention will be protected by _____





βœ… Correct Answer: 2

The name and logo of the software will be protected by _______





βœ… Correct Answer: 3

Intellectual Property is legally protected through _





βœ… Correct Answer: 4

The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.





βœ… Correct Answer: 1

To use copyrighted material, one needs to obtain a license from owner.





βœ… Correct Answer: 1

A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention





βœ… Correct Answer: 1

A patent protects an invention for ___________ years, after which it can be freely used.





βœ… Correct Answer: 2

Patentee has the full right of using, selling, or distributing the protected invention.





βœ… Correct Answer: 1

_____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands





βœ… Correct Answer: 1

EULA stands for __





βœ… Correct Answer: 3

_______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.





βœ… Correct Answer: 1

_________ means using other’s work and not giving adequate citation for use.





βœ… Correct Answer: 1

Licensing and copyrights are same terms.





βœ… Correct Answer: 1

A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.





βœ… Correct Answer: 2

Presenting someone else’s idea or work as one’s own idea or work is called _





βœ… Correct Answer: 1

Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __





βœ… Correct Answer: 1

____________ means unauthorized use of other’s trademark on products and services.





βœ… Correct Answer: 2

GPL stands for ____





βœ… Correct Answer: 1

Which of the following is popular category of public licenses?





βœ… Correct Answer: 3

CC (in reference to public license) stands for __





βœ… Correct Answer: 1

GPL is primarily designed for providing public license to a ______





βœ… Correct Answer: 1

FOSS stands for ___





βœ… Correct Answer: 3

_______ operating system come under FOSS.





βœ… Correct Answer: 1

_______ browser come under FOSS.





βœ… Correct Answer: 3

_________ is the unauthorized use or distribution of software.





βœ… Correct Answer: 1

______ package come under FOSS.





βœ… Correct Answer: 3

The owner of a work can create _______ different types of CC licenses.





βœ… Correct Answer: 3

_____ is defined as a crime in which computer is the medium of crime.





βœ… Correct Answer: 2

Which of the following is cyber crime?





βœ… Correct Answer: 4

A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.





βœ… Correct Answer: 2

__________ is the act of unauthorized access to a computer, computer network or any digital system.





βœ… Correct Answer: 2

Hacking, when done with a positive intent, is called ____





βœ… Correct Answer: 1

Which of the following is called black hat hacker?





βœ… Correct Answer: 2

Which of the following is white hat hacker?





βœ… Correct Answer: 1

Primary focus of ________ is on security cracking and data stealing.





βœ… Correct Answer: 2

Hackers try to break security system ___





βœ… Correct Answer: 4

____________ is an activity where fake websites or emails that look original or authentic are presented to the user.





βœ… Correct Answer: 1

_____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data





βœ… Correct Answer: 3

Which of the following can be considered as safety measures to reduce the risk of cyber crime?





βœ… Correct Answer: 4

E-waste stands for ____





βœ… Correct Answer: 2

Which of the following constitute e-waste?





βœ… Correct Answer: 4

e-waste is responsible for the degradation of our environment





βœ… Correct Answer: 1

e-waste is very healthy for human being.





βœ… Correct Answer: 2

e-waste is responsible for air, water and land pollution.





βœ… Correct Answer: 1

Which of the following are feasible methods of e-waste management?





βœ… Correct Answer: 4

The process of re-selling old electronic goods at lower prices is called _





βœ… Correct Answer: 1

_________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.





βœ… Correct Answer: 1

Bad posture of using computer may cause ____





βœ… Correct Answer: 4

What we have to ensures to maintain good health of a computer system?





βœ… Correct Answer: 4

After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?





βœ… Correct Answer: 3

Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?





βœ… Correct Answer: 1

Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?





βœ… Correct Answer: 3

Proprietary software is a software which is available ____





βœ… Correct Answer: 2

Which of the following is not a cyber crime?





βœ… Correct Answer: 4

In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.





βœ… Correct Answer: 1

Digital signature is the scanned copy of physical signature.





βœ… Correct Answer: 2