Choose a topic to test your knowledge and improve your NCERT Class 12 skills
_____________ are the records and traces that we left behind as we use Internet.
Digital footprints are also known as _
Digital footprints are stored _
Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____
There are _________ kinds of Digital footprints.
Which of the following is type of Digital Footprints?
The digital data trail we leave online unintentionally is called _____
The digital data trail we leave online intentionally is called ___
Which of the following activity is an example of leaving Active digital footprints?
Our digital footprint can be created by _
Our digital footprints are stored in local web browser in the form of __
Our digital foot prints are stored in ________
Digital footprints can be used to _
Anyone who uses digital technology along with Internet is a __
In this era of digital society, we can do ____
Which of the following are Net Etiquette?
Being a responsible digital citizen, we should _
Online posting of rumours, giving threats online, posting the victimβs personal information, comments aimed to publicly ridicule a victim is termed as __
______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.
Digital communication includes _
Communication etiquette include to _____
Which of the following is example of Social media?
Which of the following is not an example of Social media platform?
______ are websites or applications that enable users to participate by creating and sharing content with others in the community.
A responsible netizen must abide by _
In social media platform, we can share _____
Is having the same password for all your accounts on different websites is safe
To be a responsible netizen, we should _
We should be very careful while uploading anything online?
Every information available on internet is always correct
Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __
Example of sensitive data is ____
IPR stands for ______
Code of the software will be protected by __
Functional expression of the idea/invention will be protected by _____
The name and logo of the software will be protected by _______
Intellectual Property is legally protected through _
The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.
To use copyrighted material, one needs to obtain a license from owner.
A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention
A patent protects an invention for ___________ years, after which it can be freely used.
Patentee has the full right of using, selling, or distributing the protected invention.
_____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands
EULA stands for __
_______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.
_________ means using otherβs work and not giving adequate citation for use.
Licensing and copyrights are same terms.
A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
Presenting someone elseβs idea or work as oneβs own idea or work is called _
Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __
____________ means unauthorized use of otherβs trademark on products and services.
GPL stands for ____
Which of the following is popular category of public licenses?
CC (in reference to public license) stands for __
GPL is primarily designed for providing public license to a ______
FOSS stands for ___
_______ operating system come under FOSS.
_______ browser come under FOSS.
_________ is the unauthorized use or distribution of software.
______ package come under FOSS.
The owner of a work can create _______ different types of CC licenses.
_____ is defined as a crime in which computer is the medium of crime.
Which of the following is cyber crime?
A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.
__________ is the act of unauthorized access to a computer, computer network or any digital system.
Hacking, when done with a positive intent, is called ____
Which of the following is called black hat hacker?
Which of the following is white hat hacker?
Primary focus of ________ is on security cracking and data stealing.
Hackers try to break security system ___
____________ is an activity where fake websites or emails that look original or authentic are presented to the user.
_____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data
Which of the following can be considered as safety measures to reduce the risk of cyber crime?
E-waste stands for ____
Which of the following constitute e-waste?
e-waste is responsible for the degradation of our environment
e-waste is very healthy for human being.
e-waste is responsible for air, water and land pollution.
Which of the following are feasible methods of e-waste management?
The process of re-selling old electronic goods at lower prices is called _
_________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.
Bad posture of using computer may cause ____
What we have to ensures to maintain good health of a computer system?
After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharvβs email account. Revaanβs activity is an example of which of the following cyber crime?
Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?
Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?
Proprietary software is a software which is available ____
Which of the following is not a cyber crime?
In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.
Digital signature is the scanned copy of physical signature.