Author name: Prasanna

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

Detailed, Step-by-Step NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society Questions and Answers were solved by Expert Teachers as per NCERT (CBSE) Book guidelines covering each topic in chapter to ensure complete preparation. https://mcq-questions.com/ncert-solutions-for-class-12-sociology-chapter-1/

Introducing Indian Society NCERT Solutions for Class 12 Sociology Chapter 1

Introducing Indian Society Questions and Answers Class 12 Sociology Chapter 1

Question 1.
What are the main problems of national integration in India?
Answer:
The problems of India are linguistic identity, regionalism, demand for separate states and terrorism etc. create hindrances in the way of national integration. Due to these . problems, usually strikes, riots and mutual fights take place, which have posed a severe threat to national unity and integration.

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

Question 2.
Why is sociology a distinct subject in comparison with all other subjects?
Answer:
Sociology is a subject with which everyone knows something about society. Other subjects are learnt at home, school or elsewhere through instructions but much of our with growth in years as it appears to be acquired naturally or automatically.

Question 3.
What are the basic functions of a society?
Answer:
Sociologists and social anthropologists have adopted the term function from biological sciences where it has been used for certain organic processes necessary for the maintenance of the organisms. Basic functions necessary for continuity and survival of any society are :

  • Recruitment of members
  • Socialization
  • Production and distribution of goods and services and preservation of order.

Question 4.
What do you understand by social structure?
Answer:
A society consists of

  • Males and females, adults and children, various occupational and religious groups and so on.
  • The interrelationship between various that of parents and children and between various groups.
  • Finally, all the parts of the society are put together and system are interrelated and complementary concepts.

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

Question 5.
Why is the social map provided to us in childhood by the deluding socialization essential?
Answer:
Social maps are provided by our parent siblings, relatives and neighbour. It may be specific and partial. It provides us only with common sense or unlearnt or perceivable knowledge which may or may not be real. A proper use and application of reflexivity is essential for drawing other kinds of maps. It is sociological perspective that teaches us the procedure of drawing social maps, wholesome and exclusive.

Question 6.
What is community identity? Discuss its characteristics.
Answer:
Community that provides us the language and cultural values through which we comprehend the world. It is based on birth and belongings and never on some form of acquired qualification or accomplishment. Birth based identity is called ascriptive because this does not involve any choice on the part of the individual’s concerned.

It is actually worthless and discriminating. These ascriptive identities are very hard to shake off because irrespective of our efforts to disown them, others may continue to identify us by those very markers of belonging. Such ascriptive identity is the most deterrant to self-realisation. Expanding and overlapping circles of community ties i.e. family, kinship, caste, ethnicity, language, region or religion give meaning to our world and give us sense of identity, of who we are.

Question 7.
What is Self-reflexivity?
Answer:
Sociology can show us what we look like to others. It can teach us how to look at ourselves from outside, so to speak. It is called “Self-reflexivity’ or sometimes just “Reflexivity’.

Question 8.
‘Sociology can help us to map the links and connections between ‘personal troubles’ and ‘social issues’. Discuss.
Answer:
C. Wright Mills a famous American Sociologist has mentioned, “Sociology can help us to map the links and connections between personal troubles and social issues.” As far as personal troubles are concerned Mills means the kinds of individual worries, problems or concerns that everyone has.

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

Question 9.
How colonial rule facilitated Indian consciousness to emerge? Discuss.
Answer:
1. Colonial rule unified all of Indian for the first time politically and administratively.
2. Colonial rule brought in the forces of modernization and Capitalist economic change.
3. However this economic, political and administrative unification of India under colonial rule was got at great expense.
4. Colonial exploitation and domination scared the whole Indian society in different ways.
5. Colonialism also gave birth to its own enemy—nationalism. The concept of modem Indian nationalism took shape under British Colonialism.
6. The rampant exploitation and the shared experience of colonial domination helped unity and exercise different sections of the Indian society. It also created new classes and communities. The Urban middle classes were the prime carrier of nationalism.

Question 10.
What steps were taken by colonial rules for the smooth functioning of its rule?
Answer:
The steps taken by colonial rules for the smooth functioning of its rule were that they:

  • Used new mechanical techniques in production.
  • Started new market system in trade.
  • Developed means of transport and communication.
  • Formed bureaucracy based on civil service of all India nature.
  • Established formal and written law.

Question 11.
Which social reformers carried out social reform movements during the British colonialism in India?
Answer:
The prominent leaders of the reform movements were Raja Ram Mohan Roy, Ishwar Chandra Vidyasagar, Dayanand Saraswati, Bal Gangadhar Tilak, Mahatma Gandhi and others.

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

Question 12.
State the processes the began during the British colonialism in India.
Answer:
This was the period when modem period began in India and the external forces of modernization, westernization, industrialization entered.

Question 13.
State main differences between Sociology and other subjects.
Answer:
1. Sociology is a subject in which no one starts from Zero, as everyone already knows about society. However, other subjects are taught at school, at home or elsewhere.

2. Being an integral part of the process of growing up, knowledge about society seems to be got naturally or automatically.
In case of other subjects, no child is expected to already know something.

3. It means we know a lot about the society in which we live and interact.As far as other subjects are concerned, prior knowledge is almost negligible.

4. However, this prior knowledge or familiarity with society is both an advantage and disadvantage for sociology.
In the absence of prior knowledge there is no question of advantage or disadvantage in case of other subjects.

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society

NCERT Solutions for Class 12 Sociology Chapter 1 Introducing Indian Society Read More »

MCQ Questions for Class 10 English with Answers First Flight, Footprints Without Feet

Practice the Chapter Wise NCERT MCQ Questions for Class 10 English with Answers of First Flight, Footprints Without Feet, English Language and Literature PDF Free Download and test your understanding of different concepts. Download the CBSE Class 10 English MCQs Multiple Choice Questions with Answers free of cost and begin your preparation right away. Attempt the Class 10th English Objective Questions regularly as they are quite scoring. English Quiz Questions with Answers for Class 10 prevailing are prepared by subject experts after enormous research and you can rely on them without any ambiguity.

Class 10 English MCQs Multiple Choice Questions with Answers First Flight, Footprints Without Feet

Solve the CBSE NCERT MCQ Questions of Class 10 English with Answers Pdf of First Flight, Footprints Without Feet, English Language and Literature that are completely based on latest Textbooks and kickstart your preparation. You can quickly revise the concepts in all the Chapters by using the MCQ of English Class 10. Check out the quick links available for the MCQ Test for Class 10 English and stand out from the crowd.

MCQ Questions for Class 10 English Language and Literature

MCQ Questions for Class 10 English with Answers First Flight

MCQ Questions for Class 10 English with Answers First Flight Prose

  1. A Letter to God Class 10 MCQ
  2. Nelson Mandela Long Walk to Freedom Class 10 MCQ
  3. Two Stories about Flying Class 10 MCQ
  4. From the Diary of Anne Frank Class 10 MCQ
  5. The Hundred Dresses Part 1 Class 10 MCQ
  6. The Hundred Dresses Part 2 Class 10 MCQ
  7. Glimpses of India Class 10 MCQ
  8. Mijbil the Otter Class 10 MCQ
  9. Madam Rides the Bus Class 10 MCQ
  10. The Sermon at Benares Class 10 MCQ
  11. The Proposal Class 10 MCQ

MCQ Questions for Class 10 English with Answers First Flight Poems

  1. Dust of Snow Class 10 MCQ
  2. Fire and Ice Class 10 MCQ
  3. A Tiger in the Zoo Class 10 MCQ
  4. How to Tell Wild Animals Class 10 MCQ
  5. The Ball Class 10 MCQ
  6. Amanda Class 10 MCQ
  7. Animals Class 10 MCQ
  8. The Trees Class 10 MCQ
  9. Fog Class 10 MCQ
  10. The Tale of Custard the Dragon Class 10 MCQ
  11. For Anne Gregory Class 10 MCQ

MCQ Questions for Class 10 English with Answers Footprints Without Feet

  1. A Triumph of Surgery Class 10 MCQ Questions
  2. The Thief’s Story Class 10 MCQ Questions
  3. The Midnight Visitor Class 10 MCQ Questions
  4. A Question of Trust Class 10 MCQ Questions
  5. Footprints without Feet Class 10 MCQ Questions
  6. The Making of a Scientist Class 10 MCQ Questions
  7. The Necklace Class 10 MCQ Questions
  8. The Hack Driver Class 10 MCQ Questions
  9. Bholi Class 10 MCQ Questions
  10. The Book That Saved the Earth Class 10 MCQ Questions

MCQ Questions for Class 10 English Grammar Pdf with Answers

  1. Unseen Passages
  2. Letter Writing
  3. Grammar
  4. Gap Filling
  5. Editing
  6. Dialogue Reporting
  7. Dialogue Writing
  8. Reading Comprehension Class 10 MCQ
  9. Word Formation Class 10 MCQ
  10. Reported Speech Class 10 MCQ
  11. Passive Voice Class 10 MCQ
  12. Non-Finites Class 10 MCQ
  13. Syntex Class 10 MCQ

Hoping the information shared above regarding the NCERT MCQ Questions for Class 10 English with Answers of First Flight, Footprints Without Feet, English Language and Literature PDF Free Download has been helpful in clarifying your queries. For more info about CBSE Class 10 English MCQs Multiple Choice Questions with Answers, bookmark our site and stay connected with us to avail the latest updates in no time.

MCQ Questions for Class 10 English with Answers First Flight, Footprints Without Feet Read More »

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Coordinate Geometry Class 10 MCQ Questions with Answers

Question 1.

The distance of the point P (2, 3) from the x-axis is:

(A) 2
(B) 3
(C) 1
(D) 5
Answer:
(B) 3

Explanation:
Since coordinate of a given point is the distance of point from x-axis.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 1a

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 2.

The distance between the points A (0, 6) and B (0,-2) is:

(A) 6
(B) 8
(C) 4
(D) 2
Answer:
(B) 8

Explanation:
The distance between two points (x1, y1) and (x2, y2 ) is given as,
d = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Where, x1, = 0, y1 = 6 and x2 = 0, y2 = -2 So, distance between A (0, 6) and B (0, -2):
AB = \(\sqrt{(0-0)^{2}+(-2-6)^{2}}\)
= \(\sqrt{0+(-8)^{2}}/latex]
= [latex]\sqrt{8^{2}}\)
= 8

Question 3.

The distance of the point P (-6,8) from the origin is:

(A) 8
(B) 2√7
(C) 10
(D) 6
Answer:
(C) 10

Explanation:
Distance between two points (x1, y1) and (x2, y2) is given as,
d = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Where, x1= -6, y1 =8 and x2 = 0, y2 = 0 So, distance between P (-6,8) and origin O (0,0) is given by,
PO = \(\sqrt{[0-(-6)]^{2}+[(0-8)]^{2}}\)
= \(\sqrt{(6)^{2}+(-8)^{2}}\)
= \(\sqrt{36+64}\)
= \(\sqrt{100}\)
= 10

Question 4.

The distance between the points (0, 5) and (-5, 0) is:

(A) 5
(B) 5√2
(C) 2√5
(D) 10
Answer:
(B) 5√2

Explanation:
Distance between two points (x1,y1) and (x2,y2) is given as,
= \(\sqrt{(-5-0)^{2}+(0-5)^{2}} \)
Where, x1= 0, y1= 5 and x2 = -5, y2 = 0 So that, distance between the point (0, 5) and I (-5,0),
= \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
= \(\sqrt{(-5-0)^{2}+(0-5)^{2}}\)
= \(\sqrt{25+25}\)
= \(\sqrt{50}\)
= 5√2

Question 5.

AOBC is a rectangle whose three vertices are vertices A (0, 3), O (0, 0) and B (5, 0). The length of its diagonal is:

(A) 5
(B) 3
(C) √34
(D) 4
Answer:
(C) √34

Explanation:
According to the question, a triangle can be represented as:
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 2a
∴ Distance between the points A (0,3) and B (5, 0) is
AB = \(\sqrt{(5-0)^{2}+(0-3)^{2}}\)
= \(\sqrt{25+9}\)
= \(\sqrt{34}\)
Hence, the required length of diagonal is √34.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 6.

The perimeter of a triangle with vertices (0, 4), (0,0) and (3,0) is:

(A) 5
(B) 12
(C) 11
(D)7+√5
Answer:
(B) 12
Explanation:
Since, Perimeter of triangle = OA + AB + OB
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 2ab
Here OA = 4 units, AB = 5 units (using pythagoras theorem in triangle AOB) and OB =3 units.
Therefore, Perimeter of triangle = 4 + 5+3
= 12 units.
Question 7.

The points (-4,0), (4,0) and (0,3) are the vertices of a:

(A) right triangle
(B) isosceles triangle
(C) equilateral triangle
(D) scalene triangle E
Answer:
(B) isosceles triangle

Explanation:
Let X (-4, 0), Y (4, 0) and Z (0, 3) are the given vertices.
Now, distance between X ( -4,0) and Y (4, 0),
XY = \(\sqrt{[4-(-4)]^{2}+(0-0)^{2}}\)
= \(\sqrt{(4+4)^{2}}\)
= \(\sqrt{8^{2}}\)
= 8
Distance between Y(4, 0) and Z (0, 3),
YZ = \(\sqrt{(0-4)^{2}+(3-0)^{2}}\)
= \(\sqrt{16+9}\)
= \(\sqrt{25}\)
= 5
Distance between Y (4,0) and Z (0, 3),
ZX = \(\sqrt{[0-(-4)]^{2}+(3-0)^{2}}\)
= \(\sqrt{16+9}\)
= \(\sqrt{25}\)
= 5
As, YZ = ZX, i.c., two sidps of the triangle ane H equal.
So that, the AXYZ is an isosceles triangle.

Question 8.

The coordinates of the point which is equidistant from the three vertices of the ∆AOB as shown in the figure is:

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 3
(A) (x, y)
(B) (y,x)
(C) \(\left(\frac{x}{2}, \frac{y}{2}\right)\)
(D) \(\left(\frac{y}{2}, \frac{x}{2}\right)\)
Answer:
(A) (x, y)

Explanation:
From the given figure, coordinates of three vertices of a triangle arc: O (0, 0), A (0,2y) and B (2x, 0). Suppose the required point be P whose coordinates are (h, k) Now, P is equidistant trom the three vertices of ∆AOB, therefore,
PO = PA = PB
or (PO)2 = (PA)2 = (PB)2
By using distance formula, we get:
\(\left(\sqrt{(h-0)^{2}+(k-0)^{2}}\right)^{2}\) = \(\left(\sqrt{(h-0)^{2}+(k-2 y)^{2}}\right)^{2}\)
= \(\left(\sqrt{(h-2 x)^{2}+(5-0)^{2}}\right)^{2}\)
⇒ h2 + k2 = h2 +(k – 2y)2 = (h – 2x)2 + k2 ………(i)
⇒ k2 = k2 + 4y2 – 4yk
⇒ 0 = 4y2 – 4yk
⇒ 4y (y – k) = 0
⇒ y = k
Taking first and second parts of EQuestion (i),
h2 + k2 = (h- 2x)2 + k2
⇒ h2 = h2 + 4x2 – 4xh
⇒ 4x (x – h) = 0
⇒ h = x
Required coordinates of the point are (h, k) = (x, y)

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is NOT the correct explanation of A
(C) A is true but R is false
(D) A is false and R is True

Question 1.

Assertion (A): If the distance between the point (4, p) and (1,0) is 5, then the value of p is 4.
Reason (R): The point which divides the line segment joining the points (7, – 6) and (3,4) in ratio 1: 2 internally lies in the fourth quadrant.

Answer:
(D) A is false and R is True

Explanation:
In case of assertion:
Distance between two points (x1,y1) and (x2, y2) is given as,
d = \(\sqrt{\left(x_{2}+x_{1}\right)^{2}+\left(y_{2}+y_{1}\right)^{2}}\)
where,
(x1,y1) = (4, p)
(x2,y2) = (1, 0)
And, d = 5
Put the values, we have
52 = (1 — 4)2 + (0 – p)2
25 = (-3)2 + (-p)2
25-9 = p2
16 = p2
+4, -4 = p
∴ Assertion is incorrect.
In case of reason:
Let (x, y) be the point
Then, x = \(\frac{m x_{2}+n x_{1}}{m+n}\) and y = \(\frac{m y_{2}+n y_{1}}{m+n}\) ………..(i)
Here, x1 = 7, y1= -6, x1 = 3, y1 = 4, m = 1 and n = 2
∴ x = \(\frac{1(3)+2(7)}{1+2}\)
⇒ x = \(\frac{3+14}{3}=\frac{17}{3}\)
And, y = \(\frac{1(4)+2(-6)}{1+2}\)
⇒ y = \(\frac{4-12}{3}=-\frac{8}{3}\)
So, the required point (x,y) = \(\left(\frac{17}{3},-\frac{8}{3}\right)\) lies in IV th quadrant.
∴ Reason is correct.
Hence, assertion is incorrect but reason is correct.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 2.

Assertion (A): AABC with vertices A(-2, 0), B(2, 0) and C(0,2) is similar to ADEF with vertices D(-4,0), E(4,0) and F(0,4).
Reason (R): A circle has its centre at the origin and a point P(5, 0) lies on it. The point Q(6,8) lies outside the circle.

Answer:
(B) Both A and R are true but R is NOT the correct explanation of A

Explanation:
In case of assertion:
By using Distance Formula,
∴Distance between A (-2,0) and B (2,0),
AB = \(\sqrt{[2-(-2)]^{2}+(0-0)^{2}}\)=4
[∴distance between the points (x1, y1) and (x2,y2)
D = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Similarly, distance between B (2,0) and C (0, 2),
BC = \(\sqrt{(0-2)^{2}+(2-0)^{2}}\) = \(\sqrt{4+4}\) = 2√2
In ∆ABC, distance between C (0, 2) and A (-2,0),
CA = \(\sqrt{\left[0-(-2)^{2}\right]+(2-0)^{2}}\) = \(\sqrt{4+4}\) = 2√2
∴Distance between F (0,4) and D (-4, 0),
FD = \(\sqrt{(0+4)^{2}+(0-4)^{2}}\) = \(\sqrt{4^{2}+(4)^{2}}\) = 4√2
∴Distance between F (o,4) and E (4,0) and D (-4, 0),
FE = \(\sqrt{(0-4)^{2}+(4-0)^{2}}\) = \(\sqrt{4^{2}+4^{2}}\) = 4√2
and distance between E (4,0) and D (-4, 0),
ED = \(\sqrt{[4-(-4)]^{2}+(0)^{2}}\) = \(\sqrt{8^{2}}\) = 4√2
Now, \(\frac{A B}{O E}\) = \(\frac{4}{9}\) = \(\frac{1}{2}\),
\(\frac{A C}{D E}\) = \(\frac{2 \sqrt{2}}{4 \sqrt{2}}\) = \(\frac{1}{2}\)
\(\frac{B C}{E F}\) = \(\frac{2 \sqrt{2}}{4 \sqrt{2}}\)= \(\frac{1}{2}\)
∴ \(\frac{A B}{D E}\) = \(\frac{A C}{D F}\) = \(\frac{B C}{E F}\)
Here, we see that sides of AABC and AFDE are proportional.
Therefore, by SSS similarity rule, both the triangles are similar.
∴ Assertion is correct.
In case of reason:
Faint Q (6, 8) will lie outside the circle if its distance from the centre of circle is greater than the radius of the circle.
Distance between centre O (0,0) and P (5,0),
OP = \(\sqrt{(5-0)^{2}+(0-0)^{2}}\)
= \(\sqrt{5^{2}+0^{2}}\)
= 5
As, point P lies at the circle, therefore, OP = Radius of circle.
Distance between centre O (0,0) and Q (6,8),
OQ = \(\sqrt{(6-0)^{2}+(8-0)^{2}}\)
= \(\sqrt{6^{2}+8^{2}}\)
= \(\sqrt{36+64}\)
= \(\sqrt{100}\)
= 10
As OQ > OP, therefore, point Q (6, 8) lies outside of the circle.
∴ Reason is correct.
Hence, both assertion and reason are correct but reason is not the correct explanation for assertion.

Question 3.

Assertion (A): The ordinate of a point A on y-axis is 5 and B has coordinates (-3,1). Then the length of AB is 5 units.
Reason (R): The point A(2, 7) lies on the perpendicular bisector of line segment joining the points P(6,5) and Q(0, -4).

Answer:
(C) A is true but R is false

Explanation:
In case of assertion:
Here, A → (0,5) and B → (-3,1)
AB = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
= \(\sqrt{(-3-0)^{2}+(1-5)^{2}}\)
= \(\sqrt{9+16}\)
= \(\sqrt{25}\)
= 5 units
∴ Assertion is correct.
In case of reason:
If A (2, 7) lies on perpendicular bisector of P (6,5) and Q (0, -4), then
AP = AQ
∴ By using Distance Formula,
AP = \(\sqrt{(6-2)^{2}+(5-7)^{2}}\)
= \(\sqrt{(4)^{2}+(-2)^{2}}\)
= \(\sqrt{20}\)
And AQ = \(\sqrt{(0-2)^{2}+(-4-7)^{2}}\)
= \(\sqrt{(-2)^{2}+(-11)^{2}}\)
= \(\sqrt{125}\)
As, AP AQ
Thercfore, A does not lie on the perpendicular bisector of PQuestion
∴ Reason is incorrect.
Hence, assertion is correct but reason is incorrect.

Case – Based MCQs

Attempt any four sub-parts from each question. Each sub-part carries 1 mark.
I. Read the following text and answer the below questions:
The diagram show the plans for a sun room. It will be built onto the wall of a house. The four walls of the sun room are square clear glass panels. The roof is made using,

    • Four clear glass panels, trapezium in shape, all of the same size
    • One tinted glass panel, half a regular octagon in shape

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 3a

Question 1.

Refer to Top View, find the mid-point of the seg¬ment joining the points J(6,17) and 1(9,16).

(A) \(\frac{33}{2}, \frac{15}{2}\)
(B) \(\frac{3}{2}, \frac{1}{2}\)
(C) \(\frac{15}{2}, \frac{33}{2}\)
(D) \(\frac{1}{2}, \frac{3}{2}\)
Answer:
(C) \(\frac{15}{2}, \frac{33}{2}\)

Explanation:
Mid-point of J(6,17) and 1(9,16) is
x = \(\frac{6+9}{2}\) and y = \(\frac{17+16}{2}\)
x = \(\frac{15}{2}\) and y = \(\frac{33}{2}\)

Question 2.

Refer to front View, the distance of the point P from the y-axis is:

(A) 4
(B) 15
(C) 19
(D) 25
Answer:
(A) 4

Explanation:
The distance of the point P from the Y-axis = 4.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 3.

Refer to front view, the distance between the points A and S is

(A) 4
(B) 8
(C) 14
(D) 20
Answer:
(C) 14

Explanation:
A’s coordinates = (1,8)
S’s coordinates = (15,8)
Then, AS = \(\left|\sqrt{(15-1)^{2}+(8-8)^{2}}\right|\)
= \(\sqrt{(14)^{2}}\)
= 14.

Question 4.

Refer to front view, find the co-ordinates of the point which divides the line segment joining the points A and B in the ratio 1: 3 internally.

(A) (8.5,2.0)
(B) (2.0,9.5)
(C) (3.0,7.5)
(D) (2.0,8.5)
Answer:
(D) (2.0,8.5)

Explanation:
The coordinates of A = (1,8) The coordinates of B = (4,10) Also, m = 1 and n = 3
Then, (x,y) = \(\left(\frac{1 \times 4+3 \times 1}{1+3}, \frac{1 \times 10+3 \times 8}{1+3}\right)\)
= \(\left(\frac{7}{4}, \frac{34}{4}\right)\)
= (1. 75,8.5)

Question 5.

Refer to front view, if a point (x, y) is equidistant from the Q(9,8) and S(17,8), then

(A) x + y = 13
(B) x – 13 = 0
(C) y – 13 = 0
(D) Y – y = 13
Answer:
Option (B) is correct

Explanation:
Let point be P(x, y)
PQ2 = PS2
or, (x – 9)2 + (y – 8)2 = (x – 17)2 + (y – 8)2 or, x – 13 =0

II. Read the following text and answer the below questions:
Ayush Starts walking from his house to office. Instead of going to the office directly, he goes to a bank first, from there to his daughter’s school and then reaches the office.
(Assume that all distances covered are in straight lines). If the house is situated at (2, 4), bank at (5, 8), school at (13, 14) and office at (13, 26) and coordinates are in km.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 4

Question 1.

What is the distance between house and bank?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(A) 5 km

Explanation:
Since,
Distance between two points (x1, y1) and (x2, y2).
d = \(\left|\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\right|\)
Now, distance between house and bank,
= \(\left|\sqrt{(5-2)^{2}+(8-4)^{2}}\right|\)
= \(\left|\sqrt{(3)^{2}+(4)^{2}}\right|\)
= \(|\sqrt{9+16}|\)
= \(\sqrt{25}\)
= 5 km

Question 2.

What is the distance between Daughter’s School and bank ?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(B) 10 km

Explanation:
Distance between bank and daughter’s school,
= \(\left|\sqrt{(13-5)^{2}+(14-8)^{2}}\right|\)
= \(\left|\sqrt{(8)^{2}+(6)^{2}}\right|\)
= \(|\sqrt{64+36}|\)
= \(|\sqrt{100}|\)
= 10 km

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 3.

What is the distance between house and office?

(A) 24.6 km
(B) 26.4 km
(C) 24 km
(D) 26 km
Answer:
(B) 26.4 km

Explanation:
Distance between house to office,
= \(\vec{a}\)
= \(\vec{a}\)
= \(\vec{a}\)
= \(\vec{a}\)
= 24. 59
= 24.6 km

Question 4.

What is the total distance travelled by Ayush to reach the office?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(D) 27 km

Explanation:
Distance between daughter’s school and office.
= \(\left|\sqrt{(13-13)^{2}+(26-14)^{2}}\right|\)
= \(\left|\sqrt{0+(12)^{2}}\right|\)
= 12 km
Total distance (House + Bank + School + Office) travelled = 5 + 10 + 12 = 27 km

Question 5.

What is the extra distance travelled by Ayush?

(A) 2 km
(B) 2.2 km
(C) 2.4 km
(D) none of these
Answer:
(C) 2.4 km

Explanation:
Extra distance travelled by Ayush in reaching his office = 27 – 24.6 = 2.4 km.

III. Read the following text and answer the below questions:
In order to conduct Sports Day activities in your School, lines have been drawn with chalk powder at a distance of 1 m each, in a rectangular shaped ground ABCD, 100 flowerpots have been placed at a distance of 1 m from each other along AD, as shown in given figure below. Niharika runs 1/4th the distance AD on the 2nd line and posts a green (G) flag runs 1/5th distance AD on the eighth line and posts a red (R) flag.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 5

Question 1.

Find the position of green flag

(A) (2,25)
(B) (2,0.25)
(C) (25,2)
(D) (0,-25)
Answer:
Option (A) is correct.

Question 2.

Find the position of red flag

(A) (8,0)
(B) (20,8)
(C) (8,20)
(D) (8,0.2)
Answer:
(C) (8,20)

Question 3.

What is the distance between both the flags?

(A) √41
(B) √11
(C) √61
(D) √51
Answer:
(C) √61

Explanation:
Position of Green flag = (2,25) Position of Red flag = (8,20)
Distance between both the flags
\(\sqrt{(8-2)^{2}+(20-25)^{2}}\) = \(\sqrt{6^{2}+(-5)^{2}}\)
= \(\sqrt{36+25}\)
= √61

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 4.

If Rashini has to post a blue llag exactly halfway between the line segment joining the two flags, where should she post her flag?

(A) (5,22.5)
(B) (10,22)
(C) (2,8.5)
(D) (2.5,20)
Answer:
(A) (5,22.5)

Explanation:
Position of blue flag Mid-point of line segment joining the green and red flags
= \(\left(\frac{2+8}{2}, \frac{25+20}{2}\right)\)
= (5, 22.5)

Question 5.

If Joy has to post a flag at one-fourth distance from green flag, in the line segment joining the green and red flags, then where should he post his flag ?

(A) (3.5,24)
(B) (0.5,12.5)
(C) (2.25,8.5)
(D) (25,20)
Answer:
(A) (3.5,24)

Explanation:
Position of Joy’s flag = Mid-point of line segment joining green and blue flags
= \(\left[\frac{2+5}{2}, \frac{25+22.5}{2}\right]\)
= [3.5,23.75] ~ [3.5,24]

IV. Read the following text and answer the below questions:
The class X students school in krishnagar have been allotted a rectangular plot of land for their gardening activity. Saplings of Gulmohar are planted on the boundary at a distance of 1 m from each other. There is triangular grassy lawn in the plot as shown in the figure. The students are to sow seeds of flowering plants on the remaining area of the plot.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 6

Question 1.

Taking A as origin, find the coordinates of P.

(A) (4,6)
(B) (6,4)
(C) (0,6)
(D) (4,0)
Answer:
(A) (4,6)

Question 2.

What will be the coordinates of R, if C is the origin?

(A) (8,6)
(B) (3,10)
(C) (10,3)
(D) (0,6)
Answer:
(C) (10,3)

Question 3.

What will be the coordinates of Q, if C is the origin?

(A) (6,13)
(B) (-6,13)
(C) (-13,6)
(D) (13,6)
Answer:
(D) (13,6)

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 4.

Calculate the area of the triangles if A is the origin.

(A) 4.5
(B) 6
(C) 8
(D) 6.25
Answer:
(A) 4.5

Explanation:
Coordinates of P = (4,6)
Coordinates of Q = (3,2)
Coordinates of R = (6,5)
Area of triangle PQR = [ x1 (y2 – y2 + x2 (y3 – y1) + x3(y1 – y2)]
= \(\frac{1}{2}\) [4(-3) + 3(-1) + 6(4)]
= \(\frac{1}{2}\) [- 12 + (-3) + 24]
= \(\frac{1}{2}\)[- 12 + 21]
= \(\frac{1}{2}\)[9]
= 4.5 sQuestion units.

Question 5.

Calculate the area of the triangle if C is the origin.

(A) 8
(B) 5
(C) 6.25
(D) 4.5
Answer:
(D) 4.5

MCQ Questions for Class 10 Maths with Answers

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry Read More »

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

Informatics Practices Class 12 Notes – Societal Impacts and Data Protection

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Digital Footprints: A digital footprint is the record or trail left by the things one does online. The social media activity, the information on personal website, the browsing activities, online subscriptions, any photo galleries and videos uploaded by a user – essentially, any activity carried out on the internet makes the digital footprint of a user.
→ Digital footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.
→ Types of Digital Footprints: There are two kinds of digital footprints-Active digital footprints and Passive digital footprints.

→ Active Digital Footprints: Active digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.

→ Passive Digital Footprints: The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse internet, etc.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Digital Society and Netizen: Digital society reflects the growing trend of using digital technologies in all spheres of human activities. Anyone who uses digital technology along with internet is a digital citizen or a netizen. Being a good netizen means practicing safe, ethical and legal use of digital technology. A responsible netizen must abide by net etiquettes, communication etiquettes and social media etiquettes.

→ Net Etiquettes:The word netiquette, derives from the combination of words -‘net’ (internet) and ‘etiquette’. It refers to online manners while using internet or working online. One should be ethical, respectful and responsible while surfing the internet.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection 1B
→ Be Ethical:

→ No Copyright Violation: We should not use copyrighted materials without the permission of the creator or owner. As an ethical digital citizen, we need to be careful while streaming audio or video or downioadino images and files from the internet.

→ Share the Expertise: It is good to share information and knowledge on internet so that others can access it. However, prior to sharing information, we need to be sure that we have sufficient knowledge on that topic. The information shared should be true and unambiguous.

→ Be Respectful:

→ Respect Privacy: As good digital citizens, we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.

→ Respect Diversity: In a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.

→Be Responsible:

→ Avoid Cyber Bullying: Any insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information, sexual harassment or comments aimed to publicly ridicule a victim is termed as cyber bullying.

→ Don’t Feed the Troll: An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community, just for amusement.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Communication Etiquettes: Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video conferencing, posting on forums, social networking sites, etc.

→ Be Precise:

→ Respect Time: We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.

→ Respect Data Limits: For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, etc.

→ Be Polite: Whether the comm unication is synchronous (happening in real time like chat, audio/video calls) or asynchronous(like email, forum post or comments), we should be polite and non- aggressive in our communication.

→ Be Credible: We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time.

→ Social Media Etiquettes: Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures.

→ Be Secure:

  • Choose password wisely: It is vital for social network users. News of breaching or leakage of user data from social network often attracts headlines. Never share personal credentials like username and password with others.
  • Know who you befriend: We need to be careful white befriending unknown people as their intentions possibly could be malicious and unsafe.
  • Beware of fake information: We should apply our knowledge and experience to validate such news, message or post.

→ Be Reliable:

  • Think before uploading: We need to be cautious while uploading or sending sensitive or confidential files which have a bearing on our privacy.

→ Data Protection: In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Intellectual Property Right (IPR): These are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also, it gives the owner a right to decide the price for doing so. Intellectual Property is legally protected through copyrights, patents, trademarks, etc.

→ Copyright: Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work.

→ Patent: A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the
invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling,or distributing the protected invention.

→ Trademark: Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.

→ Licensing: Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material.

→ Violation of IPR: Violation of intellectual property right may happen in one of the following ways:

→ Plagiarism: It means using other’s work and not giving adequate citation for use.

→ Copyright Infringement: It means using another person’s work, without permission or without paying for it, if it is being sold.

→ Trademark Infringement: It means unauthorised use of other’s trademark on products and services. An owner of a trademark may commence legal proceedings against someone who infringes its registered trademark.

→ Public Access and Open Source Software: Open source licenses help others to contribute to existing work or project without seeking special individual permission to do so. The GNU General Public License (GPL) and the Creative Commons (CC) are two popular categories of public licenses.

→ GPL: It is the most widely used free software license which grants the recipients, rights to copy, modify and redistribute the software and that the same rights are preserved in all derivative works.

→ CC Licenses: It is a set of copyright licenses that give the recipients, rights to copy, modify and redistribute the creative material, but giving the authors, the liberty to decide the conditions of licensing.

→ Cybercrime: It is defined as a crime in which computer is the medium of crime (hacking, phishing, spamming), or the computer is used as a tool to commit crimes (extortion, data breaches, theft).

→Hacking: It is the act of unauthorised access to a computer, computer network or any digital system. Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and break into the system.

→ Ethical Hacker: Hacking, when done with a positive intent, is called Ethical Hacking. Such ethical hackers are known as white hat hackers. They are specialists in exploring any vulnerability or loophole by during testing of the software.

→ Non-ethical Hacker: A non-ethical hacker is the one who tries to gain unauthorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems. They are called black hat hackers or crackers.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Phishing: It is an unlawful activity where fake websites ore mails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.

→ Identity Theft: Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully.
Given below are a few examples:

→ Financial Identity Theft: When the stolen identity is used for financial gain.

→ Criminal Identity Theft: Criminals use a victim’s stolen identity to avoid detection of their true identity.

→ Medical Identity Theft: Criminals can seek medical drugs or treatment using a stolen identity.

→ RansomwareiThis is another kind of cyber-crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for getting access to the data, or sometimes threatens to publish personal and sensitive information or photographs unless a ransom is paid.

→ Combatting and Preventing Cybercrime: Following points can be considered as safety measures to reduce the risk of cybercrime:

→ Take regular backup of important data.

→ Use an antivirus software and keep it updated always.

→ Avoid installing pirated software. Always download software from known and secure (HTTPS) sites.

→ Always update the system software which include the internet browser and other application software.

→ Do not visit or download anything from untrusted websites.

→ Digital Signatures: They are the digital equivalent of a paper
certificate. Digital signatures work on a unique digital ID issued by a Certificate Authority (CA) to the user. Signing a document digitally means attaching that user’s identify, which can be used to authenticate. .

→ Indian Information Technology Act (IT Act): The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive information.

→ E-waste-Hazards and Management: E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of their useful life.

→ Leaching: It is the process of removing a substance from another substance by passing water through it.

→ Management of E-waste: E-waste management is the efficient disposal of E-waste. Some of the feasible methods of E-waste management are reduce, reuse and recycle:

→ Reduce: We should try to reduce the generation of e-waste by purchasing the electronic or electrical devices only according to our need.

→ Reuse: It is the process of re-using the electronic or electric waste after slight modification. The process of re-selling old electronic goods at lower prices is called refurbishing.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Recycle: Recycling is the process of conversion of electronic devices into something that can be used again and again in some or the other manner.

→ E-waste Management in India: In India, the Environmental Protection Act, 1986, has been enacted to punish people responsible for causing any form of pollution by paying for the damage done to the natural environment.

MCQ Questions for Class 12 Informatics Practices with Answers

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection Read More »

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Societal Impacts and Data Protection Class 12 MCQ Questions Part 3

Question 1.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 2.

………is a secure technique to protect data being transmitted over a network.

(a) E-commerce
(b) Encryption
(c) Plagiarism
(d) Digital property
Answer:
(b) Encryption

Question 3.

…….. is a form of electronic signature that authenticates a document or transaction through encryption and password.

(a) Patent
(b) Security certificate
(c) Digital signature
(d) Integrity
Answer:
(c) Digital signature

Question 4.

…….. is1 also a unique digital identification that is used to verify the identity of an individual website or user.

(a) Security certificate
(b) Patent
(c) Digital signature
(d) None of these
Answer:
(a) Security certificate

Question 5.

What is the full form of SSL?

(a) Secure Session Layer
(b) Session Secure Layer
(c) Secure Socket Layer
(d) Socket Session Layer
Answer:
(c) Secure Socket Layer

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 6.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of these
Answer:
(d) All of these

Question 7.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 8.

Digital property includes

(a) digital documents
(b) audio files
(c) video files
(d) All of these
Answer:
(d) All of these

Question 9.

A/An …. for computer software and other products allows the source code to be used, modified or shared.

(a) digital signature
(b) patent
(c) open source software
(d) None of these
Answer:
(c) open source software

Question 10.

A……..is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

(a) free software licence
(b) copyright
(c) open source software
(d) patent
Answer:
(a) free software licence

Question 11.

What does a free software licence provide to the receiver of software?

(a) Provides no rights
(b) Right to use, modify or redistribute
(c) Receiver becomes the owner
(d) Full copyrights of software
Answer:
(b) Right to use, modify or redistribute

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 12.

To what kind of a society digital unite refers?

(a) Everyone is skilled
(b) No one is skilled
(c) Only half the society is skilled .
(d) Only rural areas have the Internet
Answer:
(a) Everyone is skilled

Question 13.

……. are the etiquettes that are to be followed while communicating online.

(a) Digital signature
(b) Patent
(c) Digital unite
(d) Netquettes
Answer:
(d) Netiquettes

Question 14.

………… refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.

(a) Digital union
(b) Electronic unite
(c) Digital unite
(d) Digital divide
Answer:
(c) Digital unite

Question 15.

After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cybercrime?

(a) Hacking
(b) Identity theft
(c) Cyber bullying
(d) Plagiarism
Answer:
(b) Identity theft
Identity theft means obtaining someone’s credentials to commit some online fraud.

Question 16.

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?

(a) You sent an email to your friend with a message saying that “I am sorry”.
(b) You sent a threatening message to your friend saying ‘”Do not try to call or talk to me”.
(c) You created an embarrassing picture of your friend and • uploaded on your account on a social networking site.
(d) None of the above
Answer:
(a) you sent an email to your friend with a message saying that ”1 am sorry”.

Question 17.

You are planning to go for a vacation. You surfed the internet to get answers for the following Question ueries:

(a) Weather conditions
(b) Availability of air tickets and fares
(c) Places to visit
(d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
(a) a and b
(b) a, b and c
(c) a, c and d
(d) All of these
Answer:
(d) All of these

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 18.

Describe why it is important to secure your wireless router at home. Search the internet to find the rules to create a reasonably secure password Create an imaginary password for your home router. Will you share your password for home router with following people?

(a) Parents
(b) Friends
(c) Neighbours
(d) Home tutors
Answer:
(a) Parents
WiFi router security is important otherwise any one can use our WiFi to commit fraud or cybercrimes. We shall share the password with parents only.

Question 19.

……….is a type of software designed to help the user’s computer detect viruses and avoid them.

(a) Malware
(b) Adware
(c) Antivi
(d) Both b and c
Answer:
(c) Antivirus
An antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user’s computer, it can be easily removed by scanning the entire system with antivirus help.

Question 20.

Which one of the following is a type of antivirus program?

(a) Question uick heal
(b) Mcafee
(c) Kaspersky
(d) All of these
Answer:
(d) All of these
Antivirus is a kind of software program that helps to detect and remove viruses form the user’s computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Question uick Heal, Norton etc., so the correct answer is D.

Question 21.

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, et(c) it is known as the

(a) Antivirus
(b) Firewall
(c) Cookies
(d) Malware .
Answer:
(b) Firewall
There are two types of firewalls – software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user’s system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses. •

Question 22.

Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?

(a) Piracy
(b) Plagiarism
(c) Intellectual property rights
(d) All of the above
Answer:
(d) All of the above
The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

Question 23.

Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform?

(a) Cyber law
(b) Cyberethics
(c) Cybersecurity
(d) Cybersafety
Answer:
(b) Cyberethics
Cyber Ethics refers to exploring the appropriate, ethical behaviours related to online environments and digital media.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 24.

Which of the following refers to the violation of the principle if a computer is no more accessible?

(a) Access control
(b) Confidentiality
(c) Availability
(d) All of these
Answer:
(c) Availability .
Availability refers to the violation of principle, if the system is no more accessible.

Question 25.

Which one of the following refers to the techniQuestion ue used for verifying the integrity of the message?

(a) Digital signature
(b) Decryption algorithm
(c) Protocol
(d) Message digest
Answer:
(d) Message digest
Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formul(a) It is also known as a type of techniQuestion ue used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is (d)

Question 26.

Which one of the following usually used in the process of Wi-Fi-hacking?

(a) Aircrack-ng
(b) Wireshark
(c) Norton
(d) All of these
Answer:
(a) Aircrack-ng
The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali et(c) it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

Question 27.

Which of the following port and IP address scanner famous among the users?

(a) Cain and Abel
(b) Angry IP Scanner
(c) Snort
(d) Ettercap
Answer:
(b) Angry IP Scanner
Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

Question 28.

In ethical hacking and cyber security, there are …….. types of scanning.

(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(c) 3
There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

Question 29.

Which of the following is not a type of scanning?

(a) Xmas Tree Scan
(b) Cloud scan
(c) Null Scan
(d) SYN Stealth
Answer:
(b) Cloud scan
Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 30.

In system hacking, which of the following is the most crucial activity?

(a) Information gathering
(b) Covering tracks
(c) Cracking passwords
(d) None of these
Answer:
(c) Cracking passwords
While trying to hack a system, the most important thing is cracking the passwords.

Question 31.

Which one of the following is actually considered as the first computer virus?

(a) Sasser
(b) Blaster
(c) Creeper
(d) Both a and c
Answer:
(c) Creeper
The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

Question 32.

To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system.

(a) Antivirus
(b) Firewall
(c) Vic player
(d) Script
Answer:
(b) Firewall
It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software from unknown sources. We can also consider it the first line of defense of the computer system.

Question 33.

Code Red is a type of ……….

(a) an antivirus program
(b) a photo editing software
(c) a computer virus
(d) a video editing software
Answer:
(c) a computer virus
Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

Question 34.

Which of the following can be considered as the elements of cyber security?

(a) Application security
(b) Operational security
(c) Network security
(d) All of these
Answer:
(d) All of these
Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

Question 35.

Which of the following are famous and common cyberattacks used by hackers to infiltrate the user’s system?

(a) DDos and Derive-by Downloads
(b) Malware & Malvertising
(c) Phishing and Password attacks
(d) All of the above
Answer:
(a) DDos and Derive-by Downloads
DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.

Question 36.

Which one of the following is also referred to as malicious software?

(a) Maliciousware
(b) Badware
(c) Ilegalware
(d) Malware
Answer:
(d) Malware .
Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 37.

In Wi-Fi Security, which of the following protocol is more used?

(a) WPA
(b) WPA2
(c) WPS
(d) Both a and c
Answer:
(b) WPA2
Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WP(a) It is also known as the upgraded version of the WPA protocol.

Question 38.

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?

(a) Reliability
(b) Performance
(c) Security
(d) Longevity
Answer:
(b) Performance
When the numbers of users on a network get increased and exceed the network’s limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

Question 39.

General Accepted standards of right and wrong in a society is called as

(a) Moral
(b) Ethics
(c) Guideline
(d) Code of standard
Answer:
(a) Moral

Question 40.

….. is a criterion used to decide what is right or wrong.

(a) Moral standard
(b) Moral principle
(c) Moral
(d) Ethics
Answer:
(a) Moral standard

Question 41.

…….. indicates rules and regulations to be obeyed in the organisation.

(a) Ethics
(b) Law
(c) Moral
(d) Privacy
Answer:
(b) Law

Question 42.

Code of ethics do not includes

(a) software Piracy
(b) fair treatment
(c) communication
(d) co-operation
Answer:
(a) software Piracy

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 43.

……….. provides norms and principles to the computer users and system professionals.

(a) Code of ethics
(b) Guidelines
(c) Privacy
(d) Security
Answer:
(a) Code of ethics

Question 44.

To make the exact copy of a program is termed as

(a) Copyright
(b) Software privacy
(c) Fair use
(d) Law
Answer:
(b) Software privacy

Question 45.

The use of invasive software such as destructs the computer system.

(a) Unselect
(b) Worms’s
(c) Microbes
(d) Bacteria
Answer:
(b) Worms’s

Question 46.

When a software is pirated, it harmes

(a) management
(b) operator
(c) people
(d) software developers
Answer:
(d) software developers

Question 47.

Accessing data without permission is known as…….

(a) Unauthorized access
(b) Legal access
(c) Without permission
(d) With permission
Answer:
(a) Unauthorized access

Question 48.

provides Legal recognition of tranaction carried out by means of eletronic commerce.

(a) IT act
(b) Cyber crime
(c) Cyber law
(d) Fair use
Answer:
(c) Cyber law

Question 49.

…… ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.

(a) Digital signature
(b) Coded signature
(c) Double signature
(d) Simple signature
Answer:
(a) Digital signature

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 50.

…….. refers to all the legal and regulatory aspects of internet and world wide web.

(a) Cyber crime
(b) Cyber law
(c) IT act
(d) Code of standard
Answer:
(b) Cyber law

Question 51.

…….. detects and prevents known viruses which weakens the computer.

(a) Web browser
(b) Email
(c) Record
(d) Anti-virus
Answer:
(d) Anti-virus

Question 52.

license allows for installation of a program on a software.

(a) Single user
(b) Network
(c) Site
(d) Lab pack
Answer:
(b) Network

Question 53.

……… means a representation of information, knowledge, facts, concepts or instructions,

(a) Data
(b) Signature
(c) Access
(d) Program
Answer:
(a) Data

Question 54.

……. means the official Gazette published in the electronic form.

(a) Electronic gazette
(b) Electronic record
(c) Electronic form
(d) All of these
Answer:
(a) Electronic gazette

Question 55.

………key means the key of a key pair used to create a digital signature.

(a) Private
(b) Public
(c) Both a and b
(d) Security key
Answer:
(a) Private

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 56.

The legal and regulatory accepts of internet refers to

(a) cyber law
(b) cyber crime
(c) criminal law
(d) IT act
Answer:
(a) cyber law

Question 57.

Cyber law is contained in

(a) IT Act, 2000
(b) Negotiable Instrument Act
(c) Power of Attorney
(d) Code of ethics
Answer:
(a) IT Act, 2000

Question 58.

……… include data, text, image, sound, voice, codes, computer programs, software and database.

(a) Data
(b) Information
(c) Function
(d) Process
Answer:
(b) Information

Question 59.

To maintain confidentiality of data and to promote integration of data is called as

(a) Security
(b) Privacy
(c) Liability
(d) Accountability
Answer:
(b) Privacy

Question 60.

Copyright is……….

(a) an intelectual property right attached to original works in which the right subsist with him
(b) individuals right to access the information
(c) right of information
(d) that is not cop(yrightrd software
Answer:
(a) an intelectual property right attached to original works in which the right subsist with him

Question 61.

……… software allows for anyone to use, copy and distribute it with modifications free of cost.

(a) Freeware
(b) Shareware
(c) Public domain
(d) Non-freeware
Answer:
(a) Freeware

Question 62.

Software available on Internetare

(a) freeware
(b) shareware
(c) public domain
(d) None of these
Answer:
(c) public domain

Question 63.

……….. is a distribution method to judge the software whether it is good or bad before you pay for it.

(a) Shareware
(b) Freeware
(c) Non-freeware software
(d) Public domain software
Answer:
(b) Freeware

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 64.

……… is a discipline that deals with issues in copyright, trademark and patent laws.

(a) Cyber law
(b) IT Act
(c) Cyber crime
(d) Intellectual Property Rights
Answer:
(a) Cyber law

Question 65.

…….. laws grant the creator the exclusive rights to reproduce, perform, distribute and display the work publicly.

(a) Copyright
(b) Cyber law
(c) Pair issue
(d) Cyber crime
Answer:
(a) Copyright

Question 66.

……..gives the protection to original work.

(a) Access
(b) Address
(c) Users
(d) Copyright
Answer:
(d) Copyright

Question 67.

………. is a leagal use of copyrighted material without explicit permission from the copyrighted holder.

(a) Copyright
(b) Fair use
(c) Unauthorized access
(d) Property right
Answer:
(b) Fair use

Question 68.

Which of the following is not a type of cybercrime?

(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
Answer:
(d) Installing antivirus for protection

Question 69.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 70.

……. is the verbatim transcription of a section of someone else work, without making any changes in original work.

(a) Minimal plagiarism
(b) Mosaic
(c) Direct or complete plagiarism
(d) None of the above
Answer:
(c) Direct or complete plagiarism

Question 71.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 72.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 73.

Using…….. encrypted data is decrypted.

(a) digital certificate
(b) key
(c) firewall
(d) digital certification
Answer:
(b) key

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 74.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices with Answers

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3 Read More »

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Societal Impacts and Data Protection Class 12 MCQ Questions

Case Study 1

Smridh has recently changed his school so he is not aware of the people, but someone is posting negative, demeaning comments on his social media profile. He is also getting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online.

(a) Smridh is a victim of…………..

(i) eavesdropping
(ii) stolen identity
(iii) phishing
(iv) cyber stalking
Answer:
(iv) cyber stalking

(b) The action that Smridh should take:

(i) he should only share with his friends.
(ii) he should not share with anyone as it can cause serious problem.
(iii) he should immediately report to the police.
(iv) he should bring to the notice of his parents and school authorities.
Answer:
(iv) he should bring to the notice of his parents and school authorities.

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(c) ………. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.

(i) Copyright
(ii) Computer ethics
(iii) Property rights
(iv) Privacy law
Answer:
(ii) Computer ethics

(d) Smridh needs to protect his personal information or data from unintentional and intentional attacks and disclosure which is termed as …………

(i) Digital right
(ii) Copyright
(iii) Privacy
(iv) Intellectual property
Answer:
(iii) Privacy

(e) The act of fraudulently acquiring someone’s personal and private information, such as online account names, login information and passwords is called as…………

(i) Phishing
(ii) Fraud
(iii) Scam
(iv) Plagiarism
Answer:
(i) Phishing

Case Study 2

The school offers Wi-Fi to the students of Class XII. For communication, the network security-staff of the school is having a registered URL “schoolwifi.edu”. On 17th September 2017, emails were received by all the students regarding expiry of their passwords. Instructions were also given renew their password within 24 hours by clicking on particular URL provided. On the bases of the above case study, answer the questions given below:

(a) Specify which type of cybercrime is it?

(i) Spamming
(ii) Phishing
(iii) Identity theft
(iv) Hacking

(b) URL stands for……………

(i) Universal Resource Loader
(ii) Uniform Resource Locator
(iii) United Research Loader
(iv) Uniform Resource Loader
Answer:
(ii) Uniform Resource Locator

(c) Unsolicited commercial email is known as:

(i) Malware
(ii) Virus
(iii) Spam
(iv) Spyware
Answer:
(iii) Spam

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(d) WiFi stands for…….

(i) Wireless Internet Frequent Interface
(ii) Wireless Functioning
(iii) Wireless Fidelity
(iv) Wire Free Internet
Answer:
(iii) Wireless Fidelity

(e) Ideally, what characters should be used in a password to make it strong?

(i) Letters and numbers only
(ii) Mixed Case (Upper and Lower)
(iii) Special characters
(iv) All of the above
Answer:
(iv) All of the above

Case Study 3

Sumit has to prepare a project on “Swachh Bharat Shreshth Bharat”. He decides to get information from the internet. He downloads three webpages (webpagel, webpage 2, webpage 3) containing information on the given topic.

1. He read a paragraph on from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
2. He downloaded three images of from webpage 2. He made a collage for his project using these images.
3. He also downloaded an icon from webpage 3 and pasted it on the front page of his project report. .

(a) Stepl an example of ………

(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(ii) paraphrasing

(b) Step 2 an act of……….

(i) plagiarism
(ii) copyright infringement
(iii) intellectual property right
(iv) digital footprints
Answer:
(i) plagiarism

(c) Step 3 an act of…….

(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(iii) copyright infringement

(d) A website is a collection of……..

(i) web servers
(ii) webpages
(iii) browsers
(iv) hyperlinks
Answer:
(ii) webpages

(e) The process of getting webpages, images and files from a web server to local computer is called:

(i) FTP
(ii) Uploading
(iii) Downloading
(iv) Remote access
Answer:
(iii) Downloading

Case Study 4

Cyber ethics in E-Commerce: The branch of ICT that allows selling or buying things online, is known as e-commerce.The process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce. It is generally regarded as the sales and commercial function of e-business. Now, many businesses are running online with the help of the Internet, and a substantial increase has been observed in the level of trade and business conducted electronically. E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management, Internet marketing, online transaction processing, Electronic Data Interchange (EDI), etc.

(a) Which of the following describes e-commerce?

(i) Doing business electronically
(ii) Buying goods only
(iii) Sale of goods only
(iv) All of the above
Answer:
(i) Doing business electronically

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(b) E-Commerce stands for:

(i) Electronic Commerce
(ii) Electronic Data Exchange
(iii) Electric Data Exchange
(iv) Electronic Commercialisation
Answer:
(i) Electronic Commerce

(c) Legal recognition for transactions are carried out by:

(i) electronic data interchange
(ii) electronic data exchange
(iii) electronic data transfer
(iv) electrical data interchange
Answer:
(i) electronic data interchange

(d) Which of the following is related to cyberethics?

(i) Ethics in the online environment
(ii) Online gaming
(iii) Ethics at school
(iv) Telecommunications

(e) Selling or buying stuff online, is known as………..

(i) E-commerce
(ii) Plagiarism
(iii) Digital property
(iv) Authenticity
Answer:
(i) E-commerce

Case Study 5

Requirements for Safe E-Commerce Transactions: In addition to the benefits gained from the e-commerce branch of ICT, there are many security concerns and other issues that prevent people to take its maximum benefits. Security is an essential part of any electronic transaction that takes place over the Internet. Clients will lose their faith in e-business if its security is compromised. At the time of buying some objects online, we are generally asked to enter our personal information such as name, delivery address (house address), credit card or debit card details, etc. Information should not be hampered or changed during its transmission over the network. Information should be encrypted and decrypted only by the authorised user. As e-commerce is a crucial branch of ICT, the information required for completing a transaction should be available on time. Delay in the availability of information may incur loss in business. Authenticity is an important requisite of e-commerce. Only authorised persons should be allowed to gain access to information. Otherwise, unauthorised persons may steal and misuse the information.

(a) Unauthorised user cannot read the data in the………security aspect.

(i) confidentiality
(ii) integrity
(iii) authorisation
(iv) non-repudiation
Answer:
(i) confidentiality

(b) In………….data is transferred in coded form.

(i) encryption
(ii) decryption
(iii) firewall
(iv) digital certification
Answer:
(i) encryption

(c) To convert cipher text to plain text is called

(i) firewall
(ii) digital certificate
(iii) decryption
(iv) virus
Answer:
(iii) decryption

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(d) Which of the following is a fundamental requisite to ensure safety of personal information?

(i) Confidentiality
(ii) Encryption
(iii) Integrity
(iv) Authenticity
Answer:
(i) Confidentiality

(e) What is a form of electronic signature called?

(i) Certificate
(ii) Encryption
(iii) Password
(iv) Digital signature

Case Study 6

Secure Data Transmission: Secure data transmission means that data/information is not being received or modified by an unauthorised person, over a network, from source to destination. For secure data transmission, we can convert an ‘ actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message.

The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each‘B’will be replaced by ‘E’ and similarly, each‘Z’ will be replaced by‘C. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.

(a) Secure data transmission means:

(i) data can be accessed by any unauthorised person during transmission
(ii) data cannot be accessed by any unauthorised person during transmission
(iii) transmission of data
(iv) None of the above
Answer:
(ii) Data cannot be accessed by any unauthorised person during transmission

(b) Which of the following techniques can be used for security of data?

(i) Authentication
(ii) Authorisation
(iii) Encryption
(iv) All of these
Answer:
(iv) All of these

(c) Caesar Cipher is:

(i) used for conversion of the actual message into an encrypted message
(ii) an encryption technique
(iii) Both (i) and (ii)
(iv) None of the above
Answer:
(iii) Both (i) and (ii)

(d) A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?

(i) G5QTZXIV
(ii) G5QTYXIV
(iii) GSXTYXIV
(iv) GSQSYXIV
Answer:
(ii) G5QTYXIV

(e) An encryption algorithm is used to transform a readable message into:

(i) text message
(ii) simple message
(iii) converted message
(iv) encrypted message
Answer:
(iv) encrypted message

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Case Study 7

Some More Ethics in Computing: The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals. In the same manner, ethics in computing or computer ethics is a set’of moral principles which regulate and govern the use of computing and Internet technology. Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. For example, one can easily copy the content available online, but computer ethics suggest that it is not a right practice.

(a) The term ………… refers to the creations of mind, which have both a moral and a commercial value.

(i) patent
(ii) copyright
(iii) intellectual property
(iv) trademark
Answer:
(iii) intellectual property

(b) ………..is a legal document that gives the inventor sole rights to make, sell or use an invention.

(i) Trademark
(ii) Patent
(iii) Copyright
(iv) Intellectual property
Answer:
(ii) Patent

(c) A logo or symbol that is printed on business items to make it exclusive, is known as ………..

(i) Patent
(ii) Copyright
(iii) Trademark
(iv) Intellectual property
Answer:
(iii) Trademark

(d)………….is a right that is granted by law to the creator or inventor for his original work.

(i) Copyright
(ii) Trademark
(iii) Intellectual property
(iv) None of the above
Answer:
(i) Copyright

(e) …………….. may be defined as the act of taking another person writing, conversation, song and passing it off as your own, without citing or crediting original author.

(i) Plagiarism
(ii) Copyright
(iii) Trademark
(iv) Patent
Answer:
(i) Plagiarism

Assertion-Reason Type Questions

Directions: In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Read the statements and choose the correct option.
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
c. (A) is true, but (R) is false.
d. (A) is false, but (R) is true.

Question 1.

Assertion (A): Encryption is a secure technique to protect data being transmitted over a network.
Reason (R): The sender of the information encrypts the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.

Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 2.

Assertion (A): A digital signature is a form of electronic signature that authenticates a document or transaction through encryption and password.
Reason (R): Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question3.

Assertion (A): Session Electronic Transaction is a secure protocol developed by MasterCard and Visa, in collaboration. Reason (R): The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.

Answer:
d. (A) is false, but (R) is true.

Question 4.

Assertion (A): Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. Reason (R): Patent refers to the creations of the mind, which have both a moral and a commercial value.

Answer:
c. (A) is true, but (R) is false.

Question 5.

Assertion (A): Patent is a legal document that gives the inventor sole rights to make, sell or use an invention. Reason (R): Intellectual Property (IP) is a right that is granted by law to the creator or inventor for his original work.

Answer:
c. (A) is true, but (R) is false.

Question 6.

Assertion (A): A logo or symbol that is printed on business items to make it exclusive, is known as a trademark. A trademark is valid for seven years and can be renewed after that.
Reason (R): Copyright covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.

Answer:
d. (A) is false, but (R) is true.

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 7.

Assertion (A): In Minimal plagiarism the original work is edited, reframed and reproduced. It is very common in the education field.
Reason (R): Direct or complete plagiarism is the verbatim transcription of a section of someone else’s work, without making any changes in the original work.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 8.

Assertion (A): Digital assets that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users. Reason (R): The owners are the ones who only can decide in what form the assets can be sold, reused, modified, repurposed or applied in any other media other than what the assets were originally meant for.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 9.

Assertion (A): There are many anti-hacking software and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc. Reason (R): These anti-hacking tools prevent attackers from controlling or accessing your software, and therefore, help in protecting digital assets.

Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

Question 10.

Assertion (A):Asoftware licence is a document that provides legally binding guidelines for the use and distribution of software.
Reason (R): Open source software licences a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

Answer:
c. (A) is true, but (R) is false.

Question 11.

Assertion (A): Digital unite refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.
Reason (R): The licence must discriminate against any person or group of persons.

Answer:
c. (A) is true, but (R) is false.

Question 12.

Assertion (A): As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.
Reason (R): In a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 13.

Assertion (A): Passive digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.
Reason (R): Digital footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.

Answer:
d. (A) is false, but (R) is true.

Question 14.

Assertion (A): For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, etc.
Reason (R): Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 15.

Assertion (A): In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data.
Reason (R): Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 16.

Assertion (A): Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material.
Reason (R): Patent includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.

Answer:
c. (A) is true, but (R) is false.

Question 17.

Assertion (A): The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive information.
Reason (R): E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of their useful life.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

MCQ Questions for Class 12 Informatics Practices with Answers

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Read More »

error: Content is protected !!