Societal Impacts and Data Protection Class 12 MCQ Questions
Case Study 1
Smridh has recently changed his school so he is not aware of the people, but someone is posting negative, demeaning comments on his social media profile. He is also getting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online.
(a) Smridh is a victim of…………..
(i) eavesdropping
(ii) stolen identity
(iii) phishing
(iv) cyber stalking
Answer:
(iv) cyber stalking
(b) The action that Smridh should take:
(i) he should only share with his friends.
(ii) he should not share with anyone as it can cause serious problem.
(iii) he should immediately report to the police.
(iv) he should bring to the notice of his parents and school authorities.
Answer:
(iv) he should bring to the notice of his parents and school authorities.
(c) ………. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.
(i) Copyright
(ii) Computer ethics
(iii) Property rights
(iv) Privacy law
Answer:
(ii) Computer ethics
(d) Smridh needs to protect his personal information or data from unintentional and intentional attacks and disclosure which is termed as …………
(i) Digital right
(ii) Copyright
(iii) Privacy
(iv) Intellectual property
Answer:
(iii) Privacy
(e) The act of fraudulently acquiring someone’s personal and private information, such as online account names, login information and passwords is called as…………
(i) Phishing
(ii) Fraud
(iii) Scam
(iv) Plagiarism
Answer:
(i) Phishing
Case Study 2
The school offers Wi-Fi to the students of Class XII. For communication, the network security-staff of the school is having a registered URL “schoolwifi.edu”. On 17th September 2017, emails were received by all the students regarding expiry of their passwords. Instructions were also given renew their password within 24 hours by clicking on particular URL provided. On the bases of the above case study, answer the questions given below:
(a) Specify which type of cybercrime is it?
(i) Spamming
(ii) Phishing
(iii) Identity theft
(iv) Hacking
(b) URL stands for……………
(i) Universal Resource Loader
(ii) Uniform Resource Locator
(iii) United Research Loader
(iv) Uniform Resource Loader
Answer:
(ii) Uniform Resource Locator
(c) Unsolicited commercial email is known as:
(i) Malware
(ii) Virus
(iii) Spam
(iv) Spyware
Answer:
(iii) Spam
(d) WiFi stands for…….
(i) Wireless Internet Frequent Interface
(ii) Wireless Functioning
(iii) Wireless Fidelity
(iv) Wire Free Internet
Answer:
(iii) Wireless Fidelity
(e) Ideally, what characters should be used in a password to make it strong?
(i) Letters and numbers only
(ii) Mixed Case (Upper and Lower)
(iii) Special characters
(iv) All of the above
Answer:
(iv) All of the above
Case Study 3
Sumit has to prepare a project on “Swachh Bharat Shreshth Bharat”. He decides to get information from the internet. He downloads three webpages (webpagel, webpage 2, webpage 3) containing information on the given topic.
1. He read a paragraph on from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
2. He downloaded three images of from webpage 2. He made a collage for his project using these images.
3. He also downloaded an icon from webpage 3 and pasted it on the front page of his project report. .
(a) Stepl an example of ………
(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(ii) paraphrasing
(b) Step 2 an act of……….
(i) plagiarism
(ii) copyright infringement
(iii) intellectual property right
(iv) digital footprints
Answer:
(i) plagiarism
(c) Step 3 an act of…….
(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(iii) copyright infringement
(d) A website is a collection of……..
(i) web servers
(ii) webpages
(iii) browsers
(iv) hyperlinks
Answer:
(ii) webpages
(e) The process of getting webpages, images and files from a web server to local computer is called:
(i) FTP
(ii) Uploading
(iii) Downloading
(iv) Remote access
Answer:
(iii) Downloading
Case Study 4
Cyber ethics in E-Commerce: The branch of ICT that allows selling or buying things online, is known as e-commerce.The process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce. It is generally regarded as the sales and commercial function of e-business. Now, many businesses are running online with the help of the Internet, and a substantial increase has been observed in the level of trade and business conducted electronically. E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management, Internet marketing, online transaction processing, Electronic Data Interchange (EDI), etc.
(a) Which of the following describes e-commerce?
(i) Doing business electronically
(ii) Buying goods only
(iii) Sale of goods only
(iv) All of the above
Answer:
(i) Doing business electronically
(b) E-Commerce stands for:
(i) Electronic Commerce
(ii) Electronic Data Exchange
(iii) Electric Data Exchange
(iv) Electronic Commercialisation
Answer:
(i) Electronic Commerce
(c) Legal recognition for transactions are carried out by:
(i) electronic data interchange
(ii) electronic data exchange
(iii) electronic data transfer
(iv) electrical data interchange
Answer:
(i) electronic data interchange
(d) Which of the following is related to cyberethics?
(i) Ethics in the online environment
(ii) Online gaming
(iii) Ethics at school
(iv) Telecommunications
(e) Selling or buying stuff online, is known as………..
(i) E-commerce
(ii) Plagiarism
(iii) Digital property
(iv) Authenticity
Answer:
(i) E-commerce
Case Study 5
Requirements for Safe E-Commerce Transactions: In addition to the benefits gained from the e-commerce branch of ICT, there are many security concerns and other issues that prevent people to take its maximum benefits. Security is an essential part of any electronic transaction that takes place over the Internet. Clients will lose their faith in e-business if its security is compromised. At the time of buying some objects online, we are generally asked to enter our personal information such as name, delivery address (house address), credit card or debit card details, etc. Information should not be hampered or changed during its transmission over the network. Information should be encrypted and decrypted only by the authorised user. As e-commerce is a crucial branch of ICT, the information required for completing a transaction should be available on time. Delay in the availability of information may incur loss in business. Authenticity is an important requisite of e-commerce. Only authorised persons should be allowed to gain access to information. Otherwise, unauthorised persons may steal and misuse the information.
(a) Unauthorised user cannot read the data in the………security aspect.
(i) confidentiality
(ii) integrity
(iii) authorisation
(iv) non-repudiation
Answer:
(i) confidentiality
(b) In………….data is transferred in coded form.
(i) encryption
(ii) decryption
(iii) firewall
(iv) digital certification
Answer:
(i) encryption
(c) To convert cipher text to plain text is called
(i) firewall
(ii) digital certificate
(iii) decryption
(iv) virus
Answer:
(iii) decryption
(d) Which of the following is a fundamental requisite to ensure safety of personal information?
(i) Confidentiality
(ii) Encryption
(iii) Integrity
(iv) Authenticity
Answer:
(i) Confidentiality
(e) What is a form of electronic signature called?
(i) Certificate
(ii) Encryption
(iii) Password
(iv) Digital signature
Case Study 6
Secure Data Transmission: Secure data transmission means that data/information is not being received or modified by an unauthorised person, over a network, from source to destination. For secure data transmission, we can convert an ‘ actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message.
The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each‘B’will be replaced by ‘E’ and similarly, each‘Z’ will be replaced by‘C. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.
(a) Secure data transmission means:
(i) data can be accessed by any unauthorised person during transmission
(ii) data cannot be accessed by any unauthorised person during transmission
(iii) transmission of data
(iv) None of the above
Answer:
(ii) Data cannot be accessed by any unauthorised person during transmission
(b) Which of the following techniques can be used for security of data?
(i) Authentication
(ii) Authorisation
(iii) Encryption
(iv) All of these
Answer:
(iv) All of these
(c) Caesar Cipher is:
(i) used for conversion of the actual message into an encrypted message
(ii) an encryption technique
(iii) Both (i) and (ii)
(iv) None of the above
Answer:
(iii) Both (i) and (ii)
(d) A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?
(i) G5QTZXIV
(ii) G5QTYXIV
(iii) GSXTYXIV
(iv) GSQSYXIV
Answer:
(ii) G5QTYXIV
(e) An encryption algorithm is used to transform a readable message into:
(i) text message
(ii) simple message
(iii) converted message
(iv) encrypted message
Answer:
(iv) encrypted message
Case Study 7
Some More Ethics in Computing: The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals. In the same manner, ethics in computing or computer ethics is a set’of moral principles which regulate and govern the use of computing and Internet technology. Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. For example, one can easily copy the content available online, but computer ethics suggest that it is not a right practice.
(a) The term ………… refers to the creations of mind, which have both a moral and a commercial value.
(i) patent
(ii) copyright
(iii) intellectual property
(iv) trademark
Answer:
(iii) intellectual property
(b) ………..is a legal document that gives the inventor sole rights to make, sell or use an invention.
(i) Trademark
(ii) Patent
(iii) Copyright
(iv) Intellectual property
Answer:
(ii) Patent
(c) A logo or symbol that is printed on business items to make it exclusive, is known as ………..
(i) Patent
(ii) Copyright
(iii) Trademark
(iv) Intellectual property
Answer:
(iii) Trademark
(d)………….is a right that is granted by law to the creator or inventor for his original work.
(i) Copyright
(ii) Trademark
(iii) Intellectual property
(iv) None of the above
Answer:
(i) Copyright
(e) …………….. may be defined as the act of taking another person writing, conversation, song and passing it off as your own, without citing or crediting original author.
(i) Plagiarism
(ii) Copyright
(iii) Trademark
(iv) Patent
Answer:
(i) Plagiarism
Assertion-Reason Type Questions
Directions: In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Read the statements and choose the correct option.
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
c. (A) is true, but (R) is false.
d. (A) is false, but (R) is true.
Question 1.
Assertion (A): Encryption is a secure technique to protect data being transmitted over a network.
Reason (R): The sender of the information encrypts the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.
Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).
Question 2.
Assertion (A): A digital signature is a form of electronic signature that authenticates a document or transaction through encryption and password.
Reason (R): Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question3.
Assertion (A): Session Electronic Transaction is a secure protocol developed by MasterCard and Visa, in collaboration. Reason (R): The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.
Answer:
d. (A) is false, but (R) is true.
Question 4.
Assertion (A): Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. Reason (R): Patent refers to the creations of the mind, which have both a moral and a commercial value.
Answer:
c. (A) is true, but (R) is false.
Question 5.
Assertion (A): Patent is a legal document that gives the inventor sole rights to make, sell or use an invention. Reason (R): Intellectual Property (IP) is a right that is granted by law to the creator or inventor for his original work.
Answer:
c. (A) is true, but (R) is false.
Question 6.
Assertion (A): A logo or symbol that is printed on business items to make it exclusive, is known as a trademark. A trademark is valid for seven years and can be renewed after that.
Reason (R): Copyright covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.
Answer:
d. (A) is false, but (R) is true.
Question 7.
Assertion (A): In Minimal plagiarism the original work is edited, reframed and reproduced. It is very common in the education field.
Reason (R): Direct or complete plagiarism is the verbatim transcription of a section of someone else’s work, without making any changes in the original work.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question 8.
Assertion (A): Digital assets that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users. Reason (R): The owners are the ones who only can decide in what form the assets can be sold, reused, modified, repurposed or applied in any other media other than what the assets were originally meant for.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question 9.
Assertion (A): There are many anti-hacking software and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc. Reason (R): These anti-hacking tools prevent attackers from controlling or accessing your software, and therefore, help in protecting digital assets.
Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).
Question 10.
Assertion (A):Asoftware licence is a document that provides legally binding guidelines for the use and distribution of software.
Reason (R): Open source software licences a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.
Answer:
c. (A) is true, but (R) is false.
Question 11.
Assertion (A): Digital unite refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.
Reason (R): The licence must discriminate against any person or group of persons.
Answer:
c. (A) is true, but (R) is false.
Question 12.
Assertion (A): As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.
Reason (R): In a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question 13.
Assertion (A): Passive digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.
Reason (R): Digital footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.
Answer:
d. (A) is false, but (R) is true.
Question 14.
Assertion (A): For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, etc.
Reason (R): Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question 15.
Assertion (A): In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data.
Reason (R): Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question 16.
Assertion (A): Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material.
Reason (R): Patent includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.
Answer:
c. (A) is true, but (R) is false.
Question 17.
Assertion (A): The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive information.
Reason (R): E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of their useful life.
Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).