MCQ Questions

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Coordinate Geometry Class 10 MCQ Questions with Answers

Question 1.

The distance of the point P (2, 3) from the x-axis is:

(A) 2
(B) 3
(C) 1
(D) 5
Answer:
(B) 3

Explanation:
Since coordinate of a given point is the distance of point from x-axis.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 1a

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 2.

The distance between the points A (0, 6) and B (0,-2) is:

(A) 6
(B) 8
(C) 4
(D) 2
Answer:
(B) 8

Explanation:
The distance between two points (x1, y1) and (x2, y2 ) is given as,
d = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Where, x1, = 0, y1 = 6 and x2 = 0, y2 = -2 So, distance between A (0, 6) and B (0, -2):
AB = \(\sqrt{(0-0)^{2}+(-2-6)^{2}}\)
= \(\sqrt{0+(-8)^{2}}/latex]
= [latex]\sqrt{8^{2}}\)
= 8

Question 3.

The distance of the point P (-6,8) from the origin is:

(A) 8
(B) 2√7
(C) 10
(D) 6
Answer:
(C) 10

Explanation:
Distance between two points (x1, y1) and (x2, y2) is given as,
d = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Where, x1= -6, y1 =8 and x2 = 0, y2 = 0 So, distance between P (-6,8) and origin O (0,0) is given by,
PO = \(\sqrt{[0-(-6)]^{2}+[(0-8)]^{2}}\)
= \(\sqrt{(6)^{2}+(-8)^{2}}\)
= \(\sqrt{36+64}\)
= \(\sqrt{100}\)
= 10

Question 4.

The distance between the points (0, 5) and (-5, 0) is:

(A) 5
(B) 5√2
(C) 2√5
(D) 10
Answer:
(B) 5√2

Explanation:
Distance between two points (x1,y1) and (x2,y2) is given as,
= \(\sqrt{(-5-0)^{2}+(0-5)^{2}} \)
Where, x1= 0, y1= 5 and x2 = -5, y2 = 0 So that, distance between the point (0, 5) and I (-5,0),
= \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
= \(\sqrt{(-5-0)^{2}+(0-5)^{2}}\)
= \(\sqrt{25+25}\)
= \(\sqrt{50}\)
= 5√2

Question 5.

AOBC is a rectangle whose three vertices are vertices A (0, 3), O (0, 0) and B (5, 0). The length of its diagonal is:

(A) 5
(B) 3
(C) √34
(D) 4
Answer:
(C) √34

Explanation:
According to the question, a triangle can be represented as:
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 2a
∴ Distance between the points A (0,3) and B (5, 0) is
AB = \(\sqrt{(5-0)^{2}+(0-3)^{2}}\)
= \(\sqrt{25+9}\)
= \(\sqrt{34}\)
Hence, the required length of diagonal is √34.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 6.

The perimeter of a triangle with vertices (0, 4), (0,0) and (3,0) is:

(A) 5
(B) 12
(C) 11
(D)7+√5
Answer:
(B) 12
Explanation:
Since, Perimeter of triangle = OA + AB + OB
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 2ab
Here OA = 4 units, AB = 5 units (using pythagoras theorem in triangle AOB) and OB =3 units.
Therefore, Perimeter of triangle = 4 + 5+3
= 12 units.
Question 7.

The points (-4,0), (4,0) and (0,3) are the vertices of a:

(A) right triangle
(B) isosceles triangle
(C) equilateral triangle
(D) scalene triangle E
Answer:
(B) isosceles triangle

Explanation:
Let X (-4, 0), Y (4, 0) and Z (0, 3) are the given vertices.
Now, distance between X ( -4,0) and Y (4, 0),
XY = \(\sqrt{[4-(-4)]^{2}+(0-0)^{2}}\)
= \(\sqrt{(4+4)^{2}}\)
= \(\sqrt{8^{2}}\)
= 8
Distance between Y(4, 0) and Z (0, 3),
YZ = \(\sqrt{(0-4)^{2}+(3-0)^{2}}\)
= \(\sqrt{16+9}\)
= \(\sqrt{25}\)
= 5
Distance between Y (4,0) and Z (0, 3),
ZX = \(\sqrt{[0-(-4)]^{2}+(3-0)^{2}}\)
= \(\sqrt{16+9}\)
= \(\sqrt{25}\)
= 5
As, YZ = ZX, i.c., two sidps of the triangle ane H equal.
So that, the AXYZ is an isosceles triangle.

Question 8.

The coordinates of the point which is equidistant from the three vertices of the ∆AOB as shown in the figure is:

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 3
(A) (x, y)
(B) (y,x)
(C) \(\left(\frac{x}{2}, \frac{y}{2}\right)\)
(D) \(\left(\frac{y}{2}, \frac{x}{2}\right)\)
Answer:
(A) (x, y)

Explanation:
From the given figure, coordinates of three vertices of a triangle arc: O (0, 0), A (0,2y) and B (2x, 0). Suppose the required point be P whose coordinates are (h, k) Now, P is equidistant trom the three vertices of ∆AOB, therefore,
PO = PA = PB
or (PO)2 = (PA)2 = (PB)2
By using distance formula, we get:
\(\left(\sqrt{(h-0)^{2}+(k-0)^{2}}\right)^{2}\) = \(\left(\sqrt{(h-0)^{2}+(k-2 y)^{2}}\right)^{2}\)
= \(\left(\sqrt{(h-2 x)^{2}+(5-0)^{2}}\right)^{2}\)
⇒ h2 + k2 = h2 +(k – 2y)2 = (h – 2x)2 + k2 ………(i)
⇒ k2 = k2 + 4y2 – 4yk
⇒ 0 = 4y2 – 4yk
⇒ 4y (y – k) = 0
⇒ y = k
Taking first and second parts of EQuestion (i),
h2 + k2 = (h- 2x)2 + k2
⇒ h2 = h2 + 4x2 – 4xh
⇒ 4x (x – h) = 0
⇒ h = x
Required coordinates of the point are (h, k) = (x, y)

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is NOT the correct explanation of A
(C) A is true but R is false
(D) A is false and R is True

Question 1.

Assertion (A): If the distance between the point (4, p) and (1,0) is 5, then the value of p is 4.
Reason (R): The point which divides the line segment joining the points (7, – 6) and (3,4) in ratio 1: 2 internally lies in the fourth quadrant.

Answer:
(D) A is false and R is True

Explanation:
In case of assertion:
Distance between two points (x1,y1) and (x2, y2) is given as,
d = \(\sqrt{\left(x_{2}+x_{1}\right)^{2}+\left(y_{2}+y_{1}\right)^{2}}\)
where,
(x1,y1) = (4, p)
(x2,y2) = (1, 0)
And, d = 5
Put the values, we have
52 = (1 — 4)2 + (0 – p)2
25 = (-3)2 + (-p)2
25-9 = p2
16 = p2
+4, -4 = p
∴ Assertion is incorrect.
In case of reason:
Let (x, y) be the point
Then, x = \(\frac{m x_{2}+n x_{1}}{m+n}\) and y = \(\frac{m y_{2}+n y_{1}}{m+n}\) ………..(i)
Here, x1 = 7, y1= -6, x1 = 3, y1 = 4, m = 1 and n = 2
∴ x = \(\frac{1(3)+2(7)}{1+2}\)
⇒ x = \(\frac{3+14}{3}=\frac{17}{3}\)
And, y = \(\frac{1(4)+2(-6)}{1+2}\)
⇒ y = \(\frac{4-12}{3}=-\frac{8}{3}\)
So, the required point (x,y) = \(\left(\frac{17}{3},-\frac{8}{3}\right)\) lies in IV th quadrant.
∴ Reason is correct.
Hence, assertion is incorrect but reason is correct.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 2.

Assertion (A): AABC with vertices A(-2, 0), B(2, 0) and C(0,2) is similar to ADEF with vertices D(-4,0), E(4,0) and F(0,4).
Reason (R): A circle has its centre at the origin and a point P(5, 0) lies on it. The point Q(6,8) lies outside the circle.

Answer:
(B) Both A and R are true but R is NOT the correct explanation of A

Explanation:
In case of assertion:
By using Distance Formula,
∴Distance between A (-2,0) and B (2,0),
AB = \(\sqrt{[2-(-2)]^{2}+(0-0)^{2}}\)=4
[∴distance between the points (x1, y1) and (x2,y2)
D = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
Similarly, distance between B (2,0) and C (0, 2),
BC = \(\sqrt{(0-2)^{2}+(2-0)^{2}}\) = \(\sqrt{4+4}\) = 2√2
In ∆ABC, distance between C (0, 2) and A (-2,0),
CA = \(\sqrt{\left[0-(-2)^{2}\right]+(2-0)^{2}}\) = \(\sqrt{4+4}\) = 2√2
∴Distance between F (0,4) and D (-4, 0),
FD = \(\sqrt{(0+4)^{2}+(0-4)^{2}}\) = \(\sqrt{4^{2}+(4)^{2}}\) = 4√2
∴Distance between F (o,4) and E (4,0) and D (-4, 0),
FE = \(\sqrt{(0-4)^{2}+(4-0)^{2}}\) = \(\sqrt{4^{2}+4^{2}}\) = 4√2
and distance between E (4,0) and D (-4, 0),
ED = \(\sqrt{[4-(-4)]^{2}+(0)^{2}}\) = \(\sqrt{8^{2}}\) = 4√2
Now, \(\frac{A B}{O E}\) = \(\frac{4}{9}\) = \(\frac{1}{2}\),
\(\frac{A C}{D E}\) = \(\frac{2 \sqrt{2}}{4 \sqrt{2}}\) = \(\frac{1}{2}\)
\(\frac{B C}{E F}\) = \(\frac{2 \sqrt{2}}{4 \sqrt{2}}\)= \(\frac{1}{2}\)
∴ \(\frac{A B}{D E}\) = \(\frac{A C}{D F}\) = \(\frac{B C}{E F}\)
Here, we see that sides of AABC and AFDE are proportional.
Therefore, by SSS similarity rule, both the triangles are similar.
∴ Assertion is correct.
In case of reason:
Faint Q (6, 8) will lie outside the circle if its distance from the centre of circle is greater than the radius of the circle.
Distance between centre O (0,0) and P (5,0),
OP = \(\sqrt{(5-0)^{2}+(0-0)^{2}}\)
= \(\sqrt{5^{2}+0^{2}}\)
= 5
As, point P lies at the circle, therefore, OP = Radius of circle.
Distance between centre O (0,0) and Q (6,8),
OQ = \(\sqrt{(6-0)^{2}+(8-0)^{2}}\)
= \(\sqrt{6^{2}+8^{2}}\)
= \(\sqrt{36+64}\)
= \(\sqrt{100}\)
= 10
As OQ > OP, therefore, point Q (6, 8) lies outside of the circle.
∴ Reason is correct.
Hence, both assertion and reason are correct but reason is not the correct explanation for assertion.

Question 3.

Assertion (A): The ordinate of a point A on y-axis is 5 and B has coordinates (-3,1). Then the length of AB is 5 units.
Reason (R): The point A(2, 7) lies on the perpendicular bisector of line segment joining the points P(6,5) and Q(0, -4).

Answer:
(C) A is true but R is false

Explanation:
In case of assertion:
Here, A → (0,5) and B → (-3,1)
AB = \(\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\)
= \(\sqrt{(-3-0)^{2}+(1-5)^{2}}\)
= \(\sqrt{9+16}\)
= \(\sqrt{25}\)
= 5 units
∴ Assertion is correct.
In case of reason:
If A (2, 7) lies on perpendicular bisector of P (6,5) and Q (0, -4), then
AP = AQ
∴ By using Distance Formula,
AP = \(\sqrt{(6-2)^{2}+(5-7)^{2}}\)
= \(\sqrt{(4)^{2}+(-2)^{2}}\)
= \(\sqrt{20}\)
And AQ = \(\sqrt{(0-2)^{2}+(-4-7)^{2}}\)
= \(\sqrt{(-2)^{2}+(-11)^{2}}\)
= \(\sqrt{125}\)
As, AP AQ
Thercfore, A does not lie on the perpendicular bisector of PQuestion
∴ Reason is incorrect.
Hence, assertion is correct but reason is incorrect.

Case – Based MCQs

Attempt any four sub-parts from each question. Each sub-part carries 1 mark.
I. Read the following text and answer the below questions:
The diagram show the plans for a sun room. It will be built onto the wall of a house. The four walls of the sun room are square clear glass panels. The roof is made using,

    • Four clear glass panels, trapezium in shape, all of the same size
    • One tinted glass panel, half a regular octagon in shape

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 3a

Question 1.

Refer to Top View, find the mid-point of the seg¬ment joining the points J(6,17) and 1(9,16).

(A) \(\frac{33}{2}, \frac{15}{2}\)
(B) \(\frac{3}{2}, \frac{1}{2}\)
(C) \(\frac{15}{2}, \frac{33}{2}\)
(D) \(\frac{1}{2}, \frac{3}{2}\)
Answer:
(C) \(\frac{15}{2}, \frac{33}{2}\)

Explanation:
Mid-point of J(6,17) and 1(9,16) is
x = \(\frac{6+9}{2}\) and y = \(\frac{17+16}{2}\)
x = \(\frac{15}{2}\) and y = \(\frac{33}{2}\)

Question 2.

Refer to front View, the distance of the point P from the y-axis is:

(A) 4
(B) 15
(C) 19
(D) 25
Answer:
(A) 4

Explanation:
The distance of the point P from the Y-axis = 4.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 3.

Refer to front view, the distance between the points A and S is

(A) 4
(B) 8
(C) 14
(D) 20
Answer:
(C) 14

Explanation:
A’s coordinates = (1,8)
S’s coordinates = (15,8)
Then, AS = \(\left|\sqrt{(15-1)^{2}+(8-8)^{2}}\right|\)
= \(\sqrt{(14)^{2}}\)
= 14.

Question 4.

Refer to front view, find the co-ordinates of the point which divides the line segment joining the points A and B in the ratio 1: 3 internally.

(A) (8.5,2.0)
(B) (2.0,9.5)
(C) (3.0,7.5)
(D) (2.0,8.5)
Answer:
(D) (2.0,8.5)

Explanation:
The coordinates of A = (1,8) The coordinates of B = (4,10) Also, m = 1 and n = 3
Then, (x,y) = \(\left(\frac{1 \times 4+3 \times 1}{1+3}, \frac{1 \times 10+3 \times 8}{1+3}\right)\)
= \(\left(\frac{7}{4}, \frac{34}{4}\right)\)
= (1. 75,8.5)

Question 5.

Refer to front view, if a point (x, y) is equidistant from the Q(9,8) and S(17,8), then

(A) x + y = 13
(B) x – 13 = 0
(C) y – 13 = 0
(D) Y – y = 13
Answer:
Option (B) is correct

Explanation:
Let point be P(x, y)
PQ2 = PS2
or, (x – 9)2 + (y – 8)2 = (x – 17)2 + (y – 8)2 or, x – 13 =0

II. Read the following text and answer the below questions:
Ayush Starts walking from his house to office. Instead of going to the office directly, he goes to a bank first, from there to his daughter’s school and then reaches the office.
(Assume that all distances covered are in straight lines). If the house is situated at (2, 4), bank at (5, 8), school at (13, 14) and office at (13, 26) and coordinates are in km.

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 4

Question 1.

What is the distance between house and bank?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(A) 5 km

Explanation:
Since,
Distance between two points (x1, y1) and (x2, y2).
d = \(\left|\sqrt{\left(x_{2}-x_{1}\right)^{2}+\left(y_{2}-y_{1}\right)^{2}}\right|\)
Now, distance between house and bank,
= \(\left|\sqrt{(5-2)^{2}+(8-4)^{2}}\right|\)
= \(\left|\sqrt{(3)^{2}+(4)^{2}}\right|\)
= \(|\sqrt{9+16}|\)
= \(\sqrt{25}\)
= 5 km

Question 2.

What is the distance between Daughter’s School and bank ?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(B) 10 km

Explanation:
Distance between bank and daughter’s school,
= \(\left|\sqrt{(13-5)^{2}+(14-8)^{2}}\right|\)
= \(\left|\sqrt{(8)^{2}+(6)^{2}}\right|\)
= \(|\sqrt{64+36}|\)
= \(|\sqrt{100}|\)
= 10 km

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 3.

What is the distance between house and office?

(A) 24.6 km
(B) 26.4 km
(C) 24 km
(D) 26 km
Answer:
(B) 26.4 km

Explanation:
Distance between house to office,
= \(\vec{a}\)
= \(\vec{a}\)
= \(\vec{a}\)
= \(\vec{a}\)
= 24. 59
= 24.6 km

Question 4.

What is the total distance travelled by Ayush to reach the office?

(A) 5 km
(B) 10 km
(C) 12 km
(D) 27 km
Answer:
(D) 27 km

Explanation:
Distance between daughter’s school and office.
= \(\left|\sqrt{(13-13)^{2}+(26-14)^{2}}\right|\)
= \(\left|\sqrt{0+(12)^{2}}\right|\)
= 12 km
Total distance (House + Bank + School + Office) travelled = 5 + 10 + 12 = 27 km

Question 5.

What is the extra distance travelled by Ayush?

(A) 2 km
(B) 2.2 km
(C) 2.4 km
(D) none of these
Answer:
(C) 2.4 km

Explanation:
Extra distance travelled by Ayush in reaching his office = 27 – 24.6 = 2.4 km.

III. Read the following text and answer the below questions:
In order to conduct Sports Day activities in your School, lines have been drawn with chalk powder at a distance of 1 m each, in a rectangular shaped ground ABCD, 100 flowerpots have been placed at a distance of 1 m from each other along AD, as shown in given figure below. Niharika runs 1/4th the distance AD on the 2nd line and posts a green (G) flag runs 1/5th distance AD on the eighth line and posts a red (R) flag.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 5

Question 1.

Find the position of green flag

(A) (2,25)
(B) (2,0.25)
(C) (25,2)
(D) (0,-25)
Answer:
Option (A) is correct.

Question 2.

Find the position of red flag

(A) (8,0)
(B) (20,8)
(C) (8,20)
(D) (8,0.2)
Answer:
(C) (8,20)

Question 3.

What is the distance between both the flags?

(A) √41
(B) √11
(C) √61
(D) √51
Answer:
(C) √61

Explanation:
Position of Green flag = (2,25) Position of Red flag = (8,20)
Distance between both the flags
\(\sqrt{(8-2)^{2}+(20-25)^{2}}\) = \(\sqrt{6^{2}+(-5)^{2}}\)
= \(\sqrt{36+25}\)
= √61

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 4.

If Rashini has to post a blue llag exactly halfway between the line segment joining the two flags, where should she post her flag?

(A) (5,22.5)
(B) (10,22)
(C) (2,8.5)
(D) (2.5,20)
Answer:
(A) (5,22.5)

Explanation:
Position of blue flag Mid-point of line segment joining the green and red flags
= \(\left(\frac{2+8}{2}, \frac{25+20}{2}\right)\)
= (5, 22.5)

Question 5.

If Joy has to post a flag at one-fourth distance from green flag, in the line segment joining the green and red flags, then where should he post his flag ?

(A) (3.5,24)
(B) (0.5,12.5)
(C) (2.25,8.5)
(D) (25,20)
Answer:
(A) (3.5,24)

Explanation:
Position of Joy’s flag = Mid-point of line segment joining green and blue flags
= \(\left[\frac{2+5}{2}, \frac{25+22.5}{2}\right]\)
= [3.5,23.75] ~ [3.5,24]

IV. Read the following text and answer the below questions:
The class X students school in krishnagar have been allotted a rectangular plot of land for their gardening activity. Saplings of Gulmohar are planted on the boundary at a distance of 1 m from each other. There is triangular grassy lawn in the plot as shown in the figure. The students are to sow seeds of flowering plants on the remaining area of the plot.
MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry 6

Question 1.

Taking A as origin, find the coordinates of P.

(A) (4,6)
(B) (6,4)
(C) (0,6)
(D) (4,0)
Answer:
(A) (4,6)

Question 2.

What will be the coordinates of R, if C is the origin?

(A) (8,6)
(B) (3,10)
(C) (10,3)
(D) (0,6)
Answer:
(C) (10,3)

Question 3.

What will be the coordinates of Q, if C is the origin?

(A) (6,13)
(B) (-6,13)
(C) (-13,6)
(D) (13,6)
Answer:
(D) (13,6)

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry

Question 4.

Calculate the area of the triangles if A is the origin.

(A) 4.5
(B) 6
(C) 8
(D) 6.25
Answer:
(A) 4.5

Explanation:
Coordinates of P = (4,6)
Coordinates of Q = (3,2)
Coordinates of R = (6,5)
Area of triangle PQR = [ x1 (y2 – y2 + x2 (y3 – y1) + x3(y1 – y2)]
= \(\frac{1}{2}\) [4(-3) + 3(-1) + 6(4)]
= \(\frac{1}{2}\) [- 12 + (-3) + 24]
= \(\frac{1}{2}\)[- 12 + 21]
= \(\frac{1}{2}\)[9]
= 4.5 sQuestion units.

Question 5.

Calculate the area of the triangle if C is the origin.

(A) 8
(B) 5
(C) 6.25
(D) 4.5
Answer:
(D) 4.5

MCQ Questions for Class 10 Maths with Answers

MCQ Questions for Class 10 Maths Chapter 7 Coordinate Geometry Read More »

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

Informatics Practices Class 12 Notes – Societal Impacts and Data Protection

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Digital Footprints: A digital footprint is the record or trail left by the things one does online. The social media activity, the information on personal website, the browsing activities, online subscriptions, any photo galleries and videos uploaded by a user – essentially, any activity carried out on the internet makes the digital footprint of a user.
→ Digital footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.
→ Types of Digital Footprints: There are two kinds of digital footprints-Active digital footprints and Passive digital footprints.

→ Active Digital Footprints: Active digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.

→ Passive Digital Footprints: The digital data trail we leave online unintentionally is called passive digital footprints. This includes the data generated when we visit a website, use a mobile App, browse internet, etc.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Digital Society and Netizen: Digital society reflects the growing trend of using digital technologies in all spheres of human activities. Anyone who uses digital technology along with internet is a digital citizen or a netizen. Being a good netizen means practicing safe, ethical and legal use of digital technology. A responsible netizen must abide by net etiquettes, communication etiquettes and social media etiquettes.

→ Net Etiquettes:The word netiquette, derives from the combination of words -‘net’ (internet) and ‘etiquette’. It refers to online manners while using internet or working online. One should be ethical, respectful and responsible while surfing the internet.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection 1B
→ Be Ethical:

→ No Copyright Violation: We should not use copyrighted materials without the permission of the creator or owner. As an ethical digital citizen, we need to be careful while streaming audio or video or downioadino images and files from the internet.

→ Share the Expertise: It is good to share information and knowledge on internet so that others can access it. However, prior to sharing information, we need to be sure that we have sufficient knowledge on that topic. The information shared should be true and unambiguous.

→ Be Respectful:

→ Respect Privacy: As good digital citizens, we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.

→ Respect Diversity: In a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.

→Be Responsible:

→ Avoid Cyber Bullying: Any insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information, sexual harassment or comments aimed to publicly ridicule a victim is termed as cyber bullying.

→ Don’t Feed the Troll: An internet troll is a person who deliberately sows discord on the internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community, just for amusement.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Communication Etiquettes: Digital communication includes email, texting, instant messaging, talking on the cell phone, audio or video conferencing, posting on forums, social networking sites, etc.

→ Be Precise:

→ Respect Time: We should not waste precious time in responding to unnecessary emails or comments unless they have some relevance for us.

→ Respect Data Limits: For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, etc.

→ Be Polite: Whether the comm unication is synchronous (happening in real time like chat, audio/video calls) or asynchronous(like email, forum post or comments), we should be polite and non- aggressive in our communication.

→ Be Credible: We should be cautious while making a comment, replying or writing an email or forum post as such acts decide our credibility over a period of time.

→ Social Media Etiquettes: Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures.

→ Be Secure:

  • Choose password wisely: It is vital for social network users. News of breaching or leakage of user data from social network often attracts headlines. Never share personal credentials like username and password with others.
  • Know who you befriend: We need to be careful white befriending unknown people as their intentions possibly could be malicious and unsafe.
  • Beware of fake information: We should apply our knowledge and experience to validate such news, message or post.

→ Be Reliable:

  • Think before uploading: We need to be cautious while uploading or sending sensitive or confidential files which have a bearing on our privacy.

→ Data Protection: In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Intellectual Property Right (IPR): These are the rights of the owner of information to decide how much information is to be exchanged, shared or distributed. Also, it gives the owner a right to decide the price for doing so. Intellectual Property is legally protected through copyrights, patents, trademarks, etc.

→ Copyright: Copyright grants legal rights to creators for their original works like writing, photograph, audio recordings, video, sculptures, architectural works, computer software, and other creative works like literary and artistic work.

→ Patent: A patent is usually granted for inventions. Unlike copyright, the inventor needs to apply (file) for patenting the
invention. When a patent is granted, the owner gets an exclusive right to prevent others from using, selling,or distributing the protected invention.

→ Trademark: Trademark includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.

→ Licensing: Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material.

→ Violation of IPR: Violation of intellectual property right may happen in one of the following ways:

→ Plagiarism: It means using other’s work and not giving adequate citation for use.

→ Copyright Infringement: It means using another person’s work, without permission or without paying for it, if it is being sold.

→ Trademark Infringement: It means unauthorised use of other’s trademark on products and services. An owner of a trademark may commence legal proceedings against someone who infringes its registered trademark.

→ Public Access and Open Source Software: Open source licenses help others to contribute to existing work or project without seeking special individual permission to do so. The GNU General Public License (GPL) and the Creative Commons (CC) are two popular categories of public licenses.

→ GPL: It is the most widely used free software license which grants the recipients, rights to copy, modify and redistribute the software and that the same rights are preserved in all derivative works.

→ CC Licenses: It is a set of copyright licenses that give the recipients, rights to copy, modify and redistribute the creative material, but giving the authors, the liberty to decide the conditions of licensing.

→ Cybercrime: It is defined as a crime in which computer is the medium of crime (hacking, phishing, spamming), or the computer is used as a tool to commit crimes (extortion, data breaches, theft).

→Hacking: It is the act of unauthorised access to a computer, computer network or any digital system. Hackers usually have technical expertise of the hardware and software. They look for bugs to exploit and break into the system.

→ Ethical Hacker: Hacking, when done with a positive intent, is called Ethical Hacking. Such ethical hackers are known as white hat hackers. They are specialists in exploring any vulnerability or loophole by during testing of the software.

→ Non-ethical Hacker: A non-ethical hacker is the one who tries to gain unauthorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems. They are called black hat hackers or crackers.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Phishing: It is an unlawful activity where fake websites ore mails that look original or authentic are presented to the user to fraudulently collect sensitive and personal details, particularly usernames, passwords, banking and credit card details.

→ Identity Theft: Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully.
Given below are a few examples:

→ Financial Identity Theft: When the stolen identity is used for financial gain.

→ Criminal Identity Theft: Criminals use a victim’s stolen identity to avoid detection of their true identity.

→ Medical Identity Theft: Criminals can seek medical drugs or treatment using a stolen identity.

→ RansomwareiThis is another kind of cyber-crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data. The attacker blackmails the victim to pay for getting access to the data, or sometimes threatens to publish personal and sensitive information or photographs unless a ransom is paid.

→ Combatting and Preventing Cybercrime: Following points can be considered as safety measures to reduce the risk of cybercrime:

→ Take regular backup of important data.

→ Use an antivirus software and keep it updated always.

→ Avoid installing pirated software. Always download software from known and secure (HTTPS) sites.

→ Always update the system software which include the internet browser and other application software.

→ Do not visit or download anything from untrusted websites.

→ Digital Signatures: They are the digital equivalent of a paper
certificate. Digital signatures work on a unique digital ID issued by a Certificate Authority (CA) to the user. Signing a document digitally means attaching that user’s identify, which can be used to authenticate. .

→ Indian Information Technology Act (IT Act): The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive information.

→ E-waste-Hazards and Management: E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of their useful life.

→ Leaching: It is the process of removing a substance from another substance by passing water through it.

→ Management of E-waste: E-waste management is the efficient disposal of E-waste. Some of the feasible methods of E-waste management are reduce, reuse and recycle:

→ Reduce: We should try to reduce the generation of e-waste by purchasing the electronic or electrical devices only according to our need.

→ Reuse: It is the process of re-using the electronic or electric waste after slight modification. The process of re-selling old electronic goods at lower prices is called refurbishing.

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection

→ Recycle: Recycling is the process of conversion of electronic devices into something that can be used again and again in some or the other manner.

→ E-waste Management in India: In India, the Environmental Protection Act, 1986, has been enacted to punish people responsible for causing any form of pollution by paying for the damage done to the natural environment.

MCQ Questions for Class 12 Informatics Practices with Answers

Class 12 Informatics Practices Notes – Societal Impacts and Data Protection Read More »

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Societal Impacts and Data Protection Class 12 MCQ Questions Part 3

Question 1.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 2.

………is a secure technique to protect data being transmitted over a network.

(a) E-commerce
(b) Encryption
(c) Plagiarism
(d) Digital property
Answer:
(b) Encryption

Question 3.

…….. is a form of electronic signature that authenticates a document or transaction through encryption and password.

(a) Patent
(b) Security certificate
(c) Digital signature
(d) Integrity
Answer:
(c) Digital signature

Question 4.

…….. is1 also a unique digital identification that is used to verify the identity of an individual website or user.

(a) Security certificate
(b) Patent
(c) Digital signature
(d) None of these
Answer:
(a) Security certificate

Question 5.

What is the full form of SSL?

(a) Secure Session Layer
(b) Session Secure Layer
(c) Secure Socket Layer
(d) Socket Session Layer
Answer:
(c) Secure Socket Layer

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 6.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of these
Answer:
(d) All of these

Question 7.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 8.

Digital property includes

(a) digital documents
(b) audio files
(c) video files
(d) All of these
Answer:
(d) All of these

Question 9.

A/An …. for computer software and other products allows the source code to be used, modified or shared.

(a) digital signature
(b) patent
(c) open source software
(d) None of these
Answer:
(c) open source software

Question 10.

A……..is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

(a) free software licence
(b) copyright
(c) open source software
(d) patent
Answer:
(a) free software licence

Question 11.

What does a free software licence provide to the receiver of software?

(a) Provides no rights
(b) Right to use, modify or redistribute
(c) Receiver becomes the owner
(d) Full copyrights of software
Answer:
(b) Right to use, modify or redistribute

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 12.

To what kind of a society digital unite refers?

(a) Everyone is skilled
(b) No one is skilled
(c) Only half the society is skilled .
(d) Only rural areas have the Internet
Answer:
(a) Everyone is skilled

Question 13.

……. are the etiquettes that are to be followed while communicating online.

(a) Digital signature
(b) Patent
(c) Digital unite
(d) Netquettes
Answer:
(d) Netiquettes

Question 14.

………… refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.

(a) Digital union
(b) Electronic unite
(c) Digital unite
(d) Digital divide
Answer:
(c) Digital unite

Question 15.

After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cybercrime?

(a) Hacking
(b) Identity theft
(c) Cyber bullying
(d) Plagiarism
Answer:
(b) Identity theft
Identity theft means obtaining someone’s credentials to commit some online fraud.

Question 16.

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?

(a) You sent an email to your friend with a message saying that “I am sorry”.
(b) You sent a threatening message to your friend saying ‘”Do not try to call or talk to me”.
(c) You created an embarrassing picture of your friend and • uploaded on your account on a social networking site.
(d) None of the above
Answer:
(a) you sent an email to your friend with a message saying that ”1 am sorry”.

Question 17.

You are planning to go for a vacation. You surfed the internet to get answers for the following Question ueries:

(a) Weather conditions
(b) Availability of air tickets and fares
(c) Places to visit
(d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
(a) a and b
(b) a, b and c
(c) a, c and d
(d) All of these
Answer:
(d) All of these

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 18.

Describe why it is important to secure your wireless router at home. Search the internet to find the rules to create a reasonably secure password Create an imaginary password for your home router. Will you share your password for home router with following people?

(a) Parents
(b) Friends
(c) Neighbours
(d) Home tutors
Answer:
(a) Parents
WiFi router security is important otherwise any one can use our WiFi to commit fraud or cybercrimes. We shall share the password with parents only.

Question 19.

……….is a type of software designed to help the user’s computer detect viruses and avoid them.

(a) Malware
(b) Adware
(c) Antivi
(d) Both b and c
Answer:
(c) Antivirus
An antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user’s computer, it can be easily removed by scanning the entire system with antivirus help.

Question 20.

Which one of the following is a type of antivirus program?

(a) Question uick heal
(b) Mcafee
(c) Kaspersky
(d) All of these
Answer:
(d) All of these
Antivirus is a kind of software program that helps to detect and remove viruses form the user’s computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Question uick Heal, Norton etc., so the correct answer is D.

Question 21.

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, et(c) it is known as the

(a) Antivirus
(b) Firewall
(c) Cookies
(d) Malware .
Answer:
(b) Firewall
There are two types of firewalls – software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user’s system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses. •

Question 22.

Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?

(a) Piracy
(b) Plagiarism
(c) Intellectual property rights
(d) All of the above
Answer:
(d) All of the above
The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

Question 23.

Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform?

(a) Cyber law
(b) Cyberethics
(c) Cybersecurity
(d) Cybersafety
Answer:
(b) Cyberethics
Cyber Ethics refers to exploring the appropriate, ethical behaviours related to online environments and digital media.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 24.

Which of the following refers to the violation of the principle if a computer is no more accessible?

(a) Access control
(b) Confidentiality
(c) Availability
(d) All of these
Answer:
(c) Availability .
Availability refers to the violation of principle, if the system is no more accessible.

Question 25.

Which one of the following refers to the techniQuestion ue used for verifying the integrity of the message?

(a) Digital signature
(b) Decryption algorithm
(c) Protocol
(d) Message digest
Answer:
(d) Message digest
Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formul(a) It is also known as a type of techniQuestion ue used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is (d)

Question 26.

Which one of the following usually used in the process of Wi-Fi-hacking?

(a) Aircrack-ng
(b) Wireshark
(c) Norton
(d) All of these
Answer:
(a) Aircrack-ng
The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali et(c) it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

Question 27.

Which of the following port and IP address scanner famous among the users?

(a) Cain and Abel
(b) Angry IP Scanner
(c) Snort
(d) Ettercap
Answer:
(b) Angry IP Scanner
Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

Question 28.

In ethical hacking and cyber security, there are …….. types of scanning.

(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(c) 3
There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

Question 29.

Which of the following is not a type of scanning?

(a) Xmas Tree Scan
(b) Cloud scan
(c) Null Scan
(d) SYN Stealth
Answer:
(b) Cloud scan
Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 30.

In system hacking, which of the following is the most crucial activity?

(a) Information gathering
(b) Covering tracks
(c) Cracking passwords
(d) None of these
Answer:
(c) Cracking passwords
While trying to hack a system, the most important thing is cracking the passwords.

Question 31.

Which one of the following is actually considered as the first computer virus?

(a) Sasser
(b) Blaster
(c) Creeper
(d) Both a and c
Answer:
(c) Creeper
The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

Question 32.

To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system.

(a) Antivirus
(b) Firewall
(c) Vic player
(d) Script
Answer:
(b) Firewall
It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software from unknown sources. We can also consider it the first line of defense of the computer system.

Question 33.

Code Red is a type of ……….

(a) an antivirus program
(b) a photo editing software
(c) a computer virus
(d) a video editing software
Answer:
(c) a computer virus
Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

Question 34.

Which of the following can be considered as the elements of cyber security?

(a) Application security
(b) Operational security
(c) Network security
(d) All of these
Answer:
(d) All of these
Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

Question 35.

Which of the following are famous and common cyberattacks used by hackers to infiltrate the user’s system?

(a) DDos and Derive-by Downloads
(b) Malware & Malvertising
(c) Phishing and Password attacks
(d) All of the above
Answer:
(a) DDos and Derive-by Downloads
DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.

Question 36.

Which one of the following is also referred to as malicious software?

(a) Maliciousware
(b) Badware
(c) Ilegalware
(d) Malware
Answer:
(d) Malware .
Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 37.

In Wi-Fi Security, which of the following protocol is more used?

(a) WPA
(b) WPA2
(c) WPS
(d) Both a and c
Answer:
(b) WPA2
Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WP(a) It is also known as the upgraded version of the WPA protocol.

Question 38.

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?

(a) Reliability
(b) Performance
(c) Security
(d) Longevity
Answer:
(b) Performance
When the numbers of users on a network get increased and exceed the network’s limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

Question 39.

General Accepted standards of right and wrong in a society is called as

(a) Moral
(b) Ethics
(c) Guideline
(d) Code of standard
Answer:
(a) Moral

Question 40.

….. is a criterion used to decide what is right or wrong.

(a) Moral standard
(b) Moral principle
(c) Moral
(d) Ethics
Answer:
(a) Moral standard

Question 41.

…….. indicates rules and regulations to be obeyed in the organisation.

(a) Ethics
(b) Law
(c) Moral
(d) Privacy
Answer:
(b) Law

Question 42.

Code of ethics do not includes

(a) software Piracy
(b) fair treatment
(c) communication
(d) co-operation
Answer:
(a) software Piracy

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 43.

……….. provides norms and principles to the computer users and system professionals.

(a) Code of ethics
(b) Guidelines
(c) Privacy
(d) Security
Answer:
(a) Code of ethics

Question 44.

To make the exact copy of a program is termed as

(a) Copyright
(b) Software privacy
(c) Fair use
(d) Law
Answer:
(b) Software privacy

Question 45.

The use of invasive software such as destructs the computer system.

(a) Unselect
(b) Worms’s
(c) Microbes
(d) Bacteria
Answer:
(b) Worms’s

Question 46.

When a software is pirated, it harmes

(a) management
(b) operator
(c) people
(d) software developers
Answer:
(d) software developers

Question 47.

Accessing data without permission is known as…….

(a) Unauthorized access
(b) Legal access
(c) Without permission
(d) With permission
Answer:
(a) Unauthorized access

Question 48.

provides Legal recognition of tranaction carried out by means of eletronic commerce.

(a) IT act
(b) Cyber crime
(c) Cyber law
(d) Fair use
Answer:
(c) Cyber law

Question 49.

…… ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.

(a) Digital signature
(b) Coded signature
(c) Double signature
(d) Simple signature
Answer:
(a) Digital signature

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 50.

…….. refers to all the legal and regulatory aspects of internet and world wide web.

(a) Cyber crime
(b) Cyber law
(c) IT act
(d) Code of standard
Answer:
(b) Cyber law

Question 51.

…….. detects and prevents known viruses which weakens the computer.

(a) Web browser
(b) Email
(c) Record
(d) Anti-virus
Answer:
(d) Anti-virus

Question 52.

license allows for installation of a program on a software.

(a) Single user
(b) Network
(c) Site
(d) Lab pack
Answer:
(b) Network

Question 53.

……… means a representation of information, knowledge, facts, concepts or instructions,

(a) Data
(b) Signature
(c) Access
(d) Program
Answer:
(a) Data

Question 54.

……. means the official Gazette published in the electronic form.

(a) Electronic gazette
(b) Electronic record
(c) Electronic form
(d) All of these
Answer:
(a) Electronic gazette

Question 55.

………key means the key of a key pair used to create a digital signature.

(a) Private
(b) Public
(c) Both a and b
(d) Security key
Answer:
(a) Private

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 56.

The legal and regulatory accepts of internet refers to

(a) cyber law
(b) cyber crime
(c) criminal law
(d) IT act
Answer:
(a) cyber law

Question 57.

Cyber law is contained in

(a) IT Act, 2000
(b) Negotiable Instrument Act
(c) Power of Attorney
(d) Code of ethics
Answer:
(a) IT Act, 2000

Question 58.

……… include data, text, image, sound, voice, codes, computer programs, software and database.

(a) Data
(b) Information
(c) Function
(d) Process
Answer:
(b) Information

Question 59.

To maintain confidentiality of data and to promote integration of data is called as

(a) Security
(b) Privacy
(c) Liability
(d) Accountability
Answer:
(b) Privacy

Question 60.

Copyright is……….

(a) an intelectual property right attached to original works in which the right subsist with him
(b) individuals right to access the information
(c) right of information
(d) that is not cop(yrightrd software
Answer:
(a) an intelectual property right attached to original works in which the right subsist with him

Question 61.

……… software allows for anyone to use, copy and distribute it with modifications free of cost.

(a) Freeware
(b) Shareware
(c) Public domain
(d) Non-freeware
Answer:
(a) Freeware

Question 62.

Software available on Internetare

(a) freeware
(b) shareware
(c) public domain
(d) None of these
Answer:
(c) public domain

Question 63.

……….. is a distribution method to judge the software whether it is good or bad before you pay for it.

(a) Shareware
(b) Freeware
(c) Non-freeware software
(d) Public domain software
Answer:
(b) Freeware

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 64.

……… is a discipline that deals with issues in copyright, trademark and patent laws.

(a) Cyber law
(b) IT Act
(c) Cyber crime
(d) Intellectual Property Rights
Answer:
(a) Cyber law

Question 65.

…….. laws grant the creator the exclusive rights to reproduce, perform, distribute and display the work publicly.

(a) Copyright
(b) Cyber law
(c) Pair issue
(d) Cyber crime
Answer:
(a) Copyright

Question 66.

……..gives the protection to original work.

(a) Access
(b) Address
(c) Users
(d) Copyright
Answer:
(d) Copyright

Question 67.

………. is a leagal use of copyrighted material without explicit permission from the copyrighted holder.

(a) Copyright
(b) Fair use
(c) Unauthorized access
(d) Property right
Answer:
(b) Fair use

Question 68.

Which of the following is not a type of cybercrime?

(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
Answer:
(d) Installing antivirus for protection

Question 69.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 70.

……. is the verbatim transcription of a section of someone else work, without making any changes in original work.

(a) Minimal plagiarism
(b) Mosaic
(c) Direct or complete plagiarism
(d) None of the above
Answer:
(c) Direct or complete plagiarism

Question 71.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 72.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 73.

Using…….. encrypted data is decrypted.

(a) digital certificate
(b) key
(c) firewall
(d) digital certification
Answer:
(b) key

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 74.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices with Answers

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3 Read More »

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Societal Impacts and Data Protection Class 12 MCQ Questions

Case Study 1

Smridh has recently changed his school so he is not aware of the people, but someone is posting negative, demeaning comments on his social media profile. He is also getting repeated mails from unknown people. Everytime he goes online, he finds someone chasing him online.

(a) Smridh is a victim of…………..

(i) eavesdropping
(ii) stolen identity
(iii) phishing
(iv) cyber stalking
Answer:
(iv) cyber stalking

(b) The action that Smridh should take:

(i) he should only share with his friends.
(ii) he should not share with anyone as it can cause serious problem.
(iii) he should immediately report to the police.
(iv) he should bring to the notice of his parents and school authorities.
Answer:
(iv) he should bring to the notice of his parents and school authorities.

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(c) ………. is a set of moral principles that governs the behaviour of a group or individual and regulates the use of computers.

(i) Copyright
(ii) Computer ethics
(iii) Property rights
(iv) Privacy law
Answer:
(ii) Computer ethics

(d) Smridh needs to protect his personal information or data from unintentional and intentional attacks and disclosure which is termed as …………

(i) Digital right
(ii) Copyright
(iii) Privacy
(iv) Intellectual property
Answer:
(iii) Privacy

(e) The act of fraudulently acquiring someone’s personal and private information, such as online account names, login information and passwords is called as…………

(i) Phishing
(ii) Fraud
(iii) Scam
(iv) Plagiarism
Answer:
(i) Phishing

Case Study 2

The school offers Wi-Fi to the students of Class XII. For communication, the network security-staff of the school is having a registered URL “schoolwifi.edu”. On 17th September 2017, emails were received by all the students regarding expiry of their passwords. Instructions were also given renew their password within 24 hours by clicking on particular URL provided. On the bases of the above case study, answer the questions given below:

(a) Specify which type of cybercrime is it?

(i) Spamming
(ii) Phishing
(iii) Identity theft
(iv) Hacking

(b) URL stands for……………

(i) Universal Resource Loader
(ii) Uniform Resource Locator
(iii) United Research Loader
(iv) Uniform Resource Loader
Answer:
(ii) Uniform Resource Locator

(c) Unsolicited commercial email is known as:

(i) Malware
(ii) Virus
(iii) Spam
(iv) Spyware
Answer:
(iii) Spam

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(d) WiFi stands for…….

(i) Wireless Internet Frequent Interface
(ii) Wireless Functioning
(iii) Wireless Fidelity
(iv) Wire Free Internet
Answer:
(iii) Wireless Fidelity

(e) Ideally, what characters should be used in a password to make it strong?

(i) Letters and numbers only
(ii) Mixed Case (Upper and Lower)
(iii) Special characters
(iv) All of the above
Answer:
(iv) All of the above

Case Study 3

Sumit has to prepare a project on “Swachh Bharat Shreshth Bharat”. He decides to get information from the internet. He downloads three webpages (webpagel, webpage 2, webpage 3) containing information on the given topic.

1. He read a paragraph on from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project.
2. He downloaded three images of from webpage 2. He made a collage for his project using these images.
3. He also downloaded an icon from webpage 3 and pasted it on the front page of his project report. .

(a) Stepl an example of ………

(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(ii) paraphrasing

(b) Step 2 an act of……….

(i) plagiarism
(ii) copyright infringement
(iii) intellectual property right
(iv) digital footprints
Answer:
(i) plagiarism

(c) Step 3 an act of…….

(i) plagiarism
(ii) paraphrasing
(iii) copyright infringement
(iv) intellectual property right
Answer:
(iii) copyright infringement

(d) A website is a collection of……..

(i) web servers
(ii) webpages
(iii) browsers
(iv) hyperlinks
Answer:
(ii) webpages

(e) The process of getting webpages, images and files from a web server to local computer is called:

(i) FTP
(ii) Uploading
(iii) Downloading
(iv) Remote access
Answer:
(iii) Downloading

Case Study 4

Cyber ethics in E-Commerce: The branch of ICT that allows selling or buying things online, is known as e-commerce.The process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce. It is generally regarded as the sales and commercial function of e-business. Now, many businesses are running online with the help of the Internet, and a substantial increase has been observed in the level of trade and business conducted electronically. E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management, Internet marketing, online transaction processing, Electronic Data Interchange (EDI), etc.

(a) Which of the following describes e-commerce?

(i) Doing business electronically
(ii) Buying goods only
(iii) Sale of goods only
(iv) All of the above
Answer:
(i) Doing business electronically

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(b) E-Commerce stands for:

(i) Electronic Commerce
(ii) Electronic Data Exchange
(iii) Electric Data Exchange
(iv) Electronic Commercialisation
Answer:
(i) Electronic Commerce

(c) Legal recognition for transactions are carried out by:

(i) electronic data interchange
(ii) electronic data exchange
(iii) electronic data transfer
(iv) electrical data interchange
Answer:
(i) electronic data interchange

(d) Which of the following is related to cyberethics?

(i) Ethics in the online environment
(ii) Online gaming
(iii) Ethics at school
(iv) Telecommunications

(e) Selling or buying stuff online, is known as………..

(i) E-commerce
(ii) Plagiarism
(iii) Digital property
(iv) Authenticity
Answer:
(i) E-commerce

Case Study 5

Requirements for Safe E-Commerce Transactions: In addition to the benefits gained from the e-commerce branch of ICT, there are many security concerns and other issues that prevent people to take its maximum benefits. Security is an essential part of any electronic transaction that takes place over the Internet. Clients will lose their faith in e-business if its security is compromised. At the time of buying some objects online, we are generally asked to enter our personal information such as name, delivery address (house address), credit card or debit card details, etc. Information should not be hampered or changed during its transmission over the network. Information should be encrypted and decrypted only by the authorised user. As e-commerce is a crucial branch of ICT, the information required for completing a transaction should be available on time. Delay in the availability of information may incur loss in business. Authenticity is an important requisite of e-commerce. Only authorised persons should be allowed to gain access to information. Otherwise, unauthorised persons may steal and misuse the information.

(a) Unauthorised user cannot read the data in the………security aspect.

(i) confidentiality
(ii) integrity
(iii) authorisation
(iv) non-repudiation
Answer:
(i) confidentiality

(b) In………….data is transferred in coded form.

(i) encryption
(ii) decryption
(iii) firewall
(iv) digital certification
Answer:
(i) encryption

(c) To convert cipher text to plain text is called

(i) firewall
(ii) digital certificate
(iii) decryption
(iv) virus
Answer:
(iii) decryption

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

(d) Which of the following is a fundamental requisite to ensure safety of personal information?

(i) Confidentiality
(ii) Encryption
(iii) Integrity
(iv) Authenticity
Answer:
(i) Confidentiality

(e) What is a form of electronic signature called?

(i) Certificate
(ii) Encryption
(iii) Password
(iv) Digital signature

Case Study 6

Secure Data Transmission: Secure data transmission means that data/information is not being received or modified by an unauthorised person, over a network, from source to destination. For secure data transmission, we can convert an ‘ actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message.

The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter A’ in the alphabet), each‘B’will be replaced by ‘E’ and similarly, each‘Z’ will be replaced by‘C. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.

(a) Secure data transmission means:

(i) data can be accessed by any unauthorised person during transmission
(ii) data cannot be accessed by any unauthorised person during transmission
(iii) transmission of data
(iv) None of the above
Answer:
(ii) Data cannot be accessed by any unauthorised person during transmission

(b) Which of the following techniques can be used for security of data?

(i) Authentication
(ii) Authorisation
(iii) Encryption
(iv) All of these
Answer:
(iv) All of these

(c) Caesar Cipher is:

(i) used for conversion of the actual message into an encrypted message
(ii) an encryption technique
(iii) Both (i) and (ii)
(iv) None of the above
Answer:
(iii) Both (i) and (ii)

(d) A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?

(i) G5QTZXIV
(ii) G5QTYXIV
(iii) GSXTYXIV
(iv) GSQSYXIV
Answer:
(ii) G5QTYXIV

(e) An encryption algorithm is used to transform a readable message into:

(i) text message
(ii) simple message
(iii) converted message
(iv) encrypted message
Answer:
(iv) encrypted message

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Case Study 7

Some More Ethics in Computing: The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals. In the same manner, ethics in computing or computer ethics is a set’of moral principles which regulate and govern the use of computing and Internet technology. Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. For example, one can easily copy the content available online, but computer ethics suggest that it is not a right practice.

(a) The term ………… refers to the creations of mind, which have both a moral and a commercial value.

(i) patent
(ii) copyright
(iii) intellectual property
(iv) trademark
Answer:
(iii) intellectual property

(b) ………..is a legal document that gives the inventor sole rights to make, sell or use an invention.

(i) Trademark
(ii) Patent
(iii) Copyright
(iv) Intellectual property
Answer:
(ii) Patent

(c) A logo or symbol that is printed on business items to make it exclusive, is known as ………..

(i) Patent
(ii) Copyright
(iii) Trademark
(iv) Intellectual property
Answer:
(iii) Trademark

(d)………….is a right that is granted by law to the creator or inventor for his original work.

(i) Copyright
(ii) Trademark
(iii) Intellectual property
(iv) None of the above
Answer:
(i) Copyright

(e) …………….. may be defined as the act of taking another person writing, conversation, song and passing it off as your own, without citing or crediting original author.

(i) Plagiarism
(ii) Copyright
(iii) Trademark
(iv) Patent
Answer:
(i) Plagiarism

Assertion-Reason Type Questions

Directions: In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Read the statements and choose the correct option.
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
c. (A) is true, but (R) is false.
d. (A) is false, but (R) is true.

Question 1.

Assertion (A): Encryption is a secure technique to protect data being transmitted over a network.
Reason (R): The sender of the information encrypts the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.

Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 2.

Assertion (A): A digital signature is a form of electronic signature that authenticates a document or transaction through encryption and password.
Reason (R): Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).
Question3.

Assertion (A): Session Electronic Transaction is a secure protocol developed by MasterCard and Visa, in collaboration. Reason (R): The term ethics generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.

Answer:
d. (A) is false, but (R) is true.

Question 4.

Assertion (A): Plagiarism, Cyber bullying, Hacking, Phishing, Spamming, Software piracy, Intellectual property rights are some common issues that are governed by computer ethics. Reason (R): Patent refers to the creations of the mind, which have both a moral and a commercial value.

Answer:
c. (A) is true, but (R) is false.

Question 5.

Assertion (A): Patent is a legal document that gives the inventor sole rights to make, sell or use an invention. Reason (R): Intellectual Property (IP) is a right that is granted by law to the creator or inventor for his original work.

Answer:
c. (A) is true, but (R) is false.

Question 6.

Assertion (A): A logo or symbol that is printed on business items to make it exclusive, is known as a trademark. A trademark is valid for seven years and can be renewed after that.
Reason (R): Copyright covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.

Answer:
d. (A) is false, but (R) is true.

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 7.

Assertion (A): In Minimal plagiarism the original work is edited, reframed and reproduced. It is very common in the education field.
Reason (R): Direct or complete plagiarism is the verbatim transcription of a section of someone else’s work, without making any changes in the original work.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 8.

Assertion (A): Digital assets that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users. Reason (R): The owners are the ones who only can decide in what form the assets can be sold, reused, modified, repurposed or applied in any other media other than what the assets were originally meant for.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 9.

Assertion (A): There are many anti-hacking software and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc. Reason (R): These anti-hacking tools prevent attackers from controlling or accessing your software, and therefore, help in protecting digital assets.

Answer:
a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

Question 10.

Assertion (A):Asoftware licence is a document that provides legally binding guidelines for the use and distribution of software.
Reason (R): Open source software licences a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

Answer:
c. (A) is true, but (R) is false.

Question 11.

Assertion (A): Digital unite refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.
Reason (R): The licence must discriminate against any person or group of persons.

Answer:
c. (A) is true, but (R) is false.

Question 12.

Assertion (A): As good digital citizens we have the right to privacy and the freedom of personal expression. At the same time, we have to understand that other digital citizens also have the same rights and freedoms.
Reason (R): In a group or public forum, we should respect the diversity of the people in terms of knowledge, experience, culture and other aspects.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 13.

Assertion (A): Passive digital footprints which includes data that we intentionally submit online. This would include emails we write, or responses or posts we make on different websites or mobile Apps, etc.
Reason (R): Digital footprints are the records and traces individuals’ activities as they use the internet. Digital footprints are permanently stored. It includes websites we visit, emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.

Answer:
d. (A) is false, but (R) is true.

Question 14.

Assertion (A): For concerns related to data and bandwidth, very large attachments may be avoided. Rather send compressed files or link of the files through cloud shared storage like Google Drive, Microsoft OneDrive, etc.
Reason (R): Social media are websites or applications that enable their users to participate in social networking by creating and sharing content with others in the community. These platforms encourage users to share their thoughts and experiences through posts or pictures.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection

Question 15.

Assertion (A): In this digital age, data or information protection is mainly about the privacy of data stored digitally. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called sensitive data.
Reason (R): Identity thieves increasingly use personal information stolen from computers or computer networks, to commit fraud by using the data gained unlawfully.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

Question 16.

Assertion (A): Licensing is the legal term used to describe the terms under which people are allowed to use the copyrighted material.
Reason (R): Patent includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand or commercial enterprise, from other brands or commercial enterprises.

Answer:
c. (A) is true, but (R) is false.

Question 17.

Assertion (A): The Government of India’s The Information Technology Act, 2000 (also known as IT Act), amended in 2008, and provides guidelines to the user on the processing, storage and transmission of sensitive information.
Reason (R): E-waste or Electronic waste includes electric or electronic gadgets and devices that are no longer in use. Hence, discarded computers, laptops, mobile phones, televisions, tablets, music systems, speakers, printers, scanners, etc. constitute e-waste when they are near or end of their useful life.

Answer:
b. Both (A) and (R) are true, but (R) is not correct explanation of (A).

MCQ Questions for Class 12 Informatics Practices with Answers

Case Based MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Read More »

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Societal Impacts and Data Protection Class 12 MCQ Questions Part 2

Question 1.

It is okay to copy and paste information from the internet into your report then organise it.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 2.

Shareware software allows you to try the software before you buy it.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 3.

Freeware is copyrighted software that is freely available to use:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 4.

Cyber-laws are incorporated for punishing all types of criminals only:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 5.

Deceptively attempting to acquire sensitive information of someone else using online means, is a cybercrime:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 6.

Freeware and free software mean the same thing.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 7.

Excessive use of internet and social media is termed as a disorder.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 8.

Digital footprint can be deleted.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 9.

Digital footprint remains forever.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 10.

It is safe to make all one posts public on social media.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 11.

Hacking is performed to help find the security loopholes.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 12.

If you post something mean about someone, you can just delete it and your activity will be undone.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 13.

Hacking is a cybercrime.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 14.

Copyright is the right of the creator of creative/artistic work.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 15.

Computer viruses are healthy codes/programs written to test the security health of a system.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 16.

A worm is a self-replicating program.

(a) True
(b) False
(c) Error
d.None of these
Answer:
(a) True

Question 17.

A Trojan horse is a utility program that does harm when its date gets expired.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 18.

Spyware is healthy software which keeps an eye.of activities happening on your computer.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 19.

Adware are the programs that deliver unwanted ads to your computer.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 20.

Malware is a special type of virus.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 21.

Spamming refers to the sending of bulk-mail by an identified or unidentified source.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 22.

Phishing involves authentic looking sites trying to collect your sensitive transactional and identity information.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 23.

To keep a computer protected, one should use updated software, be cautious while handling mails and surfing internet, scanning computer regularly, etc.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 24.

Firewall can be implemented in software as well as in hardware.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 25.

Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?

(a) Inform Garvit so that he may change his password.
(b) Give the password of Garvit’s e-mail ID to all other classmates.
(c) Use Garvit’s password to access his account.
(d) None of the above
Answer:
(a) Inform Garvit so that he may change his password.

Question 26.

Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enQuestion uired about the computer class. She also reQuestion uested him to explain the concept. Shaurya said, “Mam taught u show to use tuples in python”. Further, he generously said, “Give me sometime, I will email you the material which will help you to understand tuples in python”. Shaurya Question uickly downloaded a 2-minute clip from the internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana.This act of Shaurya is an example of:

(a) fair use
(b) hacking
(c) copyright infringement
(d) cybercrime
Answer:
(c) copyright infringement

Question 27.

What are computer ethics?

(a) An honest, moral code that should be followed when on the computer
(b) A computer program about honesty
(c) A computer that fits on or under a desk
(d) A list of commandments in the Bible
Answer:
(a) An honest, moral code that should be followed when on • the computer

Question 28.

……. are the ethics, or the moral principles, applied to the online environment.

(a) E-commerce
(b) E-shopping
(c) Cyberethics
(d) Cyberbuling
Answer:
(c) Cyberethics

Question 29.

In this modern age, users have easy access to large volumes of information available

(a) anytime
(b) anywhere
(c) almost for anybody
(d) All of these
Answer:
(d) All of these

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 30.

The branch of ICT that allows selling or buying things online, is known as

(a) E-commerce
(b) E-shopping
(c) E-learning
(d) E-reservation
Answer:
(a) E-commerce
The process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce.

Question 31.

EDI stands for

(a) Effective Data Interchange
(b) Electrical Data Interchange
(c) Electronic Data Interchange
(d) None of the above
Answer:
(c) Electronic Data Interchange

Question 32.

ICT stands for

(a) Informatics and Communication Technology
(b) Information and Communication Trade
(c) Information and Commerce Technology
(d) Information and Communication Technologies
Answer:
(d) Information and Communication Technologies

Question 33.

E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management etc.

(a) Internet marketing
(b) online transaction processing,
(c) Electronic data interchange (EDI)
(d) All of the above
Answer:
(d) All of the above

Question 34.

………. is an essential part of any electronic transaction that takes place over the Internet.

(a) Security
(b) Networking
(c) Communication
(d) Password
Answer:
(a) Security

Question 35.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 36.

………. are the fundamental requisites that ensure safe electronic transactions and payments.

(a) Confidentiality, integrity
(b) Encryption, availability
(c) Authenticity
(d) All of the above
Answer:
(d) All of the above

Question 37.

…… is a secure technique to protect data being transmitted over a network.

(a) E-commerce
(b) Encryption
(c) Plagiarism
(d) Digital property
Answer:
(b) Encryption

Question 38.

Such information should be kept ……..and not be accessible by any unauthorised person.

(a) confidential
(b) integrity
(c) encryption
(d) Available
Answer:
(a) confidential

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 39.

When you use the word……it means you are protecting your data from getting disclosed.

(a) confidentiality
(b) integrity
(c) authentication
(d) availability
Answer:
(a) confidentiality
Confidentiality is what every individual prefer in terms of physical privacy as well as digital privacy. This term means our information needs to be protected from getting disclose to unauthorised parties, for which we use different security mechanisms like password protection, biometric security, OTPs (One Time Passwords) etc.

Question 40.

……. means the protection of data from modification by unknown users.

(a) Confidentiality
(b) Integrity
(c) Authentication
(d) Non-repudiation
Answer:
(b) Integrity
A information only seems valuable if it is correct and do not get modified during its journey in the course of arrival. The element integrity makes sure that the data sent or generated from other end is correct and is not modified by any unauthorised party in between.

Question 41.

When integrity is lacking in a security system, occurs.

(a) database hacking
(b) data deletion
(c) data tampering
(d) data leakage
Answer:
(c) data tampering
The term data tampering is used when integrity is ‘ compromised in any security model and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an authorised person and in between a Man in the Middle (MiTM) attack takes place and the value has tampered to $500. This is how integrity is compromised.

Question 42.

………. of information means, only authorised users are capable of accessing the information.

(a) Confidentiality
(b) Integrity
(c) Non-repudiation
(d) Availability
Answer:
(d) Availability
Information seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 43.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

(a) They help understanding hacking better
(b) They are key elements to a security breach
(c) They help understands security and its components better
(d) They help to understand the cyber-crime better
Answer:
(c) They help understands security and its components better The four elements of security viz. confidentiality, integrity, authenticity & availability helps in better understanding the pillars of security and its different components.

Question 44.

This helps in identifying the origin of information and authentic user. This referred to here as

(a) confidentiality
(b) integrity
(c) authenticity
(d) availability
Answer:
(c) authenticity
The key element, authenticity helps in assuring the fact that the information is from the original source.

Question 45.

Data ……..is used to ensure confidentiality.

(a) encryption
(b) locking
(c) deleting
(d) backup
Answer:
(a) encryption
Data encryption is the method of converting plain text to cipher-text and only authorised users can decrypt the message back to plain text. This preserves the confidentiality of data.

Question 46.

Which of these is not a proper method of maintaining confidentiality?

(a) Biometric verification
(b) ID and password based verification
(c) 2-factor authentication
(d) switching off the phone
Answer:
(d) switching off the phone
Switching off the phone in the fear of preserving the confidentiality of data is not a proper solution for data confidentiality. Fingerprint detection, face recognition, password-based authentication, two-step verifications are some of these.

Question 47.

Data integrity gets compromised when…….. and …….are taken control off.

(a) access control, file deletion
(b) network, file permission
(c) access control, file permission
(d) network, system
Answer:
(c) access control, file permission
The two key ingredients that need to be kept safe are: access control and file permission in order to preserve data integrity.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 48.

……….is the latest technology that faces an extra challenge because of CIA paradigm.

(a) Big data
(b) Database systems
(c) Cloud storages
(d) 5mart dust
Answer:
(a) Big data
Big data has additional challenges that it has to face because of the tremendous volume of data that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and time-consuming.

Question 49.

One common way to maintain data availability is ……….

(a) data clustering
(b) data backup
(c) data recovery
(d) data Altering
Answer:
(b) data backup
For preventing data from data-loss, or damage data backup can be done and stored in a different geographical location so that it can sustain its data from natural disasters & unpredictable events.

Question 50.

The sender of the information ……… the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.

(a) encrypts
(b) decrypts
(c) Both a and b
(d) None of these
Answer:
(a) encrypts

Question 51.

Encryption is a process of converting plain text or data into………so that the transmitted information cannot be accessed by anyone other than the receiver and the sender.

(a) ciphertext
(b) simple text
(c) encoded text
(d) decrypted text
Answer:
(a) ciphertext

Question 52.

The use of the digital signatures should be encouraged while doing online transactions to ensure the of information.

(a) integrity
(b) availability
(c) confidentiality
(d) authenticity
Answer:
(d) authenticity

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 53.

Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user.

(a) User certificate
(b) Security certificate
(c) Secure certificate
(d) None of these
Answer:
(b) Security certificate

Question 54.

SHTTP stands for

(a) Session Hypertext Transfer Protocol
(b) Socket Hypertext Transfer Protocol
(c) Secure Hypertext Transfer Protocol
(d) None of the above
Answer:
(c) Secure Hypertext Transfer Protocol

Question 55.

Secure electronic transaction is a secure protocol developed requirements in the field of e-commerce.

(a) certificate authority software
(b) merchant software
(c) card holder’s digital wallet
(d) All of the above
Answer:
(d) All of the above

Question 56.

The term generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.

(a) ethics
(b) security
(c) encryption
(d) decryption
Answer:
(a) ethics

Question 57.

………. are some common issues that are governed by computer ethics.

(a) Plagiarism
(b) Cyber bullying
(c) Hacking
(d) All of these
Answer:
(d) All of these

Question 58.

The law grants exclusive rights to a variety of intellectual works such as literary, musical, artistic works and much more.

(a) patent
(b) copyright
(c) intellectual property
(d) None of these
Answer:
(c) intellectual property

Question 59.

A person or a group of persons or an organisation or company can get their invention covered under a …….to protect it from unauthorised use.

(a) patent
(b) copyright
(c) intellectual property
(d) None of these
Answer:
(a) patent
Patent is a legal document that gives the inventor sole rights to make, sell or use an invention.

Question 60.

A trademark is valid for……..years and can be renewed after that.

(a) seven
(b) five
(c) ten
(d) twelve

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2
Answer:
(c) ten
A logo or symbol that is printed on business items to make it exclusive, is known as a trademark.

Question 61.

………. covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.

(a) Patent
(b) Copyright
(c) Intellectual property
(d) None of these
Answer:
(b) Copyright
Copyright is a right that is granted by law to the creator or inventor for his original work. The rights concerning a copy of any product are reserved by the writer or the company that has published the work.

Question 62.

in the original work is edited, reframed and reproduce(d) It is very common in the education field.

(a) minimal plagiarism
(b) direct or complete plagiarism:
(c) mosaic or substantial plagiarism:
(d) None of the above
Answer:
(a) minimal plagiarism

Question 63.

……. that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users.

(a) Electronic assets
(b) Digital assets
(c) E-assets
(d) None of these
Answer:
(b) Digital assets

Question 64.

…………. keeps your software’s source code in safe hands to make sure that no one can obtain it without authorisation.

(a) Digital Rights Management (DRM)
(b) Anti-hacker software
(c) Software escrow ,
(d) None of the above
Answer:
(c) Software escrow

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 65.

controls the use, modification, and distribution of copyrighted works, such as software or other digital products.

(a) Digital Rights Management (DRM)
(b) anti-hacker software
(c) Software escrow .
(d) None of the above
Answer:
(a) Digital Rights Management (DRM)

Question 66.

A…….solution may also protect your software from being accessed for source codes using computer programs like decompilers.

(a) digital rights management
(b) anti-hacker software
(c) software escrow
(d) None of the above
Answer:
(a) digital rights management

Question 67.

There are many ……….. and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc.

(a) digital rights management
(b) anti-hacker software
(c) software escrow
(d) None of the above
Answer:
(b) anti-hacker software

Question 68.

A……….is a document that provides legally binding guidelines for the use and distribution of software.

(a) software licence
(b) document licence
(c) e-licence
(d) None of these
Answer:
(a) software licence

Question 69.

Software licences typically provide end-users with the right to one or more copies of the software without violating

(a) plagiarism
(b) copyrights
(c) trademark
(d) patent
Answer:
(b) copyrights

Question 70.

EULA stands for

(a) End-User Licence Agreement
(b) Electronic-User Licence Agreement
(c) Both a and b
(d) None of the above
Answer:
(a) End-User Licence Agreement

Question 71.

The primary aspect of……..is that a software publisher allows the use of one or more copies of software under the end-user licence agreement (EULA), but ownership of those copies remains with in the software publisher.

(a) publisher software licences
(b) proprietary software licences
(c) public software licences
(d) None of the above
Answer:
(b) proprietary software licences

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 72.

A ………is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

(a) publisher software licences
(b) proprietary software licences
(c) free software licences
(d) open source software licence
Answer:
(c) free software licences

Question 73.

……….. for computer software and other products allows the source code or design to be used, modified and/or shared under defined terms and conditions.

(a) Publisher software licences
(b) Proprietary software licences
(c) Free software licences
(d) Open source Software Licence
Answer:
(d) Open source Software Licence

Question 74.

LGPL stands for

(a) Lower General Public Licence
(b) Lesser General Public Licence
(c) Least General Public Licence
(d) None of the above
Answer:
(b) Lesser General Public Licence

MCQ Questions for Class 12 Informatics Practices with Answers

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2 Read More »

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Societal Impacts and Data Protection Class 12 MCQ Questions Part 1

Question 1.

A software that can be freely accessed and modified is called

(a) Synchronous software
(b) Package software
(c) Open Source software
(d) Middleware
Answer:
(c) Open Source software

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 2.

Data which has no restriction of usage and is freely available to everyone under Intellectual Property Rights is categorised as:

(a) open source
(b) open data
(c) open content
(d) open education
Answer:
(b) open data
Question 3.

Which of the following is an advantage of open source’ software?

(a) You can edit the source code to customise it.
(b) You need to be an expert to edit code.
(c) You have to pay.
(d) Can sometimes be too generic for specialist purposes.
Answer:
(a) You can edit the source code to customise it.

Question 4.

Which of the following is an disadvantage of open source’ software?

(a) High Question uality software with lots of features.
(b) Not as customisable.
(c) May not have been tested as much as proprietary software, so might have bugs.
(d) You can edit the source code to customise it.
Answer:
(c) May not have been tested as much as proprietary software, so might have bugs.

Question 5.

Which of the following is an advantage of ‘proprietary’ software?

(a) It is usually free.
(b) Thoroughly tested because people are paying to use it.
(c) Not as customisable.
(d) Can sometimes be too generic for specialist purposes.
Answer:
(b) Thoroughly tested because people are paying to use it.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 6.

Which of the following is an disadvantage of ‘proprietary’ software?

(a) You need to be an expert to edit code.
(b) You have to pay for this type of software.
(c) It’s licensed.
(d) It is launched after proper testing.
Answer:
(b) You have to pay for this type of software.

Question 7.

The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called

(a) Computer security law
(b) Aggregate information
(c) Copyright law
(d) Data security standards
Answer:
(c) Copyright law

Question 8.

Which of the following would be a creative work protected by copyright?

(a) A list of all Indian President names.
(b) A portrait of your family.
(c) A song you wrote.
(d) The name of your pet dog.
Answer:
(c) A song you wrote.

Question 9.

Which of the following is not a type of cybercrime?

(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
Answer:
(d) Installing antivirus for protection

Question 10.

Which of the following is not done by cyber criminals?

(a) Unauthorised account access.
(b) Mass attack using Trojans as botnets.
(c) Email spoofing and spamming.
(d) Report vulnerability in any system.
Answer:
(d) Report vulnerability in any system. ‘

Question 11.

What is the name of the IT law that India is having in the Indian legislature?

(a) India’s Technology (IT) Act, 2000
(b) India’s Digital Information Technology (DIT) Act, 2000
(c) India’s Information Technology (IT) Act, 2000
(d) The Technology Act, 2008
Answer:
(c) India’s Information Technology (IT) Act, 2000

Question 12.

What is meant by the term ‘cybercrime’?

(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security.
(b) The use of computer networks to commit financial or identity fraud.
(c) The theft of digital information.
(d) Any crime that involves computers and networks.
Answer:
(d) Any crime that involves computers and networks.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 13.

What is an example of e-waste?

(a) A ripened banana
(b) An old computer
(c) Old clothes
(d) Empty soda cans
Answer:
(b) An old computer

Question 14.

An organisation purchases new computers every year and dumps the old ones into the local dumping yar(d) Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options:

(a) solid waste
(b) commercial waste
(c) e-waste
(d) business waste
Answer:
(c) e-waste

Question 15.

A software company purchases new computers every year and discards the old ones into the Local dumping yard Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options:

(a) business waste
(b) commercial waste
(c) solid waste
(d) e-waste
Answer:
(d) e-waste

Question 16.

The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as (IPR).

(a) Intelligent Property Rights
(b) Intellectual Property Rights
(c) Interactive Property Rights
(d) Instance Property Rights
Answer:
(b) Intellectual Property Rights

Question 17.

Stealing someone else’s intellectual work and representing it……. as own, is called

(a) Intellectual steal
(b) Pluckism
(c) Plagiarism
(d) Pickism
Answer:
(c) Plagiarism

Question 18.

The information/art/work that exists in digital form is called

(a) E-work
(b) E-asset
(c) Digital property
(d) E-property
Answer:
(c) Digital property

Question 19.

Every activity you perform on the internet is saved for how long?

(a) One month
(b) One year
(c) As per my setting
(d) Forever
Answer:
(d) Forever

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 20.

The digital trail which gets created as a person’s internet usage using computers, smartphones, gaming consoles etc is called

(a) Internet data (b) Internet trail
(c) Digital footprint (d) E-footprint
Answer:
(c) Digital footprint

Question 21.

Gaining unauthorised access to a network or computer or digital files with malicious intentions, is called

(a) Cracking
(b) Hacking
(c) Banging
(d) Phishing
Answer:
(b) Hacking

Question 22.

Legal term to describe the rights of a creator of original creative or artistic work is called

(a) Copyright
(b) Copyleft
(c) GPL
(d) None of these
Answer:
(a) Copyright

Question 23.

A worm is…………

(a) a slimy pink thing that lives in dirt.
(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.
(c) an unsolicited email message.
(d) None Of the above
Answer:
(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.

Question 24.

If you receive an email claiming to need your username and/ or password, what should you do?

(a) Report it as phishing/spam through your email provider.
(b) Delete the message.
(c) Reply to the message with your email and password
(d) None of the above
Answer:
(a) Report it as phishing/spam through your email provider.

Question 25.

What should your response be if you receive an email stating that you have won a lottery or received some inheritance from an unknown person?

(a) Send them email asking for further procedure.
(b) Ignore it.
(c) Mark it as spam and block it.
(d) None of the above
Answer:
(c) Mark it as spam and block it.

Question 26.

A computer is a malicious code which self- replicates by copying itself to other programs.

(a) program
(b) virus
(c) application
(d) worm
Answer:
(d) worm

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 27.

Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains a damaging code?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(a) Trojans

Question 28.

Which of the following is the type of software that has self- replicating software that causes damage to file and system?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(c) Worm .

Question 29.

Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(d) Adware

Question 30.

What is the broad term covering computer viruses, worms, trojan, adware, etc.?

(a) Malware
(b) Spyware
(c) Worm
(d) Adware
Answer:
(a) Malware

Question 31.

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is

(a) phishing
(b) eavesdropping
(c) scams
(d) PC intrusion
Answer:
(b) eavesdropping

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 32.

Which of the following is/are source of spreading viruses from one computer to another?

(a) Email
(b) Infected data
(c) Infected programs
(d) All of these
Answer:
(d) All of these

Question 33.

……….. are the attempts by individuals to obtain confidential information from you through an original looking site and URL.

(a) Phishing scams
(b) Spoofing
(c) Eavesdropping
(d) Pharming
Answer:
(a) Phishing scams

Question 34.

………… is an attempt where a hacker tries to divert network traffic to a bogus site.

(a) Phishing scams
(b) Spoofing
(c) Eavesdropping
(d) Pharming attack
Answer:
(d) Pharming attack

Question 35.

A research student is expected to write a thesis on a topic The student browses internet for the topic and luckily finds it on the internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer?

(a) Spamming
(b) Phishing
(c) Plagiarism
(d) Trojan
Answer:
(c) Plagiarism

Question 36.

OSS stands for.

(a) Open Science Software
(b) Open Spyware Software
(c) Open Source Software
(d) None of the above
Answer:
(c) Open Source Software

Question 37.

Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a

(a) Fraud
(b) Cyber ethics
(c) Scam
(d) Spam
Answer:
(c) Scam

Question 38.

……… is stealing someone else’s intellectual work …. and representing it as your own without giving credit.

(a) Digital footprint
(b) Plagiarism
(c) Pharming
(d) Phishing
Answer:
(b) Plagiarism

Question 39.

Any work/information that exists in digital form either on internet or on an electronic device, is known as ……… property.

(a) online
(b) e-commerce
(c) documentation
(d) digital
Answer:
(d) digital

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 40.

Discarded electrical or electronic devices are known as ………

(a) E-dust
(b) E-spam
(c) E-waste
(d) None of these
Answer:
(c) E-waste

Question 41.

The least restrictive open source license is …….. license.

(a) IMT
(b) NIT
(c) CIT
(d) MIT
Answer:
(d) MIT .

Question 42.

The original code written by programmers for a software is known as……….

(a) Text code
(b) Encoded code
(c) Source code
(d) All of these
Answer:
(d) Source code

Question 43

………. means no price is to be paid for the software.

(a) Shareware
(b) Crippleware
(c) Opensource
(d) Freeware
Answer:
(d) Freeware

Question 44

…….. means freedom to use the software.

(a) Open source software
(b) Spyware’software
(c) Free software
(d) Malware software
Answer:
(c) Free software

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 45.

I AD means

(a) Internet Addiction Disorder
(b) International Addiction Disorder
(c) Instant Addiction Disorder
(d) All of the above
Answer:
(a) Internet Addiction Disorder

Question 46.

The is the digital trail of your activity on the ……internet.

(a) digital dividend
(b) digital signature
(c) leaching
(d) digital footprint
Answer:
(d) digital footprint

Question 47.

The are the permissions given to use a ……….. product or someone’s creator by the copyright holder.

(a) patent
(b) copyright
(c) licenses
(d) digital footprint
Answer:
(c) licenses

Question 48.

………. is a license that gives rights opposite to copyright.

(a) Copyright
(b) Copyleft
(c) Copytop
(d) Copyheader
Answer:
(b) Copyleft

Question 49.

The practice of taking someone else’s work or ideas and passing them off as one’s own is known as ……….

(a) Digital footprint
(b) Plagiarism
(c) Pharming
(d) Phishing
Answer:
(b) Plagiarism

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 50.

A……..is an injury or disorder to the muscles,

(a) repetitive strain injury
(b) destructive strain injun,’
(c) in-destructive strain injun,’
(d) in-repetitive strain injury
Answer:
(a) repetitive strain injury

Question 51.

…… is a technology related health condition affecting eyesight.

(a) Computer vision syndrome
(b) Computer seeing syndrome
(c) Computer sight syndrome
(d) None of the above
Answer:
(a) Computer vision syndrome

Question 52.

……..is a general term used to refer to viruses, worms, spyware, adware etc

(a) Open source
(b) Spyware
(c) Free software
(d) Malware
Answer:
(d) Malware

Question 53.

A……….is a self-replicating program which eats up the entire disk space or memory.

(a) viruses
(b) spyware
(c) worm
(d) malware
Answer:
(c) worm

Question 54.

……….is a program that appears harmless (such as a text editor or a utility program) but actually performs malicious functions.

(a) Ransomware
(b) Spyware
(c) Worm
(d) Trojan horse
Answer:
(d) Trojan horse

Question 55.

……..is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it.

(a) Ransomware
(b) Spyware
(c) Worm
(d) Trojan horse
Answer:
(b) Spyware

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 56.

……..refers to the sending of bulk-mail by an identified or unidentified source.

(a) Ransomware
(b) Spamming
(c) Phishing
(d) Cyber stalking
Answer:
(b) Spamming

Question 57.

Unauthorised monitoring of the people’s communications is called

(a) Eaves dropping
(b) Spamming
(c) Phishing
(d) Cyber stalking
Answer:
(a) Eaves dropping

Question 58.

A……..is a small piece of data sent from a website and stored in a user’s web browser (in a text file) while a user is browsing a website.

(a) cache
(b) cookies
(c) history
(d) archie
Answer:
(b) cookies

Question 59.

……..is a system designed to prevent unauthorised access to or from a private network.

(a) Hub
(b) Switch
(c) Anitivirus
(d) Firewall
Answer:
(d) Firewall

Question 60.

A mail or message sent to a large number of people indiscriminately without their consent is called

(a) Eaves dropping
(b) Spam
(c) Phishing
(d) Cyber stalking
Answer:
(b) Spam

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 61.

Which of the following is considered as cyber-crime?

(a) Virus attack
(b) Worm attack
(c) Hacking
(d) All of these
Answer:
(d) All of these

Question 62.

The use of internet or other electronic media to harass a person or group of individuals or an organisation is termed as:

(a) Cybernet
(b) Cyber policing
(c) Cyber stalking
(d) Cyber space
Answer:
(c) Cyber stalking

Question 63.

To avoid problems while working with internet you should follow these precautions:

(a) install anti-virus on your computer
(b) take the back-up of your files regularly
(c) do not click on unknown links
(d) All of the above
Answer:(d) All of the above

Question 64.

An unsolicited mail or message indiscriminately sent to a large number of persons without their consent, is called:

(a) Worm
(b) Spam
(c) Trojan
(d) Online marketing
Answer:
(b) Spam

Question 65.

In terms of Information security, acronym CIA stands for:

(a) Central Intelligence Agency
(b) Confidentiality, Integrity and Authentication
(c) Cognitive Intelligent Access
(d) None of the above
Answer:
(b) Confidentiality, Integrity and Authentication

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 66.

A malicious piece of code which copies and appends itself to other files and disk sectors is called as

(a) Computer virus
(b) Computer trojan
(c) Computer worm
(d) Web script
Answer:
(a) Computer virus

Question 67.

A self-replicating computer program which sends copies of itself to other nodes on the computer network without any user intervention is known as

(a) Computer virus
(b) Computer trojan
(c) Computer worm
(d) Web script .
Answer:
(c) Computer worm

Question 68.

A sentinel program which tries to protect computer system from data loss, destruction of system files and attack of any external threat like worms or viruses is called

(a) Virus program
(b) Worm script
(c) Anti-virus program
(d) Spyware
Answer:
(c) Anti-virus program

Question 69.

Radha is an IT manager. Her company has provided a laptop to her so that she can access office emails and work from home. She shared her computer login-id and password with her son and allowed him to install educational computer games. We can say:

(a) it is ok to share the password with her family members.
(b) it is ethical since she is helping her kid in his education.
(c) it is not ethical since laptop is provided to her for business use.
(d) it is alright provided she has taken permission from her employers.
Answer:
(c) it is not ethical since laptop is provided to her forbusiness use.

Question 70.

In terms of network security, ‘DoS’ is termed as:

(a) Disk Operating System
(b) Denial of Service
(c) Distributive Operative Service
(d) Distributed Operating System
Answer:
(b) Denial of 5ervice

Question 71.

A……… is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.

(a) CAPTCHA
(b) HUMAN Intelligence Test
(c) FIREWALL
(d) ANTI-VIRUS
Answer:
(a) CAPTCHA

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 72.

Facebook, Twitter, Myspace, Google+ are examples of:

(a) chat software
(b) web mail application
(c) social networking
(d) network sharing
Answer:
(c) social networking

Question 73.

Out of the following, which one will be altered or modified by a computer virus?

(a) Operating system
(b) Speed of network connectivity
(c) Application software
(d) All of the above
Answer:
(d) All of the above

Question 74.

Open source software can be used for commercial purposes.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices with Answers

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1 Read More »

error: Content is protected !!