MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Societal Impacts and Data Protection Class 12 MCQ Questions Part 1

Question 1.

A software that can be freely accessed and modified is called

(a) Synchronous software
(b) Package software
(c) Open Source software
(d) Middleware
Answer:
(c) Open Source software

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 2.

Data which has no restriction of usage and is freely available to everyone under Intellectual Property Rights is categorised as:

(a) open source
(b) open data
(c) open content
(d) open education
Answer:
(b) open data
Question 3.

Which of the following is an advantage of open source’ software?

(a) You can edit the source code to customise it.
(b) You need to be an expert to edit code.
(c) You have to pay.
(d) Can sometimes be too generic for specialist purposes.
Answer:
(a) You can edit the source code to customise it.

Question 4.

Which of the following is an disadvantage of open source’ software?

(a) High Question uality software with lots of features.
(b) Not as customisable.
(c) May not have been tested as much as proprietary software, so might have bugs.
(d) You can edit the source code to customise it.
Answer:
(c) May not have been tested as much as proprietary software, so might have bugs.

Question 5.

Which of the following is an advantage of ‘proprietary’ software?

(a) It is usually free.
(b) Thoroughly tested because people are paying to use it.
(c) Not as customisable.
(d) Can sometimes be too generic for specialist purposes.
Answer:
(b) Thoroughly tested because people are paying to use it.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 6.

Which of the following is an disadvantage of ‘proprietary’ software?

(a) You need to be an expert to edit code.
(b) You have to pay for this type of software.
(c) It’s licensed.
(d) It is launched after proper testing.
Answer:
(b) You have to pay for this type of software.

Question 7.

The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called

(a) Computer security law
(b) Aggregate information
(c) Copyright law
(d) Data security standards
Answer:
(c) Copyright law

Question 8.

Which of the following would be a creative work protected by copyright?

(a) A list of all Indian President names.
(b) A portrait of your family.
(c) A song you wrote.
(d) The name of your pet dog.
Answer:
(c) A song you wrote.

Question 9.

Which of the following is not a type of cybercrime?

(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
Answer:
(d) Installing antivirus for protection

Question 10.

Which of the following is not done by cyber criminals?

(a) Unauthorised account access.
(b) Mass attack using Trojans as botnets.
(c) Email spoofing and spamming.
(d) Report vulnerability in any system.
Answer:
(d) Report vulnerability in any system. ‘

Question 11.

What is the name of the IT law that India is having in the Indian legislature?

(a) India’s Technology (IT) Act, 2000
(b) India’s Digital Information Technology (DIT) Act, 2000
(c) India’s Information Technology (IT) Act, 2000
(d) The Technology Act, 2008
Answer:
(c) India’s Information Technology (IT) Act, 2000

Question 12.

What is meant by the term ‘cybercrime’?

(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security.
(b) The use of computer networks to commit financial or identity fraud.
(c) The theft of digital information.
(d) Any crime that involves computers and networks.
Answer:
(d) Any crime that involves computers and networks.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 13.

What is an example of e-waste?

(a) A ripened banana
(b) An old computer
(c) Old clothes
(d) Empty soda cans
Answer:
(b) An old computer

Question 14.

An organisation purchases new computers every year and dumps the old ones into the local dumping yar(d) Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options:

(a) solid waste
(b) commercial waste
(c) e-waste
(d) business waste
Answer:
(c) e-waste

Question 15.

A software company purchases new computers every year and discards the old ones into the Local dumping yard Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options:

(a) business waste
(b) commercial waste
(c) solid waste
(d) e-waste
Answer:
(d) e-waste

Question 16.

The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as (IPR).

(a) Intelligent Property Rights
(b) Intellectual Property Rights
(c) Interactive Property Rights
(d) Instance Property Rights
Answer:
(b) Intellectual Property Rights

Question 17.

Stealing someone else’s intellectual work and representing it……. as own, is called

(a) Intellectual steal
(b) Pluckism
(c) Plagiarism
(d) Pickism
Answer:
(c) Plagiarism

Question 18.

The information/art/work that exists in digital form is called

(a) E-work
(b) E-asset
(c) Digital property
(d) E-property
Answer:
(c) Digital property

Question 19.

Every activity you perform on the internet is saved for how long?

(a) One month
(b) One year
(c) As per my setting
(d) Forever
Answer:
(d) Forever

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 20.

The digital trail which gets created as a person’s internet usage using computers, smartphones, gaming consoles etc is called

(a) Internet data (b) Internet trail
(c) Digital footprint (d) E-footprint
Answer:
(c) Digital footprint

Question 21.

Gaining unauthorised access to a network or computer or digital files with malicious intentions, is called

(a) Cracking
(b) Hacking
(c) Banging
(d) Phishing
Answer:
(b) Hacking

Question 22.

Legal term to describe the rights of a creator of original creative or artistic work is called

(a) Copyright
(b) Copyleft
(c) GPL
(d) None of these
Answer:
(a) Copyright

Question 23.

A worm is…………

(a) a slimy pink thing that lives in dirt.
(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.
(c) an unsolicited email message.
(d) None Of the above
Answer:
(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.

Question 24.

If you receive an email claiming to need your username and/ or password, what should you do?

(a) Report it as phishing/spam through your email provider.
(b) Delete the message.
(c) Reply to the message with your email and password
(d) None of the above
Answer:
(a) Report it as phishing/spam through your email provider.

Question 25.

What should your response be if you receive an email stating that you have won a lottery or received some inheritance from an unknown person?

(a) Send them email asking for further procedure.
(b) Ignore it.
(c) Mark it as spam and block it.
(d) None of the above
Answer:
(c) Mark it as spam and block it.

Question 26.

A computer is a malicious code which self- replicates by copying itself to other programs.

(a) program
(b) virus
(c) application
(d) worm
Answer:
(d) worm

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 27.

Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains a damaging code?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(a) Trojans

Question 28.

Which of the following is the type of software that has self- replicating software that causes damage to file and system?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(c) Worm .

Question 29.

Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited?

(a) Trojans
(b) Viruses
(c) Worm
(d) Adware
Answer:
(d) Adware

Question 30.

What is the broad term covering computer viruses, worms, trojan, adware, etc.?

(a) Malware
(b) Spyware
(c) Worm
(d) Adware
Answer:
(a) Malware

Question 31.

The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is

(a) phishing
(b) eavesdropping
(c) scams
(d) PC intrusion
Answer:
(b) eavesdropping

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 32.

Which of the following is/are source of spreading viruses from one computer to another?

(a) Email
(b) Infected data
(c) Infected programs
(d) All of these
Answer:
(d) All of these

Question 33.

……….. are the attempts by individuals to obtain confidential information from you through an original looking site and URL.

(a) Phishing scams
(b) Spoofing
(c) Eavesdropping
(d) Pharming
Answer:
(a) Phishing scams

Question 34.

………… is an attempt where a hacker tries to divert network traffic to a bogus site.

(a) Phishing scams
(b) Spoofing
(c) Eavesdropping
(d) Pharming attack
Answer:
(d) Pharming attack

Question 35.

A research student is expected to write a thesis on a topic The student browses internet for the topic and luckily finds it on the internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer?

(a) Spamming
(b) Phishing
(c) Plagiarism
(d) Trojan
Answer:
(c) Plagiarism

Question 36.

OSS stands for.

(a) Open Science Software
(b) Open Spyware Software
(c) Open Source Software
(d) None of the above
Answer:
(c) Open Source Software

Question 37.

Any fraudulent business practice that extracts money from an unsuspecting, ignorant person is called a

(a) Fraud
(b) Cyber ethics
(c) Scam
(d) Spam
Answer:
(c) Scam

Question 38.

……… is stealing someone else’s intellectual work …. and representing it as your own without giving credit.

(a) Digital footprint
(b) Plagiarism
(c) Pharming
(d) Phishing
Answer:
(b) Plagiarism

Question 39.

Any work/information that exists in digital form either on internet or on an electronic device, is known as ……… property.

(a) online
(b) e-commerce
(c) documentation
(d) digital
Answer:
(d) digital

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 40.

Discarded electrical or electronic devices are known as ………

(a) E-dust
(b) E-spam
(c) E-waste
(d) None of these
Answer:
(c) E-waste

Question 41.

The least restrictive open source license is …….. license.

(a) IMT
(b) NIT
(c) CIT
(d) MIT
Answer:
(d) MIT .

Question 42.

The original code written by programmers for a software is known as……….

(a) Text code
(b) Encoded code
(c) Source code
(d) All of these
Answer:
(d) Source code

Question 43

………. means no price is to be paid for the software.

(a) Shareware
(b) Crippleware
(c) Opensource
(d) Freeware
Answer:
(d) Freeware

Question 44

…….. means freedom to use the software.

(a) Open source software
(b) Spyware’software
(c) Free software
(d) Malware software
Answer:
(c) Free software

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 45.

I AD means

(a) Internet Addiction Disorder
(b) International Addiction Disorder
(c) Instant Addiction Disorder
(d) All of the above
Answer:
(a) Internet Addiction Disorder

Question 46.

The is the digital trail of your activity on the ……internet.

(a) digital dividend
(b) digital signature
(c) leaching
(d) digital footprint
Answer:
(d) digital footprint

Question 47.

The are the permissions given to use a ……….. product or someone’s creator by the copyright holder.

(a) patent
(b) copyright
(c) licenses
(d) digital footprint
Answer:
(c) licenses

Question 48.

………. is a license that gives rights opposite to copyright.

(a) Copyright
(b) Copyleft
(c) Copytop
(d) Copyheader
Answer:
(b) Copyleft

Question 49.

The practice of taking someone else’s work or ideas and passing them off as one’s own is known as ……….

(a) Digital footprint
(b) Plagiarism
(c) Pharming
(d) Phishing
Answer:
(b) Plagiarism

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 50.

A……..is an injury or disorder to the muscles,

(a) repetitive strain injury
(b) destructive strain injun,’
(c) in-destructive strain injun,’
(d) in-repetitive strain injury
Answer:
(a) repetitive strain injury

Question 51.

…… is a technology related health condition affecting eyesight.

(a) Computer vision syndrome
(b) Computer seeing syndrome
(c) Computer sight syndrome
(d) None of the above
Answer:
(a) Computer vision syndrome

Question 52.

……..is a general term used to refer to viruses, worms, spyware, adware etc

(a) Open source
(b) Spyware
(c) Free software
(d) Malware
Answer:
(d) Malware

Question 53.

A……….is a self-replicating program which eats up the entire disk space or memory.

(a) viruses
(b) spyware
(c) worm
(d) malware
Answer:
(c) worm

Question 54.

……….is a program that appears harmless (such as a text editor or a utility program) but actually performs malicious functions.

(a) Ransomware
(b) Spyware
(c) Worm
(d) Trojan horse
Answer:
(d) Trojan horse

Question 55.

……..is a software which is installed on your computer to spy on your activities and report this data to people willing to pay for it.

(a) Ransomware
(b) Spyware
(c) Worm
(d) Trojan horse
Answer:
(b) Spyware

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 56.

……..refers to the sending of bulk-mail by an identified or unidentified source.

(a) Ransomware
(b) Spamming
(c) Phishing
(d) Cyber stalking
Answer:
(b) Spamming

Question 57.

Unauthorised monitoring of the people’s communications is called

(a) Eaves dropping
(b) Spamming
(c) Phishing
(d) Cyber stalking
Answer:
(a) Eaves dropping

Question 58.

A……..is a small piece of data sent from a website and stored in a user’s web browser (in a text file) while a user is browsing a website.

(a) cache
(b) cookies
(c) history
(d) archie
Answer:
(b) cookies

Question 59.

……..is a system designed to prevent unauthorised access to or from a private network.

(a) Hub
(b) Switch
(c) Anitivirus
(d) Firewall
Answer:
(d) Firewall

Question 60.

A mail or message sent to a large number of people indiscriminately without their consent is called

(a) Eaves dropping
(b) Spam
(c) Phishing
(d) Cyber stalking
Answer:
(b) Spam

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 61.

Which of the following is considered as cyber-crime?

(a) Virus attack
(b) Worm attack
(c) Hacking
(d) All of these
Answer:
(d) All of these

Question 62.

The use of internet or other electronic media to harass a person or group of individuals or an organisation is termed as:

(a) Cybernet
(b) Cyber policing
(c) Cyber stalking
(d) Cyber space
Answer:
(c) Cyber stalking

Question 63.

To avoid problems while working with internet you should follow these precautions:

(a) install anti-virus on your computer
(b) take the back-up of your files regularly
(c) do not click on unknown links
(d) All of the above
Answer:(d) All of the above

Question 64.

An unsolicited mail or message indiscriminately sent to a large number of persons without their consent, is called:

(a) Worm
(b) Spam
(c) Trojan
(d) Online marketing
Answer:
(b) Spam

Question 65.

In terms of Information security, acronym CIA stands for:

(a) Central Intelligence Agency
(b) Confidentiality, Integrity and Authentication
(c) Cognitive Intelligent Access
(d) None of the above
Answer:
(b) Confidentiality, Integrity and Authentication

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 66.

A malicious piece of code which copies and appends itself to other files and disk sectors is called as

(a) Computer virus
(b) Computer trojan
(c) Computer worm
(d) Web script
Answer:
(a) Computer virus

Question 67.

A self-replicating computer program which sends copies of itself to other nodes on the computer network without any user intervention is known as

(a) Computer virus
(b) Computer trojan
(c) Computer worm
(d) Web script .
Answer:
(c) Computer worm

Question 68.

A sentinel program which tries to protect computer system from data loss, destruction of system files and attack of any external threat like worms or viruses is called

(a) Virus program
(b) Worm script
(c) Anti-virus program
(d) Spyware
Answer:
(c) Anti-virus program

Question 69.

Radha is an IT manager. Her company has provided a laptop to her so that she can access office emails and work from home. She shared her computer login-id and password with her son and allowed him to install educational computer games. We can say:

(a) it is ok to share the password with her family members.
(b) it is ethical since she is helping her kid in his education.
(c) it is not ethical since laptop is provided to her for business use.
(d) it is alright provided she has taken permission from her employers.
Answer:
(c) it is not ethical since laptop is provided to her forbusiness use.

Question 70.

In terms of network security, ‘DoS’ is termed as:

(a) Disk Operating System
(b) Denial of Service
(c) Distributive Operative Service
(d) Distributed Operating System
Answer:
(b) Denial of 5ervice

Question 71.

A……… is a program that protects websites against bots by generating and grading tests that humans can pass but current computer programs cannot.

(a) CAPTCHA
(b) HUMAN Intelligence Test
(c) FIREWALL
(d) ANTI-VIRUS
Answer:
(a) CAPTCHA

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 1

Question 72.

Facebook, Twitter, Myspace, Google+ are examples of:

(a) chat software
(b) web mail application
(c) social networking
(d) network sharing
Answer:
(c) social networking

Question 73.

Out of the following, which one will be altered or modified by a computer virus?

(a) Operating system
(b) Speed of network connectivity
(c) Application software
(d) All of the above
Answer:
(d) All of the above

Question 74.

Open source software can be used for commercial purposes.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices with Answers

error: Content is protected !!