MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Societal Impacts and Data Protection Class 12 MCQ Questions Part 2

Question 1.

It is okay to copy and paste information from the internet into your report then organise it.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 2.

Shareware software allows you to try the software before you buy it.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 3.

Freeware is copyrighted software that is freely available to use:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 4.

Cyber-laws are incorporated for punishing all types of criminals only:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 5.

Deceptively attempting to acquire sensitive information of someone else using online means, is a cybercrime:

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 6.

Freeware and free software mean the same thing.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 7.

Excessive use of internet and social media is termed as a disorder.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 8.

Digital footprint can be deleted.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 9.

Digital footprint remains forever.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 10.

It is safe to make all one posts public on social media.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 11.

Hacking is performed to help find the security loopholes.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 12.

If you post something mean about someone, you can just delete it and your activity will be undone.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 13.

Hacking is a cybercrime.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 14.

Copyright is the right of the creator of creative/artistic work.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 15.

Computer viruses are healthy codes/programs written to test the security health of a system.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 16.

A worm is a self-replicating program.

(a) True
(b) False
(c) Error
d.None of these
Answer:
(a) True

Question 17.

A Trojan horse is a utility program that does harm when its date gets expired.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 18.

Spyware is healthy software which keeps an eye.of activities happening on your computer.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

Question 19.

Adware are the programs that deliver unwanted ads to your computer.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 20.

Malware is a special type of virus.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(b) False

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 21.

Spamming refers to the sending of bulk-mail by an identified or unidentified source.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 22.

Phishing involves authentic looking sites trying to collect your sensitive transactional and identity information.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 23.

To keep a computer protected, one should use updated software, be cautious while handling mails and surfing internet, scanning computer regularly, etc.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

Question 24.

Firewall can be implemented in software as well as in hardware.

(a) True
(b) False
(c) Error
(d) None of these
Answer:
(a) True

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 25.

Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?

(a) Inform Garvit so that he may change his password.
(b) Give the password of Garvit’s e-mail ID to all other classmates.
(c) Use Garvit’s password to access his account.
(d) None of the above
Answer:
(a) Inform Garvit so that he may change his password.

Question 26.

Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enQuestion uired about the computer class. She also reQuestion uested him to explain the concept. Shaurya said, “Mam taught u show to use tuples in python”. Further, he generously said, “Give me sometime, I will email you the material which will help you to understand tuples in python”. Shaurya Question uickly downloaded a 2-minute clip from the internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana.This act of Shaurya is an example of:

(a) fair use
(b) hacking
(c) copyright infringement
(d) cybercrime
Answer:
(c) copyright infringement

Question 27.

What are computer ethics?

(a) An honest, moral code that should be followed when on the computer
(b) A computer program about honesty
(c) A computer that fits on or under a desk
(d) A list of commandments in the Bible
Answer:
(a) An honest, moral code that should be followed when on • the computer

Question 28.

……. are the ethics, or the moral principles, applied to the online environment.

(a) E-commerce
(b) E-shopping
(c) Cyberethics
(d) Cyberbuling
Answer:
(c) Cyberethics

Question 29.

In this modern age, users have easy access to large volumes of information available

(a) anytime
(b) anywhere
(c) almost for anybody
(d) All of these
Answer:
(d) All of these

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 30.

The branch of ICT that allows selling or buying things online, is known as

(a) E-commerce
(b) E-shopping
(c) E-learning
(d) E-reservation
Answer:
(a) E-commerce
The process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce.

Question 31.

EDI stands for

(a) Effective Data Interchange
(b) Electrical Data Interchange
(c) Electronic Data Interchange
(d) None of the above
Answer:
(c) Electronic Data Interchange

Question 32.

ICT stands for

(a) Informatics and Communication Technology
(b) Information and Communication Trade
(c) Information and Commerce Technology
(d) Information and Communication Technologies
Answer:
(d) Information and Communication Technologies

Question 33.

E-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management etc.

(a) Internet marketing
(b) online transaction processing,
(c) Electronic data interchange (EDI)
(d) All of the above
Answer:
(d) All of the above

Question 34.

………. is an essential part of any electronic transaction that takes place over the Internet.

(a) Security
(b) Networking
(c) Communication
(d) Password
Answer:
(a) Security

Question 35.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 36.

………. are the fundamental requisites that ensure safe electronic transactions and payments.

(a) Confidentiality, integrity
(b) Encryption, availability
(c) Authenticity
(d) All of the above
Answer:
(d) All of the above

Question 37.

…… is a secure technique to protect data being transmitted over a network.

(a) E-commerce
(b) Encryption
(c) Plagiarism
(d) Digital property
Answer:
(b) Encryption

Question 38.

Such information should be kept ……..and not be accessible by any unauthorised person.

(a) confidential
(b) integrity
(c) encryption
(d) Available
Answer:
(a) confidential

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 39.

When you use the word……it means you are protecting your data from getting disclosed.

(a) confidentiality
(b) integrity
(c) authentication
(d) availability
Answer:
(a) confidentiality
Confidentiality is what every individual prefer in terms of physical privacy as well as digital privacy. This term means our information needs to be protected from getting disclose to unauthorised parties, for which we use different security mechanisms like password protection, biometric security, OTPs (One Time Passwords) etc.

Question 40.

……. means the protection of data from modification by unknown users.

(a) Confidentiality
(b) Integrity
(c) Authentication
(d) Non-repudiation
Answer:
(b) Integrity
A information only seems valuable if it is correct and do not get modified during its journey in the course of arrival. The element integrity makes sure that the data sent or generated from other end is correct and is not modified by any unauthorised party in between.

Question 41.

When integrity is lacking in a security system, occurs.

(a) database hacking
(b) data deletion
(c) data tampering
(d) data leakage
Answer:
(c) data tampering
The term data tampering is used when integrity is ‘ compromised in any security model and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an authorised person and in between a Man in the Middle (MiTM) attack takes place and the value has tampered to $500. This is how integrity is compromised.

Question 42.

………. of information means, only authorised users are capable of accessing the information.

(a) Confidentiality
(b) Integrity
(c) Non-repudiation
(d) Availability
Answer:
(d) Availability
Information seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 43.

Why these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?

(a) They help understanding hacking better
(b) They are key elements to a security breach
(c) They help understands security and its components better
(d) They help to understand the cyber-crime better
Answer:
(c) They help understands security and its components better The four elements of security viz. confidentiality, integrity, authenticity & availability helps in better understanding the pillars of security and its different components.

Question 44.

This helps in identifying the origin of information and authentic user. This referred to here as

(a) confidentiality
(b) integrity
(c) authenticity
(d) availability
Answer:
(c) authenticity
The key element, authenticity helps in assuring the fact that the information is from the original source.

Question 45.

Data ……..is used to ensure confidentiality.

(a) encryption
(b) locking
(c) deleting
(d) backup
Answer:
(a) encryption
Data encryption is the method of converting plain text to cipher-text and only authorised users can decrypt the message back to plain text. This preserves the confidentiality of data.

Question 46.

Which of these is not a proper method of maintaining confidentiality?

(a) Biometric verification
(b) ID and password based verification
(c) 2-factor authentication
(d) switching off the phone
Answer:
(d) switching off the phone
Switching off the phone in the fear of preserving the confidentiality of data is not a proper solution for data confidentiality. Fingerprint detection, face recognition, password-based authentication, two-step verifications are some of these.

Question 47.

Data integrity gets compromised when…….. and …….are taken control off.

(a) access control, file deletion
(b) network, file permission
(c) access control, file permission
(d) network, system
Answer:
(c) access control, file permission
The two key ingredients that need to be kept safe are: access control and file permission in order to preserve data integrity.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 48.

……….is the latest technology that faces an extra challenge because of CIA paradigm.

(a) Big data
(b) Database systems
(c) Cloud storages
(d) 5mart dust
Answer:
(a) Big data
Big data has additional challenges that it has to face because of the tremendous volume of data that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and time-consuming.

Question 49.

One common way to maintain data availability is ……….

(a) data clustering
(b) data backup
(c) data recovery
(d) data Altering
Answer:
(b) data backup
For preventing data from data-loss, or damage data backup can be done and stored in a different geographical location so that it can sustain its data from natural disasters & unpredictable events.

Question 50.

The sender of the information ……… the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.

(a) encrypts
(b) decrypts
(c) Both a and b
(d) None of these
Answer:
(a) encrypts

Question 51.

Encryption is a process of converting plain text or data into………so that the transmitted information cannot be accessed by anyone other than the receiver and the sender.

(a) ciphertext
(b) simple text
(c) encoded text
(d) decrypted text
Answer:
(a) ciphertext

Question 52.

The use of the digital signatures should be encouraged while doing online transactions to ensure the of information.

(a) integrity
(b) availability
(c) confidentiality
(d) authenticity
Answer:
(d) authenticity

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 53.

Security certificate is also a unique digital identification that is used to verify the identity of an individual website or user.

(a) User certificate
(b) Security certificate
(c) Secure certificate
(d) None of these
Answer:
(b) Security certificate

Question 54.

SHTTP stands for

(a) Session Hypertext Transfer Protocol
(b) Socket Hypertext Transfer Protocol
(c) Secure Hypertext Transfer Protocol
(d) None of the above
Answer:
(c) Secure Hypertext Transfer Protocol

Question 55.

Secure electronic transaction is a secure protocol developed requirements in the field of e-commerce.

(a) certificate authority software
(b) merchant software
(c) card holder’s digital wallet
(d) All of the above
Answer:
(d) All of the above

Question 56.

The term generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.

(a) ethics
(b) security
(c) encryption
(d) decryption
Answer:
(a) ethics

Question 57.

………. are some common issues that are governed by computer ethics.

(a) Plagiarism
(b) Cyber bullying
(c) Hacking
(d) All of these
Answer:
(d) All of these

Question 58.

The law grants exclusive rights to a variety of intellectual works such as literary, musical, artistic works and much more.

(a) patent
(b) copyright
(c) intellectual property
(d) None of these
Answer:
(c) intellectual property

Question 59.

A person or a group of persons or an organisation or company can get their invention covered under a …….to protect it from unauthorised use.

(a) patent
(b) copyright
(c) intellectual property
(d) None of these
Answer:
(a) patent
Patent is a legal document that gives the inventor sole rights to make, sell or use an invention.

Question 60.

A trademark is valid for……..years and can be renewed after that.

(a) seven
(b) five
(c) ten
(d) twelve

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2
Answer:
(c) ten
A logo or symbol that is printed on business items to make it exclusive, is known as a trademark.

Question 61.

………. covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.

(a) Patent
(b) Copyright
(c) Intellectual property
(d) None of these
Answer:
(b) Copyright
Copyright is a right that is granted by law to the creator or inventor for his original work. The rights concerning a copy of any product are reserved by the writer or the company that has published the work.

Question 62.

in the original work is edited, reframed and reproduce(d) It is very common in the education field.

(a) minimal plagiarism
(b) direct or complete plagiarism:
(c) mosaic or substantial plagiarism:
(d) None of the above
Answer:
(a) minimal plagiarism

Question 63.

……. that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users.

(a) Electronic assets
(b) Digital assets
(c) E-assets
(d) None of these
Answer:
(b) Digital assets

Question 64.

…………. keeps your software’s source code in safe hands to make sure that no one can obtain it without authorisation.

(a) Digital Rights Management (DRM)
(b) Anti-hacker software
(c) Software escrow ,
(d) None of the above
Answer:
(c) Software escrow

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 65.

controls the use, modification, and distribution of copyrighted works, such as software or other digital products.

(a) Digital Rights Management (DRM)
(b) anti-hacker software
(c) Software escrow .
(d) None of the above
Answer:
(a) Digital Rights Management (DRM)

Question 66.

A…….solution may also protect your software from being accessed for source codes using computer programs like decompilers.

(a) digital rights management
(b) anti-hacker software
(c) software escrow
(d) None of the above
Answer:
(a) digital rights management

Question 67.

There are many ……….. and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc.

(a) digital rights management
(b) anti-hacker software
(c) software escrow
(d) None of the above
Answer:
(b) anti-hacker software

Question 68.

A……….is a document that provides legally binding guidelines for the use and distribution of software.

(a) software licence
(b) document licence
(c) e-licence
(d) None of these
Answer:
(a) software licence

Question 69.

Software licences typically provide end-users with the right to one or more copies of the software without violating

(a) plagiarism
(b) copyrights
(c) trademark
(d) patent
Answer:
(b) copyrights

Question 70.

EULA stands for

(a) End-User Licence Agreement
(b) Electronic-User Licence Agreement
(c) Both a and b
(d) None of the above
Answer:
(a) End-User Licence Agreement

Question 71.

The primary aspect of……..is that a software publisher allows the use of one or more copies of software under the end-user licence agreement (EULA), but ownership of those copies remains with in the software publisher.

(a) publisher software licences
(b) proprietary software licences
(c) public software licences
(d) None of the above
Answer:
(b) proprietary software licences

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 2

Question 72.

A ………is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

(a) publisher software licences
(b) proprietary software licences
(c) free software licences
(d) open source software licence
Answer:
(c) free software licences

Question 73.

……….. for computer software and other products allows the source code or design to be used, modified and/or shared under defined terms and conditions.

(a) Publisher software licences
(b) Proprietary software licences
(c) Free software licences
(d) Open source Software Licence
Answer:
(d) Open source Software Licence

Question 74.

LGPL stands for

(a) Lower General Public Licence
(b) Lesser General Public Licence
(c) Least General Public Licence
(d) None of the above
Answer:
(b) Lesser General Public Licence

MCQ Questions for Class 12 Informatics Practices with Answers

error: Content is protected !!