MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Societal Impacts and Data Protection Class 12 MCQ Questions Part 3

Question 1.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 2.

………is a secure technique to protect data being transmitted over a network.

(a) E-commerce
(b) Encryption
(c) Plagiarism
(d) Digital property
Answer:
(b) Encryption

Question 3.

…….. is a form of electronic signature that authenticates a document or transaction through encryption and password.

(a) Patent
(b) Security certificate
(c) Digital signature
(d) Integrity
Answer:
(c) Digital signature

Question 4.

…….. is1 also a unique digital identification that is used to verify the identity of an individual website or user.

(a) Security certificate
(b) Patent
(c) Digital signature
(d) None of these
Answer:
(a) Security certificate

Question 5.

What is the full form of SSL?

(a) Secure Session Layer
(b) Session Secure Layer
(c) Secure Socket Layer
(d) Socket Session Layer
Answer:
(c) Secure Socket Layer

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 6.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of these
Answer:
(d) All of these

Question 7.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 8.

Digital property includes

(a) digital documents
(b) audio files
(c) video files
(d) All of these
Answer:
(d) All of these

Question 9.

A/An …. for computer software and other products allows the source code to be used, modified or shared.

(a) digital signature
(b) patent
(c) open source software
(d) None of these
Answer:
(c) open source software

Question 10.

A……..is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.

(a) free software licence
(b) copyright
(c) open source software
(d) patent
Answer:
(a) free software licence

Question 11.

What does a free software licence provide to the receiver of software?

(a) Provides no rights
(b) Right to use, modify or redistribute
(c) Receiver becomes the owner
(d) Full copyrights of software
Answer:
(b) Right to use, modify or redistribute

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 12.

To what kind of a society digital unite refers?

(a) Everyone is skilled
(b) No one is skilled
(c) Only half the society is skilled .
(d) Only rural areas have the Internet
Answer:
(a) Everyone is skilled

Question 13.

……. are the etiquettes that are to be followed while communicating online.

(a) Digital signature
(b) Patent
(c) Digital unite
(d) Netquettes
Answer:
(d) Netiquettes

Question 14.

………… refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.

(a) Digital union
(b) Electronic unite
(c) Digital unite
(d) Digital divide
Answer:
(c) Digital unite

Question 15.

After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cybercrime?

(a) Hacking
(b) Identity theft
(c) Cyber bullying
(d) Plagiarism
Answer:
(b) Identity theft
Identity theft means obtaining someone’s credentials to commit some online fraud.

Question 16.

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?

(a) You sent an email to your friend with a message saying that “I am sorry”.
(b) You sent a threatening message to your friend saying ‘”Do not try to call or talk to me”.
(c) You created an embarrassing picture of your friend and • uploaded on your account on a social networking site.
(d) None of the above
Answer:
(a) you sent an email to your friend with a message saying that ”1 am sorry”.

Question 17.

You are planning to go for a vacation. You surfed the internet to get answers for the following Question ueries:

(a) Weather conditions
(b) Availability of air tickets and fares
(c) Places to visit
(d) Best hotel deals
Which of your above mentioned actions might have created a digital footprint?
(a) a and b
(b) a, b and c
(c) a, c and d
(d) All of these
Answer:
(d) All of these

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 18.

Describe why it is important to secure your wireless router at home. Search the internet to find the rules to create a reasonably secure password Create an imaginary password for your home router. Will you share your password for home router with following people?

(a) Parents
(b) Friends
(c) Neighbours
(d) Home tutors
Answer:
(a) Parents
WiFi router security is important otherwise any one can use our WiFi to commit fraud or cybercrimes. We shall share the password with parents only.

Question 19.

……….is a type of software designed to help the user’s computer detect viruses and avoid them.

(a) Malware
(b) Adware
(c) Antivi
(d) Both b and c
Answer:
(c) Antivirus
An antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user’s computer, it can be easily removed by scanning the entire system with antivirus help.

Question 20.

Which one of the following is a type of antivirus program?

(a) Question uick heal
(b) Mcafee
(c) Kaspersky
(d) All of these
Answer:
(d) All of these
Antivirus is a kind of software program that helps to detect and remove viruses form the user’s computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Question uick Heal, Norton etc., so the correct answer is D.

Question 21.

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, et(c) it is known as the

(a) Antivirus
(b) Firewall
(c) Cookies
(d) Malware .
Answer:
(b) Firewall
There are two types of firewalls – software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user’s system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses. •

Question 22.

Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?

(a) Piracy
(b) Plagiarism
(c) Intellectual property rights
(d) All of the above
Answer:
(d) All of the above
The stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.

Question 23.

Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform?

(a) Cyber law
(b) Cyberethics
(c) Cybersecurity
(d) Cybersafety
Answer:
(b) Cyberethics
Cyber Ethics refers to exploring the appropriate, ethical behaviours related to online environments and digital media.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 24.

Which of the following refers to the violation of the principle if a computer is no more accessible?

(a) Access control
(b) Confidentiality
(c) Availability
(d) All of these
Answer:
(c) Availability .
Availability refers to the violation of principle, if the system is no more accessible.

Question 25.

Which one of the following refers to the techniQuestion ue used for verifying the integrity of the message?

(a) Digital signature
(b) Decryption algorithm
(c) Protocol
(d) Message digest
Answer:
(d) Message digest
Message Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formul(a) It is also known as a type of techniQuestion ue used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is (d)

Question 26.

Which one of the following usually used in the process of Wi-Fi-hacking?

(a) Aircrack-ng
(b) Wireshark
(c) Norton
(d) All of these
Answer:
(a) Aircrack-ng
The Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali et(c) it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.

Question 27.

Which of the following port and IP address scanner famous among the users?

(a) Cain and Abel
(b) Angry IP Scanner
(c) Snort
(d) Ettercap
Answer:
(b) Angry IP Scanner
Angry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.

Question 28.

In ethical hacking and cyber security, there are …….. types of scanning.

(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(c) 3
There are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.

Question 29.

Which of the following is not a type of scanning?

(a) Xmas Tree Scan
(b) Cloud scan
(c) Null Scan
(d) SYN Stealth
Answer:
(b) Cloud scan
Among the following-given options, the Cloud Scan is one, and only that is not a type of scanning.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 30.

In system hacking, which of the following is the most crucial activity?

(a) Information gathering
(b) Covering tracks
(c) Cracking passwords
(d) None of these
Answer:
(c) Cracking passwords
While trying to hack a system, the most important thing is cracking the passwords.

Question 31.

Which one of the following is actually considered as the first computer virus?

(a) Sasser
(b) Blaster
(c) Creeper
(d) Both a and c
Answer:
(c) Creeper
The Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.

Question 32.

To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system.

(a) Antivirus
(b) Firewall
(c) Vic player
(d) Script
Answer:
(b) Firewall
It is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software from unknown sources. We can also consider it the first line of defense of the computer system.

Question 33.

Code Red is a type of ……….

(a) an antivirus program
(b) a photo editing software
(c) a computer virus
(d) a video editing software
Answer:
(c) a computer virus
Cod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.

Question 34.

Which of the following can be considered as the elements of cyber security?

(a) Application security
(b) Operational security
(c) Network security
(d) All of these
Answer:
(d) All of these
Application security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.

Question 35.

Which of the following are famous and common cyberattacks used by hackers to infiltrate the user’s system?

(a) DDos and Derive-by Downloads
(b) Malware & Malvertising
(c) Phishing and Password attacks
(d) All of the above
Answer:
(a) DDos and Derive-by Downloads
DDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.

Question 36.

Which one of the following is also referred to as malicious software?

(a) Maliciousware
(b) Badware
(c) Ilegalware
(d) Malware
Answer:
(d) Malware .
Malware is a kind of short program used by the hacker to gain access to sensitive data/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 37.

In Wi-Fi Security, which of the following protocol is more used?

(a) WPA
(b) WPA2
(c) WPS
(d) Both a and c
Answer:
(b) WPA2
Nowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WP(a) It is also known as the upgraded version of the WPA protocol.

Question 38.

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?

(a) Reliability
(b) Performance
(c) Security
(d) Longevity
Answer:
(b) Performance
When the numbers of users on a network get increased and exceed the network’s limit, therefore the performance is one of the factors of the network that is hugely impacted by it.

Question 39.

General Accepted standards of right and wrong in a society is called as

(a) Moral
(b) Ethics
(c) Guideline
(d) Code of standard
Answer:
(a) Moral

Question 40.

….. is a criterion used to decide what is right or wrong.

(a) Moral standard
(b) Moral principle
(c) Moral
(d) Ethics
Answer:
(a) Moral standard

Question 41.

…….. indicates rules and regulations to be obeyed in the organisation.

(a) Ethics
(b) Law
(c) Moral
(d) Privacy
Answer:
(b) Law

Question 42.

Code of ethics do not includes

(a) software Piracy
(b) fair treatment
(c) communication
(d) co-operation
Answer:
(a) software Piracy

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 43.

……….. provides norms and principles to the computer users and system professionals.

(a) Code of ethics
(b) Guidelines
(c) Privacy
(d) Security
Answer:
(a) Code of ethics

Question 44.

To make the exact copy of a program is termed as

(a) Copyright
(b) Software privacy
(c) Fair use
(d) Law
Answer:
(b) Software privacy

Question 45.

The use of invasive software such as destructs the computer system.

(a) Unselect
(b) Worms’s
(c) Microbes
(d) Bacteria
Answer:
(b) Worms’s

Question 46.

When a software is pirated, it harmes

(a) management
(b) operator
(c) people
(d) software developers
Answer:
(d) software developers

Question 47.

Accessing data without permission is known as…….

(a) Unauthorized access
(b) Legal access
(c) Without permission
(d) With permission
Answer:
(a) Unauthorized access

Question 48.

provides Legal recognition of tranaction carried out by means of eletronic commerce.

(a) IT act
(b) Cyber crime
(c) Cyber law
(d) Fair use
Answer:
(c) Cyber law

Question 49.

…… ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.

(a) Digital signature
(b) Coded signature
(c) Double signature
(d) Simple signature
Answer:
(a) Digital signature

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 50.

…….. refers to all the legal and regulatory aspects of internet and world wide web.

(a) Cyber crime
(b) Cyber law
(c) IT act
(d) Code of standard
Answer:
(b) Cyber law

Question 51.

…….. detects and prevents known viruses which weakens the computer.

(a) Web browser
(b) Email
(c) Record
(d) Anti-virus
Answer:
(d) Anti-virus

Question 52.

license allows for installation of a program on a software.

(a) Single user
(b) Network
(c) Site
(d) Lab pack
Answer:
(b) Network

Question 53.

……… means a representation of information, knowledge, facts, concepts or instructions,

(a) Data
(b) Signature
(c) Access
(d) Program
Answer:
(a) Data

Question 54.

……. means the official Gazette published in the electronic form.

(a) Electronic gazette
(b) Electronic record
(c) Electronic form
(d) All of these
Answer:
(a) Electronic gazette

Question 55.

………key means the key of a key pair used to create a digital signature.

(a) Private
(b) Public
(c) Both a and b
(d) Security key
Answer:
(a) Private

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 56.

The legal and regulatory accepts of internet refers to

(a) cyber law
(b) cyber crime
(c) criminal law
(d) IT act
Answer:
(a) cyber law

Question 57.

Cyber law is contained in

(a) IT Act, 2000
(b) Negotiable Instrument Act
(c) Power of Attorney
(d) Code of ethics
Answer:
(a) IT Act, 2000

Question 58.

……… include data, text, image, sound, voice, codes, computer programs, software and database.

(a) Data
(b) Information
(c) Function
(d) Process
Answer:
(b) Information

Question 59.

To maintain confidentiality of data and to promote integration of data is called as

(a) Security
(b) Privacy
(c) Liability
(d) Accountability
Answer:
(b) Privacy

Question 60.

Copyright is……….

(a) an intelectual property right attached to original works in which the right subsist with him
(b) individuals right to access the information
(c) right of information
(d) that is not cop(yrightrd software
Answer:
(a) an intelectual property right attached to original works in which the right subsist with him

Question 61.

……… software allows for anyone to use, copy and distribute it with modifications free of cost.

(a) Freeware
(b) Shareware
(c) Public domain
(d) Non-freeware
Answer:
(a) Freeware

Question 62.

Software available on Internetare

(a) freeware
(b) shareware
(c) public domain
(d) None of these
Answer:
(c) public domain

Question 63.

……….. is a distribution method to judge the software whether it is good or bad before you pay for it.

(a) Shareware
(b) Freeware
(c) Non-freeware software
(d) Public domain software
Answer:
(b) Freeware

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 64.

……… is a discipline that deals with issues in copyright, trademark and patent laws.

(a) Cyber law
(b) IT Act
(c) Cyber crime
(d) Intellectual Property Rights
Answer:
(a) Cyber law

Question 65.

…….. laws grant the creator the exclusive rights to reproduce, perform, distribute and display the work publicly.

(a) Copyright
(b) Cyber law
(c) Pair issue
(d) Cyber crime
Answer:
(a) Copyright

Question 66.

……..gives the protection to original work.

(a) Access
(b) Address
(c) Users
(d) Copyright
Answer:
(d) Copyright

Question 67.

………. is a leagal use of copyrighted material without explicit permission from the copyrighted holder.

(a) Copyright
(b) Fair use
(c) Unauthorized access
(d) Property right
Answer:
(b) Fair use

Question 68.

Which of the following is not a type of cybercrime?

(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
Answer:
(d) Installing antivirus for protection

Question 69.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 70.

……. is the verbatim transcription of a section of someone else work, without making any changes in original work.

(a) Minimal plagiarism
(b) Mosaic
(c) Direct or complete plagiarism
(d) None of the above
Answer:
(c) Direct or complete plagiarism

Question 71.

Which of the following refers to intellectual property?

(a) Creations of the mind
(b) Literary works
(c) Industrial property
(d) All of the above
Answer:
(d) All of the above

Question 72.

Which of the following do anti-hacking solutions prevent attackers from?

(a) Accessing your hardware
(b) Accessing your property
(c) Accessing your software
(d) None of the above
Answer:
(c) Accessing your software

Question 73.

Using…….. encrypted data is decrypted.

(a) digital certificate
(b) key
(c) firewall
(d) digital certification
Answer:
(b) key

MCQ Questions for Class 12 Informatics Practices – Societal Impacts and Data Protection Matplotlib Part 3

Question 74.

Which of the following is related to cyberethics?

(a) Ethics in the online environment
(b) Online gaming
(c) Ethics at school
(d) Telecommunications
Answer:
(a) Ethics in the online environment

MCQ Questions for Class 12 Informatics Practices with Answers

error: Content is protected !!