{"id":37465,"date":"2022-02-21T18:40:19","date_gmt":"2022-02-21T13:10:19","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=37465"},"modified":"2022-02-21T18:40:19","modified_gmt":"2022-02-21T13:10:19","slug":"mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-1","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-1\/","title":{"rendered":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 1"},"content":{"rendered":"
Question 1.<\/p>\n
(a) Synchronous software
\n(b) Package software
\n(c) Open Source software
\n(d) Middleware
\nAnswer:
\n(c) Open Source software<\/p>\n
<\/p>\n
Question 2.<\/p>\n
(a) open source
\n(b) open data
\n(c) open content
\n(d) open education
\nAnswer:
\n(b) open data
\nQuestion 3.<\/p>\n
(a) You can edit the source code to customise it.
\n(b) You need to be an expert to edit code.
\n(c) You have to pay.
\n(d) Can sometimes be too generic for specialist purposes.
\nAnswer:
\n(a) You can edit the source code to customise it.<\/p>\n
Question 4.<\/p>\n
(a) High Question uality software with lots of features.
\n(b) Not as customisable.
\n(c) May not have been tested as much as proprietary software, so might have bugs.
\n(d) You can edit the source code to customise it.
\nAnswer:
\n(c) May not have been tested as much as proprietary software, so might have bugs.<\/p>\n
Question 5.<\/p>\n
(a) It is usually free.
\n(b) Thoroughly tested because people are paying to use it.
\n(c) Not as customisable.
\n(d) Can sometimes be too generic for specialist purposes.
\nAnswer:
\n(b) Thoroughly tested because people are paying to use it.<\/p>\n
<\/p>\n
Question 6.<\/p>\n
(a) You need to be an expert to edit code.
\n(b) You have to pay for this type of software.
\n(c) It’s licensed.
\n(d) It is launched after proper testing.
\nAnswer:
\n(b) You have to pay for this type of software.<\/p>\n
Question 7.<\/p>\n
(a) Computer security law
\n(b) Aggregate information
\n(c) Copyright law
\n(d) Data security standards
\nAnswer:
\n(c) Copyright law<\/p>\n
Question 8.<\/p>\n
(a) A list of all Indian President names.
\n(b) A portrait of your family.
\n(c) A song you wrote.
\n(d) The name of your pet dog.
\nAnswer:
\n(c) A song you wrote.<\/p>\n
Question 9.<\/p>\n
(a) Data theft
\n(b) Forgery
\n(c) Damage to data and systems
\n(d) Installing antivirus for protection
\nAnswer:
\n(d) Installing antivirus for protection<\/p>\n
Question 10.<\/p>\n
(a) Unauthorised account access.
\n(b) Mass attack using Trojans as botnets.
\n(c) Email spoofing and spamming.
\n(d) Report vulnerability in any system.
\nAnswer:
\n(d) Report vulnerability in any system. ‘<\/p>\n
Question 11.<\/p>\n
(a) India\u2019s Technology (IT) Act, 2000
\n(b) India\u2019s Digital Information Technology (DIT) Act, 2000
\n(c) India’s Information Technology (IT) Act, 2000
\n(d) The Technology Act, 2008
\nAnswer:
\n(c) India\u2019s Information Technology (IT) Act, 2000<\/p>\n
Question 12.<\/p>\n
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security.
\n(b) The use of computer networks to commit financial or identity fraud.
\n(c) The theft of digital information.
\n(d) Any crime that involves computers and networks.
\nAnswer:
\n(d) Any crime that involves computers and networks.<\/p>\n
<\/p>\n
Question 13.<\/p>\n
(a) A ripened banana
\n(b) An old computer
\n(c) Old clothes
\n(d) Empty soda cans
\nAnswer:
\n(b) An old computer<\/p>\n
Question 14.<\/p>\n
(a) solid waste
\n(b) commercial waste
\n(c) e-waste
\n(d) business waste
\nAnswer:
\n(c) e-waste<\/p>\n
Question 15.<\/p>\n
(a) business waste
\n(b) commercial waste
\n(c) solid waste
\n(d) e-waste
\nAnswer:
\n(d) e-waste<\/p>\n
Question 16.<\/p>\n
The rights of the owner of information to decide how much information is to be shared\/exchanged\/distributed, are collectively known as (IPR).<\/p>\n
(a) Intelligent Property Rights
\n(b) Intellectual Property Rights
\n(c) Interactive Property Rights
\n(d) Instance Property Rights
\nAnswer:
\n(b) Intellectual Property Rights<\/p>\n
Question 17.<\/p>\n
(a) Intellectual steal
\n(b) Pluckism
\n(c) Plagiarism
\n(d) Pickism
\nAnswer:
\n(c) Plagiarism<\/p>\n
Question 18.<\/p>\n
(a) E-work
\n(b) E-asset
\n(c) Digital property
\n(d) E-property
\nAnswer:
\n(c) Digital property<\/p>\n
Question 19.<\/p>\n
(a) One month
\n(b) One year
\n(c) As per my setting
\n(d) Forever
\nAnswer:
\n(d) Forever<\/p>\n
<\/p>\n
Question 20.<\/p>\n
(a) Internet data (b) Internet trail
\n(c) Digital footprint (d) E-footprint
\nAnswer:
\n(c) Digital footprint<\/p>\n
Question 21.<\/p>\n
(a) Cracking
\n(b) Hacking
\n(c) Banging
\n(d) Phishing
\nAnswer:
\n(b) Hacking<\/p>\n
Question 22.<\/p>\n
(a) Copyright
\n(b) Copyleft
\n(c) GPL
\n(d) None of these
\nAnswer:
\n(a) Copyright<\/p>\n
Question 23.<\/p>\n
(a) a slimy pink thing that lives in dirt.
\n(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.
\n(c) an unsolicited email message.
\n(d) None Of the above
\nAnswer:
\n(b) pieces of malicious code that make copies of themselves and spread through computers without human interaction.<\/p>\n
Question 24.<\/p>\n
(a) Report it as phishing\/spam through your email provider.
\n(b) Delete the message.
\n(c) Reply to the message with your email and password
\n(d) None of the above
\nAnswer:
\n(a) Report it as phishing\/spam through your email provider.<\/p>\n
Question 25.<\/p>\n
(a) Send them email asking for further procedure.
\n(b) Ignore it.
\n(c) Mark it as spam and block it.
\n(d) None of the above
\nAnswer:
\n(c) Mark it as spam and block it.<\/p>\n
Question 26.<\/p>\n
(a) program
\n(b) virus
\n(c) application
\n(d) worm
\nAnswer:
\n(d) worm<\/p>\n
<\/p>\n
Question 27.<\/p>\n
(a) Trojans
\n(b) Viruses
\n(c) Worm
\n(d) Adware
\nAnswer:
\n(a) Trojans<\/p>\n
Question 28.<\/p>\n
(a) Trojans
\n(b) Viruses
\n(c) Worm
\n(d) Adware
\nAnswer:
\n(c) Worm .<\/p>\n
Question 29.<\/p>\n
(a) Trojans
\n(b) Viruses
\n(c) Worm
\n(d) Adware
\nAnswer:
\n(d) Adware<\/p>\n
Question 30.<\/p>\n
(a) Malware
\n(b) Spyware
\n(c) Worm
\n(d) Adware
\nAnswer:
\n(a) Malware<\/p>\n
Question 31.<\/p>\n
(a) phishing
\n(b) eavesdropping
\n(c) scams
\n(d) PC intrusion
\nAnswer:
\n(b) eavesdropping<\/p>\n
<\/p>\n
Question 32.<\/p>\n
(a) Email
\n(b) Infected data
\n(c) Infected programs
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n
Question 33.<\/p>\n
(a) Phishing scams
\n(b) Spoofing
\n(c) Eavesdropping
\n(d) Pharming
\nAnswer:
\n(a) Phishing scams<\/p>\n
Question 34.<\/p>\n
(a) Phishing scams
\n(b) Spoofing
\n(c) Eavesdropping
\n(d) Pharming attack
\nAnswer:
\n(d) Pharming attack<\/p>\n
Question 35.<\/p>\n
(a) Spamming
\n(b) Phishing
\n(c) Plagiarism
\n(d) Trojan
\nAnswer:
\n(c) Plagiarism<\/p>\n
Question 36.<\/p>\n
(a) Open Science Software
\n(b) Open Spyware Software
\n(c) Open Source Software
\n(d) None of the above
\nAnswer:
\n(c) Open Source Software<\/p>\n
Question 37.<\/p>\n
(a) Fraud
\n(b) Cyber ethics
\n(c) Scam
\n(d) Spam
\nAnswer:
\n(c) Scam<\/p>\n
Question 38.<\/p>\n
(a) Digital footprint
\n(b) Plagiarism
\n(c) Pharming
\n(d) Phishing
\nAnswer:
\n(b) Plagiarism<\/p>\n
Question 39.<\/p>\n
(a) online
\n(b) e-commerce
\n(c) documentation
\n(d) digital
\nAnswer:
\n(d) digital<\/p>\n
<\/p>\n
Question 40.<\/p>\n
(a) E-dust
\n(b) E-spam
\n(c) E-waste
\n(d) None of these
\nAnswer:
\n(c) E-waste<\/p>\n
Question 41.<\/p>\n
(a) IMT
\n(b) NIT
\n(c) CIT
\n(d) MIT
\nAnswer:
\n(d) MIT .<\/p>\n
Question 42.<\/p>\n
(a) Text code
\n(b) Encoded code
\n(c) Source code
\n(d) All of these
\nAnswer:
\n(d) Source code<\/p>\n
Question 43<\/p>\n
(a) Shareware
\n(b) Crippleware
\n(c) Opensource
\n(d) Freeware
\nAnswer:
\n(d) Freeware<\/p>\n
Question 44<\/p>\n
(a) Open source software
\n(b) Spyware’software
\n(c) Free software
\n(d) Malware software
\nAnswer:
\n(c) Free software<\/p>\n
<\/p>\n
Question 45.<\/p>\n
(a) Internet Addiction Disorder
\n(b) International Addiction Disorder
\n(c) Instant Addiction Disorder
\n(d) All of the above
\nAnswer:
\n(a) Internet Addiction Disorder<\/p>\n
Question 46.<\/p>\n
(a) digital dividend
\n(b) digital signature
\n(c) leaching
\n(d) digital footprint
\nAnswer:
\n(d) digital footprint<\/p>\n
Question 47.<\/p>\n
(a) patent
\n(b) copyright
\n(c) licenses
\n(d) digital footprint
\nAnswer:
\n(c) licenses<\/p>\n
Question 48.<\/p>\n
(a) Copyright
\n(b) Copyleft
\n(c) Copytop
\n(d) Copyheader
\nAnswer:
\n(b) Copyleft<\/p>\n
Question 49.<\/p>\n
(a) Digital footprint
\n(b) Plagiarism
\n(c) Pharming
\n(d) Phishing
\nAnswer:
\n(b) Plagiarism<\/p>\n
<\/p>\n
Question 50.<\/p>\n
(a) repetitive strain injury
\n(b) destructive strain injun,\u2019
\n(c) in-destructive strain injun,\u2019
\n(d) in-repetitive strain injury
\nAnswer:
\n(a) repetitive strain injury<\/p>\n
Question 51.<\/p>\n
(a) Computer vision syndrome
\n(b) Computer seeing syndrome
\n(c) Computer sight syndrome
\n(d) None of the above
\nAnswer:
\n(a) Computer vision syndrome<\/p>\n
Question 52.<\/p>\n
(a) Open source
\n(b) Spyware
\n(c) Free software
\n(d) Malware
\nAnswer:
\n(d) Malware<\/p>\n
Question 53.<\/p>\n
(a) viruses
\n(b) spyware
\n(c) worm
\n(d) malware
\nAnswer:
\n(c) worm<\/p>\n
Question 54.<\/p>\n
(a) Ransomware
\n(b) Spyware
\n(c) Worm
\n(d) Trojan horse
\nAnswer:
\n(d) Trojan horse<\/p>\n
Question 55.<\/p>\n
(a) Ransomware
\n(b) Spyware
\n(c) Worm
\n(d) Trojan horse
\nAnswer:
\n(b) Spyware<\/p>\n
<\/p>\n
Question 56.<\/p>\n
(a) Ransomware
\n(b) Spamming
\n(c) Phishing
\n(d) Cyber stalking
\nAnswer:
\n(b) Spamming<\/p>\n
Question 57.<\/p>\n
(a) Eaves dropping
\n(b) Spamming
\n(c) Phishing
\n(d) Cyber stalking
\nAnswer:
\n(a) Eaves dropping<\/p>\n
Question 58.<\/p>\n
(a) cache
\n(b) cookies
\n(c) history
\n(d) archie
\nAnswer:
\n(b) cookies<\/p>\n
Question 59.<\/p>\n
(a) Hub
\n(b) Switch
\n(c) Anitivirus
\n(d) Firewall
\nAnswer:
\n(d) Firewall<\/p>\n
Question 60.<\/p>\n
(a) Eaves dropping
\n(b) Spam
\n(c) Phishing
\n(d) Cyber stalking
\nAnswer:
\n(b) Spam<\/p>\n
<\/p>\n
Question 61.<\/p>\n
(a) Virus attack
\n(b) Worm attack
\n(c) Hacking
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n
Question 62.<\/p>\n
(a) Cybernet
\n(b) Cyber policing
\n(c) Cyber stalking
\n(d) Cyber space
\nAnswer:
\n(c) Cyber stalking<\/p>\n
Question 63.<\/p>\n
(a) install anti-virus on your computer
\n(b) take the back-up of your files regularly
\n(c) do not click on unknown links
\n(d) All of the above
\nAnswer:(d) All of the above<\/p>\n
Question 64.<\/p>\n
(a) Worm
\n(b) Spam
\n(c) Trojan
\n(d) Online marketing
\nAnswer:
\n(b) Spam<\/p>\n
Question 65.<\/p>\n
(a) Central Intelligence Agency
\n(b) Confidentiality, Integrity and Authentication
\n(c) Cognitive Intelligent Access
\n(d) None of the above
\nAnswer:
\n(b) Confidentiality, Integrity and Authentication<\/p>\n
<\/p>\n
Question 66.<\/p>\n
(a) Computer virus
\n(b) Computer trojan
\n(c) Computer worm
\n(d) Web script
\nAnswer:
\n(a) Computer virus<\/p>\n
Question 67.<\/p>\n
(a) Computer virus
\n(b) Computer trojan
\n(c) Computer worm
\n(d) Web script .
\nAnswer:
\n(c) Computer worm<\/p>\n
Question 68.<\/p>\n
(a) Virus program
\n(b) Worm script
\n(c) Anti-virus program
\n(d) Spyware
\nAnswer:
\n(c) Anti-virus program<\/p>\n
Question 69.<\/p>\n
(a) it is ok to share the password with her family members.
\n(b) it is ethical since she is helping her kid in his education.
\n(c) it is not ethical since laptop is provided to her for business use.
\n(d) it is alright provided she has taken permission from her employers.
\nAnswer:
\n(c) it is not ethical since laptop is provided to her forbusiness use.<\/p>\n
Question 70.<\/p>\n
(a) Disk Operating System
\n(b) Denial of Service
\n(c) Distributive Operative Service
\n(d) Distributed Operating System
\nAnswer:
\n(b) Denial of 5ervice<\/p>\n
Question 71.<\/p>\n
(a) CAPTCHA
\n(b) HUMAN Intelligence Test
\n(c) FIREWALL
\n(d) ANTI-VIRUS
\nAnswer:
\n(a) CAPTCHA<\/p>\n
<\/p>\n
Question 72.<\/p>\n
(a) chat software
\n(b) web mail application
\n(c) social networking
\n(d) network sharing
\nAnswer:
\n(c) social networking<\/p>\n
Question 73.<\/p>\n
(a) Operating system
\n(b) Speed of network connectivity
\n(c) Application software
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n
Question 74.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Societal Impacts and Data Protection Class 12 MCQ Questions Part 1 Question 1. A software that can be freely accessed and modified is called (a) Synchronous software (b) Package software (c) Open Source software (d) Middleware Answer: (c) Open Source software Question 2. Data which has no restriction of usage and is freely available to …<\/p>\n