{"id":37471,"date":"2022-02-21T18:55:49","date_gmt":"2022-02-21T13:25:49","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=37471"},"modified":"2022-02-22T10:10:38","modified_gmt":"2022-02-22T04:40:38","slug":"mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-2","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-2\/","title":{"rendered":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 2"},"content":{"rendered":"
Question 1.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 2.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
<\/p>\n
Question 3.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Question 4.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 5.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
<\/p>\n
Question 6.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 7.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Question 8.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 9.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Question 10.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
<\/p>\n
Question 11.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 12.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
Question 13.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Question 14.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\n
Question 15.<\/p>\n
(a) True
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\n
<\/p>\n
Question 16.<\/span><\/p>\n (a) True Question 17.<\/p>\n (a) True Question 18.<\/p>\n (a) True Question 19.<\/p>\n (a) True Question 20.<\/p>\n (a) True <\/p>\n Question 21.<\/p>\n (a) True Question 22.<\/p>\n (a) True Question 23.<\/p>\n (a) True Question 24.<\/p>\n (a) True <\/p>\n Question 25.<\/p>\n (a) Inform Garvit so that he may change his password. Question 26.<\/p>\n (a) fair use Question 27.<\/p>\n (a) An honest, moral code that should be followed when on the computer Question 28.<\/p>\n (a) E-commerce Question 29.<\/p>\n (a) anytime <\/p>\n Question 30.<\/p>\n (a) E-commerce Question 31.<\/p>\n (a) Effective Data Interchange Question 32.<\/p>\n (a) Informatics and Communication Technology Question 33.<\/p>\n (a) Internet marketing Question 34.<\/p>\n (a) Security Question 35.<\/p>\n (a) Ethics in the online environment <\/p>\n Question 36.<\/p>\n (a) Confidentiality, integrity Question 37.<\/p>\n (a) E-commerce Question 38.<\/p>\n (a) confidential <\/p>\n Question 39.<\/p>\n (a) confidentiality Question 40.<\/p>\n (a) Confidentiality Question 41.<\/p>\n (a) database hacking Question 42.<\/p>\n (a) Confidentiality <\/p>\n Question 43.<\/p>\n (a) They help understanding hacking better Question 44.<\/p>\n (a) confidentiality Question 45.<\/p>\n (a) encryption Question 46.<\/p>\n (a) Biometric verification Question 47.<\/p>\n (a) access control, file deletion <\/p>\n Question 48.<\/p>\n (a) Big data Question 49.<\/p>\n (a) data clustering Question 50.<\/p>\n (a) encrypts Question 51.<\/p>\n (a) ciphertext Question 52.<\/p>\n (a) integrity <\/p>\n Question 53.<\/p>\n (a) User certificate Question 54.<\/p>\n (a) Session Hypertext Transfer Protocol Question 55.<\/p>\n (a) certificate authority software Question 56.<\/p>\n (a) ethics Question 57.<\/p>\n (a) Plagiarism Question 58.<\/p>\n (a) patent Question 59.<\/p>\n (a) patent Question 60.<\/p>\n (a) seven Question 61.<\/p>\n (a) Patent Question 62.<\/p>\n (a) minimal plagiarism Question 63.<\/p>\n (a) Electronic assets Question 64.<\/p>\n (a) Digital Rights Management (DRM) <\/p>\n Question 65.<\/p>\n (a) Digital Rights Management (DRM) Question 66.<\/p>\n (a) digital rights management Question 67.<\/p>\n (a) digital rights management Question 68.<\/p>\n (a) software licence Question 69.<\/p>\n (a) plagiarism Question 70.<\/p>\n (a) End-User Licence Agreement Question 71.<\/p>\n (a) publisher software licences <\/p>\n Question 72.<\/p>\n (a) publisher software licences Question 73.<\/p>\n (a) Publisher software licences Question 74.<\/p>\n (a) Lower General Public Licence Societal Impacts and Data Protection Class 12 MCQ Questions Part 2 Question 1. It is okay to copy and paste information from the internet into your report then organise it. (a) True (b) False (c) Error (d) None of these Answer: (b) False Question 2. Shareware software allows you to try the software before you …<\/p>\nA worm is a self-replicating program.<\/h2>\n
\n(b) False
\n(c) Error
\nd.None of these
\nAnswer:
\n(a) True<\/p>\nA Trojan horse is a utility program that does harm when its date gets expired.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\nSpyware is healthy software which keeps an eye.of activities happening on your computer.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\nAdware are the programs that deliver unwanted ads to your computer.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\nMalware is a special type of virus.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(b) False<\/p>\nSpamming refers to the sending of bulk-mail by an identified or unidentified source.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\nPhishing involves authentic looking sites trying to collect your sensitive transactional and identity information.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\nTo keep a computer protected, one should use updated software, be cautious while handling mails and surfing internet, scanning computer regularly, etc.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\nFirewall can be implemented in software as well as in hardware.<\/h2>\n
\n(b) False
\n(c) Error
\n(d) None of these
\nAnswer:
\n(a) True<\/p>\nRishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do?<\/h2>\n
\n(b) Give the password of Garvit’s e-mail ID to all other classmates.
\n(c) Use Garvit’s password to access his account.
\n(d) None of the above
\nAnswer:
\n(a) Inform Garvit so that he may change his password.<\/p>\nSuhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enQuestion uired about the computer class. She also reQuestion uested him to explain the concept. Shaurya said, \u201cMam taught u show to use tuples in python\u201d. Further, he generously said, \u201cGive me sometime, I will email you the material which will help you to understand tuples in python”. Shaurya Question uickly downloaded a 2-minute clip from the internet explaining the concept of tuples in python. Using video editor, he added the text \u201cPrepared by Shaurya\u201d in the downloaded video clip. Then, he emailed the modified video clip to Suhana.This act of Shaurya is an example of:<\/h2>\n
\n(b) hacking
\n(c) copyright infringement
\n(d) cybercrime
\nAnswer:
\n(c) copyright infringement<\/p>\nWhat are computer ethics?<\/h2>\n
\n(b) A computer program about honesty
\n(c) A computer that fits on or under a desk
\n(d) A list of commandments in the Bible
\nAnswer:
\n(a) An honest, moral code that should be followed when on \u2022 the computer<\/p>\n……. are the ethics, or the moral principles, applied to the online environment.<\/h2>\n
\n(b) E-shopping
\n(c) Cyberethics
\n(d) Cyberbuling
\nAnswer:
\n(c) Cyberethics<\/p>\nIn this modern age, users have easy access to large volumes of information available<\/h2>\n
\n(b) anywhere
\n(c) almost for anybody
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\nThe branch of ICT that allows selling or buying things online, is known as<\/h2>\n
\n(b) E-shopping
\n(c) E-learning
\n(d) E-reservation
\nAnswer:
\n(a) E-commerce
\nThe process of buying and selling of products or services over electronic systems and using communication technology like Internet is defined as e-commerce.<\/p>\nEDI stands for<\/h2>\n
\n(b) Electrical Data Interchange
\n(c) Electronic Data Interchange
\n(d) None of the above
\nAnswer:
\n(c) Electronic Data Interchange<\/p>\nICT stands for<\/h2>\n
\n(b) Information and Communication Trade
\n(c) Information and Commerce Technology
\n(d) Information and Communication Technologies
\nAnswer:
\n(d) Information and Communication Technologies<\/p>\nE-commerce not only covers buying or selling, rather a wide variety of commerce including electronic funds transfer, supply chain management etc.<\/h2>\n
\n(b) online transaction processing,
\n(c) Electronic data interchange (EDI)
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n………. is an essential part of any electronic transaction that takes place over the Internet.<\/h2>\n
\n(b) Networking
\n(c) Communication
\n(d) Password
\nAnswer:
\n(a) Security<\/p>\nWhich of the following is related to cyberethics?<\/h2>\n
\n(b) Online gaming
\n(c) Ethics at school
\n(d) Telecommunications
\nAnswer:
\n(a) Ethics in the online environment<\/p>\n………. are the fundamental requisites that ensure safe electronic transactions and payments.<\/h2>\n
\n(b) Encryption, availability
\n(c) Authenticity
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n…… is a secure technique to protect data being transmitted over a network.<\/h2>\n
\n(b) Encryption
\n(c) Plagiarism
\n(d) Digital property
\nAnswer:
\n(b) Encryption<\/p>\nSuch information should be kept ……..and not be accessible by any unauthorised person.<\/h2>\n
\n(b) integrity
\n(c) encryption
\n(d) Available
\nAnswer:
\n(a) confidential<\/p>\nWhen you use the word……it means you are protecting your data from getting disclosed.<\/h2>\n
\n(b) integrity
\n(c) authentication
\n(d) availability
\nAnswer:
\n(a) confidentiality
\nConfidentiality is what every individual prefer in terms of physical privacy as well as digital privacy. This term means our information needs to be protected from getting disclose to unauthorised parties, for which we use different security mechanisms like password protection, biometric security, OTPs (One Time Passwords) etc.<\/p>\n……. means the protection of data from modification by unknown users.<\/h2>\n
\n(b) Integrity
\n(c) Authentication
\n(d) Non-repudiation
\nAnswer:
\n(b) Integrity
\nA information only seems valuable if it is correct and do not get modified during its journey in the course of arrival. The element integrity makes sure that the data sent or generated from other end is correct and is not modified by any unauthorised party in between.<\/p>\nWhen integrity is lacking in a security system, occurs.<\/h2>\n
\n(b) data deletion
\n(c) data tampering
\n(d) data leakage
\nAnswer:
\n(c) data tampering
\nThe term data tampering is used when integrity is ‘ compromised in any security model and checking its integrity later becomes costlier. Example: let suppose you sent $50 to an authorised person and in between a Man in the Middle (MiTM) attack takes place and the value has tampered to $500. This is how integrity is compromised.<\/p>\n………. of information means, only authorised users are capable of accessing the information.<\/h2>\n
\n(b) Integrity
\n(c) Non-repudiation
\n(d) Availability
\nAnswer:
\n(d) Availability
\nInformation seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.<\/p>\nWhy these 4 elements (confidentiality, integrity, authenticity & availability) are considered fundamental?<\/h2>\n
\n(b) They are key elements to a security breach
\n(c) They help understands security and its components better
\n(d) They help to understand the cyber-crime better
\nAnswer:
\n(c) They help understands security and its components better The four elements of security viz. confidentiality, integrity, authenticity & availability helps in better understanding the pillars of security and its different components.<\/p>\nThis helps in identifying the origin of information and authentic user. This referred to here as<\/h2>\n
\n(b) integrity
\n(c) authenticity
\n(d) availability
\nAnswer:
\n(c) authenticity
\nThe key element, authenticity helps in assuring the fact that the information is from the original source.<\/p>\nData ……..is used to ensure confidentiality.<\/h2>\n
\n(b) locking
\n(c) deleting
\n(d) backup
\nAnswer:
\n(a) encryption
\nData encryption is the method of converting plain text to cipher-text and only authorised users can decrypt the message back to plain text. This preserves the confidentiality of data.<\/p>\nWhich of these is not a proper method of maintaining confidentiality?<\/h2>\n
\n(b) ID and password based verification
\n(c) 2-factor authentication
\n(d) switching off the phone
\nAnswer:
\n(d) switching off the phone
\nSwitching off the phone in the fear of preserving the confidentiality of data is not a proper solution for data confidentiality. Fingerprint detection, face recognition, password-based authentication, two-step verifications are some of these.<\/p>\nData integrity gets compromised when…….. and …….are taken control off.<\/h2>\n
\n(b) network, file permission
\n(c) access control, file permission
\n(d) network, system
\nAnswer:
\n(c) access control, file permission
\nThe two key ingredients that need to be kept safe are: access control and file permission in order to preserve data integrity.<\/p>\n……….is the latest technology that faces an extra challenge because of CIA paradigm.<\/h2>\n
\n(b) Database systems
\n(c) Cloud storages
\n(d) 5mart dust
\nAnswer:
\n(a) Big data
\nBig data has additional challenges that it has to face because of the tremendous volume of data that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and time-consuming.<\/p>\nOne common way to maintain data availability is ……….<\/h2>\n
\n(b) data backup
\n(c) data recovery
\n(d) data Altering
\nAnswer:
\n(b) data backup
\nFor preventing data from data-loss, or damage data backup can be done and stored in a different geographical location so that it can sustain its data from natural disasters & unpredictable events.<\/p>\nThe sender of the information ……… the data using a secret code and the specified receiver only can decrypt the data using the same or different secret code.<\/h2>\n
\n(b) decrypts
\n(c) Both a and b
\n(d) None of these
\nAnswer:
\n(a) encrypts<\/p>\nEncryption is a process of converting plain text or data into………so that the transmitted information cannot be accessed by anyone other than the receiver and the sender.<\/h2>\n
\n(b) simple text
\n(c) encoded text
\n(d) decrypted text
\nAnswer:
\n(a) ciphertext<\/p>\nThe use of the digital signatures should be encouraged while doing online transactions to ensure the of information.<\/h2>\n
\n(b) availability
\n(c) confidentiality
\n(d) authenticity
\nAnswer:
\n(d) authenticity<\/p>\nSecurity certificate is also a unique digital identification that is used to verify the identity of an individual website or user.<\/h2>\n
\n(b) Security certificate
\n(c) Secure certificate
\n(d) None of these
\nAnswer:
\n(b) Security certificate<\/p>\nSHTTP stands for<\/h2>\n
\n(b) Socket Hypertext Transfer Protocol
\n(c) Secure Hypertext Transfer Protocol
\n(d) None of the above
\nAnswer:
\n(c) Secure Hypertext Transfer Protocol<\/p>\nSecure electronic transaction is a secure protocol developed requirements in the field of e-commerce.<\/h2>\n
\n(b) merchant software
\n(c) card holder\u2019s digital wallet
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\nThe term generally refers to a set of moral principles that govern the behaviour of an individual or a group of individuals.<\/h2>\n
\n(b) security
\n(c) encryption
\n(d) decryption
\nAnswer:
\n(a) ethics<\/p>\n………. are some common issues that are governed by computer ethics.<\/h2>\n
\n(b) Cyber bullying
\n(c) Hacking
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\nThe law grants exclusive rights to a variety of intellectual works such as literary, musical, artistic works and much more.<\/h2>\n
\n(b) copyright
\n(c) intellectual property
\n(d) None of these
\nAnswer:
\n(c) intellectual property<\/p>\nA person or a group of persons or an organisation or company can get their invention covered under a …….to protect it from unauthorised use.<\/h2>\n
\n(b) copyright
\n(c) intellectual property
\n(d) None of these
\nAnswer:
\n(a) patent
\nPatent is a legal document that gives the inventor sole rights to make, sell or use an invention.<\/p>\nA trademark is valid for……..years and can be renewed after that.<\/h2>\n
\n(b) five
\n(c) ten
\n(d) twelve<\/p>\n
\nAnswer:
\n(c) ten
\nA logo or symbol that is printed on business items to make it exclusive, is known as a trademark.<\/p>\n………. covers literary and artistic establishments such as books, plays, novels, articles, music compositions and much more.<\/h2>\n
\n(b) Copyright
\n(c) Intellectual property
\n(d) None of these
\nAnswer:
\n(b) Copyright
\nCopyright is a right that is granted by law to the creator or inventor for his original work. The rights concerning a copy of any product are reserved by the writer or the company that has published the work.<\/p>\nin the original work is edited, reframed and reproduce(d) It is very common in the education field.<\/h2>\n
\n(b) direct or complete plagiarism:
\n(c) mosaic or substantial plagiarism:
\n(d) None of the above
\nAnswer:
\n(a) minimal plagiarism<\/p>\n……. that users create, and which exist in any kind of digital form, for example, online or on storage media, constitute the digital property of users.<\/h2>\n
\n(b) Digital assets
\n(c) E-assets
\n(d) None of these
\nAnswer:
\n(b) Digital assets<\/p>\n…………. keeps your software’s source code in safe hands to make sure that no one can obtain it without authorisation.<\/h2>\n
\n(b) Anti-hacker software
\n(c) Software escrow ,
\n(d) None of the above
\nAnswer:
\n(c) Software escrow<\/p>\ncontrols the use, modification, and distribution of copyrighted works, such as software or other digital products.<\/h2>\n
\n(b) anti-hacker software
\n(c) Software escrow .
\n(d) None of the above
\nAnswer:
\n(a) Digital Rights Management (DRM)<\/p>\nA…….solution may also protect your software from being accessed for source codes using computer programs like decompilers.<\/h2>\n
\n(b) anti-hacker software
\n(c) software escrow
\n(d) None of the above
\nAnswer:
\n(a) digital rights management<\/p>\nThere are many ……….. and technologies available which can be used to protect digital assets such as proprietary software, applications, tools, etc.<\/h2>\n
\n(b) anti-hacker software
\n(c) software escrow
\n(d) None of the above
\nAnswer:
\n(b) anti-hacker software<\/p>\nA……….is a document that provides legally binding guidelines for the use and distribution of software.<\/h2>\n
\n(b) document licence
\n(c) e-licence
\n(d) None of these
\nAnswer:
\n(a) software licence<\/p>\nSoftware licences typically provide end-users with the right to one or more copies of the software without violating<\/h2>\n
\n(b) copyrights
\n(c) trademark
\n(d) patent
\nAnswer:
\n(b) copyrights<\/p>\nEULA stands for<\/h2>\n
\n(b) Electronic-User Licence Agreement
\n(c) Both a and b
\n(d) None of the above
\nAnswer:
\n(a) End-User Licence Agreement<\/p>\nThe primary aspect of……..is that a software publisher allows the use of one or more copies of software under the end-user licence agreement (EULA), but ownership of those copies remains with in the software publisher.<\/h2>\n
\n(b) proprietary software licences
\n(c) public software licences
\n(d) None of the above
\nAnswer:
\n(b) proprietary software licences<\/p>\nA ………is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.<\/h2>\n
\n(b) proprietary software licences
\n(c) free software licences
\n(d) open source software licence
\nAnswer:
\n(c) free software licences<\/p>\n……….. for computer software and other products allows the source code or design to be used, modified and\/or shared under defined terms and conditions.<\/h2>\n
\n(b) Proprietary software licences
\n(c) Free software licences
\n(d) Open source Software Licence
\nAnswer:
\n(d) Open source Software Licence<\/p>\nLGPL stands for<\/h2>\n
\n(b) Lesser General Public Licence
\n(c) Least General Public Licence
\n(d) None of the above
\nAnswer:
\n(b) Lesser General Public Licence<\/p>\nMCQ Questions for Class 12 Informatics Practices with Answers<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"