{"id":37493,"date":"2022-02-22T10:14:33","date_gmt":"2022-02-22T04:44:33","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=37493"},"modified":"2022-02-22T10:14:33","modified_gmt":"2022-02-22T04:44:33","slug":"mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/","title":{"rendered":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3"},"content":{"rendered":"

Societal Impacts and Data Protection Class 12 MCQ Questions Part 3<\/h2>\n

Question 1.<\/p>\n

Which of the following is related to cyberethics?<\/h2>\n

(a) Ethics in the online environment
\n(b) Online gaming
\n(c) Ethics at school
\n(d) Telecommunications
\nAnswer:
\n(a) Ethics in the online environment<\/p>\n

\"MCQ<\/p>\n

Question 2.<\/p>\n

………is a secure technique to protect data being transmitted over a network.<\/h2>\n

(a) E-commerce
\n(b) Encryption
\n(c) Plagiarism
\n(d) Digital property
\nAnswer:
\n(b) Encryption<\/p>\n

Question 3.<\/p>\n

…….. is a form of electronic signature that authenticates a document or transaction through encryption and password.<\/h2>\n

(a) Patent
\n(b) Security certificate
\n(c) Digital signature
\n(d) Integrity
\nAnswer:
\n(c) Digital signature<\/p>\n

Question 4.<\/p>\n

…….. is1 also a unique digital identification that is used to verify the identity of an individual website or user.<\/h2>\n

(a) Security certificate
\n(b) Patent
\n(c) Digital signature
\n(d) None of these
\nAnswer:
\n(a) Security certificate<\/p>\n

Question 5.<\/p>\n

What is the full form of SSL?<\/h2>\n

(a) Secure Session Layer
\n(b) Session Secure Layer
\n(c) Secure Socket Layer
\n(d) Socket Session Layer
\nAnswer:
\n(c) Secure Socket Layer<\/p>\n

\"MCQ<\/p>\n

Question 6.<\/p>\n

Which of the following refers to intellectual property?<\/h2>\n

(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n

Question 7.<\/p>\n

Which of the following do anti-hacking solutions prevent attackers from?<\/h2>\n

(a) Accessing your hardware
\n(b) Accessing your property
\n(c) Accessing your software
\n(d) None of the above
\nAnswer:
\n(c) Accessing your software<\/p>\n

Question 8.<\/p>\n

Digital property includes<\/h2>\n

(a) digital documents
\n(b) audio files
\n(c) video files
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n

Question 9.<\/p>\n

A\/An …. for computer software and other products allows the source code to be used, modified or shared.<\/h2>\n

(a) digital signature
\n(b) patent
\n(c) open source software
\n(d) None of these
\nAnswer:
\n(c) open source software<\/p>\n

Question 10.<\/p>\n

A……..is a notice that grants the receiver of software wide-ranging rights to use, modify or redistribute that particular software.<\/h2>\n

(a) free software licence
\n(b) copyright
\n(c) open source software
\n(d) patent
\nAnswer:
\n(a) free software licence<\/p>\n

Question 11.<\/p>\n

What does a free software licence provide to the receiver of software?<\/h2>\n

(a) Provides no rights
\n(b) Right to use, modify or redistribute
\n(c) Receiver becomes the owner
\n(d) Full copyrights of software
\nAnswer:
\n(b) Right to use, modify or redistribute<\/p>\n

\"MCQ<\/p>\n

Question 12.<\/p>\n

To what kind of a society digital unite refers?<\/h2>\n

(a) Everyone is skilled
\n(b) No one is skilled
\n(c) Only half the society is skilled .
\n(d) Only rural areas have the Internet
\nAnswer:
\n(a) Everyone is skilled<\/p>\n

Question 13.<\/p>\n

……. are the etiquettes that are to be followed while communicating online.<\/h2>\n

(a) Digital signature
\n(b) Patent
\n(c) Digital unite
\n(d) Netquettes
\nAnswer:
\n(d) Netiquettes<\/p>\n

Question 14.<\/p>\n

………… refers to a society where everyone would be skilled and equipped to take advantages of various ICT services.<\/h2>\n

(a) Digital union
\n(b) Electronic unite
\n(c) Digital unite
\n(d) Digital divide
\nAnswer:
\n(c) Digital unite<\/p>\n

Question 15.<\/p>\n

After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv\u2019s email account. Revaan\u2019s activity is an example of which of the following cybercrime?<\/h2>\n

(a) Hacking
\n(b) Identity theft
\n(c) Cyber bullying
\n(d) Plagiarism
\nAnswer:
\n(b) Identity theft
\nIdentity theft means obtaining someone\u2019s credentials to commit some online fraud.<\/p>\n

Question 16.<\/p>\n

After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?<\/h2>\n

(a) You sent an email to your friend with a message saying that \u201cI am sorry\u201d.
\n(b) You sent a threatening message to your friend saying ‘”Do not try to call or talk to me\u201d.
\n(c) You created an embarrassing picture of your friend and \u2022 uploaded on your account on a social networking site.
\n(d) None of the above
\nAnswer:
\n(a) you sent an email to your friend with a message saying that \u201d1 am sorry\u201d.<\/p>\n

Question 17.<\/p>\n

You are planning to go for a vacation. You surfed the internet to get answers for the following Question ueries:<\/h2>\n

(a) Weather conditions
\n(b) Availability of air tickets and fares
\n(c) Places to visit
\n(d) Best hotel deals
\nWhich of your above mentioned actions might have created a digital footprint?
\n(a) a and b
\n(b) a, b and c
\n(c) a, c and d
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n

\"MCQ<\/p>\n

Question 18.<\/p>\n

Describe why it is important to secure your wireless router at home. Search the internet to find the rules to create a reasonably secure password Create an imaginary password for your home router. Will you share your password for home router with following people?<\/h2>\n

(a) Parents
\n(b) Friends
\n(c) Neighbours
\n(d) Home tutors
\nAnswer:
\n(a) Parents
\nWiFi router security is important otherwise any one can use our WiFi to commit fraud or cybercrimes. We shall share the password with parents only.<\/p>\n

Question 19.<\/p>\n

……….is a type of software designed to help the user’s computer detect viruses and avoid them.<\/h2>\n

(a) Malware
\n(b) Adware
\n(c) Antivi
\n(d) Both b and c
\nAnswer:
\n(c) Antivirus
\nAn antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user’s computer, it can be easily removed by scanning the entire system with antivirus help.<\/p>\n

Question 20.<\/p>\n

Which one of the following is a type of antivirus program?<\/h2>\n

(a) Question uick heal
\n(b) Mcafee
\n(c) Kaspersky
\n(d) All of these
\nAnswer:
\n(d) All of these
\nAntivirus is a kind of software program that helps to detect and remove viruses form the user’s computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Question uick Heal, Norton etc., so the correct answer is D.<\/p>\n

Question 21.<\/p>\n

It can be a software program or a hardware device that filters all data packets coming through the internet, a network, et(c) it is known as the<\/h2>\n

(a) Antivirus
\n(b) Firewall
\n(c) Cookies
\n(d) Malware .
\nAnswer:
\n(b) Firewall
\nThere are two types of firewalls – software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user’s system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses. \u2022<\/p>\n

Question 22.<\/p>\n

Which of the following refers to stealing one’s idea or invention of others and use it for their own benefits?<\/h2>\n

(a) Piracy
\n(b) Plagiarism
\n(c) Intellectual property rights
\n(d) All of the above
\nAnswer:
\n(d) All of the above
\nThe stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.<\/p>\n

Question 23.<\/p>\n

Which of the following refers to exploring the appropriate, ethical behaviours related to the online environment and digital media platform?<\/h2>\n

(a) Cyber law
\n(b) Cyberethics
\n(c) Cybersecurity
\n(d) Cybersafety
\nAnswer:
\n(b) Cyberethics
\nCyber Ethics refers to exploring the appropriate, ethical behaviours related to online environments and digital media.<\/p>\n

\"MCQ<\/p>\n

Question 24.<\/p>\n

Which of the following refers to the violation of the principle if a computer is no more accessible?<\/h2>\n

(a) Access control
\n(b) Confidentiality
\n(c) Availability
\n(d) All of these
\nAnswer:
\n(c) Availability .
\nAvailability refers to the violation of principle, if the system is no more accessible.<\/p>\n

Question 25.<\/p>\n

Which one of the following refers to the techniQuestion ue used for verifying the integrity of the message?<\/h2>\n

(a) Digital signature
\n(b) Decryption algorithm
\n(c) Protocol
\n(d) Message digest
\nAnswer:
\n(d) Message digest
\nMessage Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formul(a) It is also known as a type of techniQuestion ue used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is (d)<\/p>\n

Question 26.<\/p>\n

Which one of the following usually used in the process of Wi-Fi-hacking?<\/h2>\n

(a) Aircrack-ng
\n(b) Wireshark
\n(c) Norton
\n(d) All of these
\nAnswer:
\n(a) Aircrack-ng
\nThe Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali et(c) it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.<\/p>\n

Question 27.<\/p>\n

Which of the following port and IP address scanner famous among the users?<\/h2>\n

(a) Cain and Abel
\n(b) Angry IP Scanner
\n(c) Snort
\n(d) Ettercap
\nAnswer:
\n(b) Angry IP Scanner
\nAngry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.<\/p>\n

Question 28.<\/p>\n

In ethical hacking and cyber security, there are …….. types of scanning.<\/h2>\n

(a) 1
\n(b) 2
\n(c) 3
\n(d) 4
\nAnswer:
\n(c) 3
\nThere are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.<\/p>\n

Question 29.<\/p>\n

Which of the following is not a type of scanning?<\/h2>\n

(a) Xmas Tree Scan
\n(b) Cloud scan
\n(c) Null Scan
\n(d) SYN Stealth
\nAnswer:
\n(b) Cloud scan
\nAmong the following-given options, the Cloud Scan is one, and only that is not a type of scanning.<\/p>\n

\"MCQ<\/p>\n

Question 30.<\/p>\n

In system hacking, which of the following is the most crucial activity?<\/h2>\n

(a) Information gathering
\n(b) Covering tracks
\n(c) Cracking passwords
\n(d) None of these
\nAnswer:
\n(c) Cracking passwords
\nWhile trying to hack a system, the most important thing is cracking the passwords.<\/p>\n

Question 31.<\/p>\n

Which one of the following is actually considered as the first computer virus?<\/h2>\n

(a) Sasser
\n(b) Blaster
\n(c) Creeper
\n(d) Both a and c
\nAnswer:
\n(c) Creeper
\nThe Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.<\/p>\n

Question 32.<\/p>\n

To protect the computer system against the hacker and different kind of viruses, one must always keep on in the computer system.<\/h2>\n

(a) Antivirus
\n(b) Firewall
\n(c) Vic player
\n(d) Script
\nAnswer:
\n(b) Firewall
\nIt is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software from unknown sources. We can also consider it the first line of defense of the computer system.<\/p>\n

Question 33.<\/p>\n

Code Red is a type of ……….<\/h2>\n

(a) an antivirus program
\n(b) a photo editing software
\n(c) a computer virus
\n(d) a video editing software
\nAnswer:
\n(c) a computer virus
\nCod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.<\/p>\n

Question 34.<\/p>\n

Which of the following can be considered as the elements of cyber security?<\/h2>\n

(a) Application security
\n(b) Operational security
\n(c) Network security
\n(d) All of these
\nAnswer:
\n(d) All of these
\nApplication security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.<\/p>\n

Question 35.<\/p>\n

Which of the following are famous and common cyberattacks used by hackers to infiltrate the user’s system?<\/h2>\n

(a) DDos and Derive-by Downloads
\n(b) Malware & Malvertising
\n(c) Phishing and Password attacks
\n(d) All of the above
\nAnswer:
\n(a) DDos and Derive-by Downloads
\nDDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.<\/p>\n

Question 36.<\/p>\n

Which one of the following is also referred to as malicious software?<\/h2>\n

(a) Maliciousware
\n(b) Badware
\n(c) Ilegalware
\n(d) Malware
\nAnswer:
\n(d) Malware .
\nMalware is a kind of short program used by the hacker to gain access to sensitive data\/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.<\/p>\n

\"MCQ<\/p>\n

Question 37.<\/p>\n

In Wi-Fi Security, which of the following protocol is more used?<\/h2>\n

(a) WPA
\n(b) WPA2
\n(c) WPS
\n(d) Both a and c
\nAnswer:
\n(b) WPA2
\nNowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WP(a) It is also known as the upgraded version of the WPA protocol.<\/p>\n

Question 38.<\/p>\n

Which of the following factor of the network gets hugely impacted when the number of users exceeds the network’s limit?<\/h2>\n

(a) Reliability
\n(b) Performance
\n(c) Security
\n(d) Longevity
\nAnswer:
\n(b) Performance
\nWhen the numbers of users on a network get increased and exceed the network’s limit, therefore the performance is one of the factors of the network that is hugely impacted by it.<\/p>\n

Question 39.<\/p>\n

General Accepted standards of right and wrong in a society is called as<\/h2>\n

(a) Moral
\n(b) Ethics
\n(c) Guideline
\n(d) Code of standard
\nAnswer:
\n(a) Moral<\/p>\n

Question 40.<\/p>\n

….. is a criterion used to decide what is right or wrong.<\/h2>\n

(a) Moral standard
\n(b) Moral principle
\n(c) Moral
\n(d) Ethics
\nAnswer:
\n(a) Moral standard<\/p>\n

Question 41.<\/p>\n

…….. indicates rules and regulations to be obeyed in the organisation.<\/h2>\n

(a) Ethics
\n(b) Law
\n(c) Moral
\n(d) Privacy
\nAnswer:
\n(b) Law<\/p>\n

Question 42.<\/p>\n

Code of ethics do not includes<\/h2>\n

(a) software Piracy
\n(b) fair treatment
\n(c) communication
\n(d) co-operation
\nAnswer:
\n(a) software Piracy<\/p>\n

\"MCQ<\/p>\n

Question 43.<\/p>\n

……….. provides norms and principles to the computer users and system professionals.<\/h2>\n

(a) Code of ethics
\n(b) Guidelines
\n(c) Privacy
\n(d) Security
\nAnswer:
\n(a) Code of ethics<\/p>\n

Question 44.<\/p>\n

To make the exact copy of a program is termed as<\/h2>\n

(a) Copyright
\n(b) Software privacy
\n(c) Fair use
\n(d) Law
\nAnswer:
\n(b) Software privacy<\/p>\n

Question 45.<\/p>\n

The use of invasive software such as destructs the computer system.<\/h2>\n

(a) Unselect
\n(b) Worms’s
\n(c) Microbes
\n(d) Bacteria
\nAnswer:
\n(b) Worms’s<\/p>\n

Question 46.<\/p>\n

When a software is pirated, it harmes<\/h2>\n

(a) management
\n(b) operator
\n(c) people
\n(d) software developers
\nAnswer:
\n(d) software developers<\/p>\n

Question 47.<\/p>\n

Accessing data without permission is known as…….<\/h2>\n

(a) Unauthorized access
\n(b) Legal access
\n(c) Without permission
\n(d) With permission
\nAnswer:
\n(a) Unauthorized access<\/p>\n

Question 48.<\/p>\n

provides Legal recognition of tranaction carried out by means of eletronic commerce.<\/h2>\n

(a) IT act
\n(b) Cyber crime
\n(c) Cyber law
\n(d) Fair use
\nAnswer:
\n(c) Cyber law<\/p>\n

Question 49.<\/p>\n

…… ensures that the document originated with the person signing it and that was not tampered with after the signature was applied.<\/h2>\n

(a) Digital signature
\n(b) Coded signature
\n(c) Double signature
\n(d) Simple signature
\nAnswer:
\n(a) Digital signature<\/p>\n

\"MCQ<\/p>\n

Question 50.<\/p>\n

…….. refers to all the legal and regulatory aspects of internet and world wide web.<\/h2>\n

(a) Cyber crime
\n(b) Cyber law
\n(c) IT act
\n(d) Code of standard
\nAnswer:
\n(b) Cyber law<\/p>\n

Question 51.<\/p>\n

…….. detects and prevents known viruses which weakens the computer.<\/h2>\n

(a) Web browser
\n(b) Email
\n(c) Record
\n(d) Anti-virus
\nAnswer:
\n(d) Anti-virus<\/p>\n

Question 52.<\/p>\n

license allows for installation of a program on a software.<\/h2>\n

(a) Single user
\n(b) Network
\n(c) Site
\n(d) Lab pack
\nAnswer:
\n(b) Network<\/p>\n

Question 53.<\/p>\n

……… means a representation of information, knowledge, facts, concepts or instructions,<\/h2>\n

(a) Data
\n(b) Signature
\n(c) Access
\n(d) Program
\nAnswer:
\n(a) Data<\/p>\n

Question 54.<\/p>\n

……. means the official Gazette published in the electronic form.<\/h2>\n

(a) Electronic gazette
\n(b) Electronic record
\n(c) Electronic form
\n(d) All of these
\nAnswer:
\n(a) Electronic gazette<\/p>\n

Question 55.<\/p>\n

………key means the key of a key pair used to create a digital signature.<\/h2>\n

(a) Private
\n(b) Public
\n(c) Both a and b
\n(d) Security key
\nAnswer:
\n(a) Private<\/p>\n

\"MCQ<\/p>\n

Question 56.<\/p>\n

The legal and regulatory accepts of internet refers to<\/h2>\n

(a) cyber law
\n(b) cyber crime
\n(c) criminal law
\n(d) IT act
\nAnswer:
\n(a) cyber law<\/p>\n

Question 57.<\/p>\n

Cyber law is contained in<\/h2>\n

(a) IT Act, 2000
\n(b) Negotiable Instrument Act
\n(c) Power of Attorney
\n(d) Code of ethics
\nAnswer:
\n(a) IT Act, 2000<\/p>\n

Question 58.<\/p>\n

……… include data, text, image, sound, voice, codes, computer programs, software and database.<\/h2>\n

(a) Data
\n(b) Information
\n(c) Function
\n(d) Process
\nAnswer:
\n(b) Information<\/p>\n

Question 59.<\/p>\n

To maintain confidentiality of data and to promote integration of data is called as<\/h2>\n

(a) Security
\n(b) Privacy
\n(c) Liability
\n(d) Accountability
\nAnswer:
\n(b) Privacy<\/p>\n

Question 60.<\/p>\n

Copyright is……….<\/h2>\n

(a) an intelectual property right attached to original works in which the right subsist with him
\n(b) individuals right to access the information
\n(c) right of information
\n(d) that is not cop(yrightrd software
\nAnswer:
\n(a) an intelectual property right attached to original works in which the right subsist with him<\/p>\n

Question 61.<\/p>\n

……… software allows for anyone to use, copy and distribute it with modifications free of cost.<\/h2>\n

(a) Freeware
\n(b) Shareware
\n(c) Public domain
\n(d) Non-freeware
\nAnswer:
\n(a) Freeware<\/p>\n

Question 62.<\/p>\n

Software available on Internetare<\/h2>\n

(a) freeware
\n(b) shareware
\n(c) public domain
\n(d) None of these
\nAnswer:
\n(c) public domain<\/p>\n

Question 63.<\/p>\n

……….. is a distribution method to judge the software whether it is good or bad before you pay for it.<\/h2>\n

(a) Shareware
\n(b) Freeware
\n(c) Non-freeware software
\n(d) Public domain software
\nAnswer:
\n(b) Freeware<\/p>\n

\"MCQ<\/p>\n

Question 64.<\/p>\n

……… is a discipline that deals with issues in copyright, trademark and patent laws.<\/h2>\n

(a) Cyber law
\n(b) IT Act
\n(c) Cyber crime
\n(d) Intellectual Property Rights
\nAnswer:
\n(a) Cyber law<\/p>\n

Question 65.<\/p>\n

…….. laws grant the creator the exclusive rights to reproduce, perform, distribute and display the work publicly.<\/h2>\n

(a) Copyright
\n(b) Cyber law
\n(c) Pair issue
\n(d) Cyber crime
\nAnswer:
\n(a) Copyright<\/p>\n

Question 66.<\/p>\n

……..gives the protection to original work.<\/h2>\n

(a) Access
\n(b) Address
\n(c) Users
\n(d) Copyright
\nAnswer:
\n(d) Copyright<\/p>\n

Question 67.<\/p>\n

………. is a leagal use of copyrighted material without explicit permission from the copyrighted holder.<\/h2>\n

(a) Copyright
\n(b) Fair use
\n(c) Unauthorized access
\n(d) Property right
\nAnswer:
\n(b) Fair use<\/p>\n

Question 68.<\/p>\n

Which of the following is not a type of cybercrime?<\/h2>\n

(a) Data theft
\n(b) Forgery
\n(c) Damage to data and systems
\n(d) Installing antivirus for protection
\nAnswer:
\n(d) Installing antivirus for protection<\/p>\n

Question 69.<\/p>\n

Which of the following refers to intellectual property?<\/h2>\n

(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n

Question 70.<\/p>\n

……. is the verbatim transcription of a section of someone else work, without making any changes in original work.<\/h2>\n

(a) Minimal plagiarism
\n(b) Mosaic
\n(c) Direct or complete plagiarism
\n(d) None of the above
\nAnswer:
\n(c) Direct or complete plagiarism<\/p>\n

Question 71.<\/p>\n

Which of the following refers to intellectual property?<\/h2>\n

(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n

Question 72.<\/p>\n

Which of the following do anti-hacking solutions prevent attackers from?<\/h2>\n

(a) Accessing your hardware
\n(b) Accessing your property
\n(c) Accessing your software
\n(d) None of the above
\nAnswer:
\n(c) Accessing your software<\/p>\n

Question 73.<\/p>\n

Using…….. encrypted data is decrypted.<\/h2>\n

(a) digital certificate
\n(b) key
\n(c) firewall
\n(d) digital certification
\nAnswer:
\n(b) key<\/p>\n

\"MCQ<\/p>\n

Question 74.<\/p>\n

Which of the following is related to cyberethics?<\/h2>\n

(a) Ethics in the online environment
\n(b) Online gaming
\n(c) Ethics at school
\n(d) Telecommunications
\nAnswer:
\n(a) Ethics in the online environment<\/p>\n

MCQ Questions for Class 12 Informatics Practices with Answers<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"

Societal Impacts and Data Protection Class 12 MCQ Questions Part 3 Question 1. Which of the following is related to cyberethics? (a) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications Answer: (a) Ethics in the online environment Question 2. ………is a secure technique to protect data being transmitted over …<\/p>\n

MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3<\/span> Read More »<\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","spay_email":""},"categories":[35],"tags":[],"yoast_head":"\nMCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions\" \/>\n<meta property=\"og:description\" content=\"Societal Impacts and Data Protection Class 12 MCQ Questions Part 3 Question 1. Which of the following is related to cyberethics? (a) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications Answer: (a) Ethics in the online environment Question 2. ………is a secure technique to protect data being transmitted over … MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 Read More »\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"MCQ Questions\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NCERTSolutionsGuru\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-22T04:44:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ncertsolguru\" \/>\n<meta name=\"twitter:site\" content=\"@ncertsolguru\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Prasanna\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/mcq-questions.com\/#website\",\"url\":\"https:\/\/mcq-questions.com\/\",\"name\":\"MCQ Questions\",\"description\":\"MCQ Questions for Class 1 to 12\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/mcq-questions.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/i0.wp.com\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png?fit=159%2C13&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png?fit=159%2C13&ssl=1\",\"width\":159,\"height\":13,\"caption\":\"MCQ Questions\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#webpage\",\"url\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/\",\"name\":\"MCQ Questions for Class 12 Informatics Practices \\u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions\",\"isPartOf\":{\"@id\":\"https:\/\/mcq-questions.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#primaryimage\"},\"datePublished\":\"2022-02-22T04:44:33+00:00\",\"dateModified\":\"2022-02-22T04:44:33+00:00\",\"author\":{\"@id\":\"https:\/\/mcq-questions.com\/#\/schema\/person\/4ba9570f32f2057e70e670c7885e47f3\"},\"breadcrumb\":{\"@id\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/mcq-questions.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"MCQ Questions for Class 12 Informatics Practices \\u2013 Societal Impacts and Data Protection Matplotlib Part 3\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/mcq-questions.com\/#\/schema\/person\/4ba9570f32f2057e70e670c7885e47f3\",\"name\":\"Prasanna\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/mcq-questions.com\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/174540ad43736c7d1a4c4f83c775e74d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/174540ad43736c7d1a4c4f83c775e74d?s=96&d=mm&r=g\",\"caption\":\"Prasanna\"},\"url\":\"https:\/\/mcq-questions.com\/author\/prasanna\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/","og_locale":"en_US","og_type":"article","og_title":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions","og_description":"Societal Impacts and Data Protection Class 12 MCQ Questions Part 3 Question 1. Which of the following is related to cyberethics? (a) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications Answer: (a) Ethics in the online environment Question 2. ………is a secure technique to protect data being transmitted over … MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 Read More »","og_url":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/","og_site_name":"MCQ Questions","article_publisher":"https:\/\/www.facebook.com\/NCERTSolutionsGuru\/","article_published_time":"2022-02-22T04:44:33+00:00","og_image":[{"url":"https:\/\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png"}],"twitter_card":"summary_large_image","twitter_creator":"@ncertsolguru","twitter_site":"@ncertsolguru","twitter_misc":{"Written by":"Prasanna","Est. reading time":"17 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/mcq-questions.com\/#website","url":"https:\/\/mcq-questions.com\/","name":"MCQ Questions","description":"MCQ Questions for Class 1 to 12","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mcq-questions.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#primaryimage","inLanguage":"en-US","url":"https:\/\/i0.wp.com\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png?fit=159%2C13&ssl=1","contentUrl":"https:\/\/i0.wp.com\/mcq-questions.com\/wp-content\/uploads\/2022\/01\/MCQ-Questions.png?fit=159%2C13&ssl=1","width":159,"height":13,"caption":"MCQ Questions"},{"@type":"WebPage","@id":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#webpage","url":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/","name":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3 - MCQ Questions","isPartOf":{"@id":"https:\/\/mcq-questions.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#primaryimage"},"datePublished":"2022-02-22T04:44:33+00:00","dateModified":"2022-02-22T04:44:33+00:00","author":{"@id":"https:\/\/mcq-questions.com\/#\/schema\/person\/4ba9570f32f2057e70e670c7885e47f3"},"breadcrumb":{"@id":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mcq-questions.com\/"},{"@type":"ListItem","position":2,"name":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3"}]},{"@type":"Person","@id":"https:\/\/mcq-questions.com\/#\/schema\/person\/4ba9570f32f2057e70e670c7885e47f3","name":"Prasanna","image":{"@type":"ImageObject","@id":"https:\/\/mcq-questions.com\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/174540ad43736c7d1a4c4f83c775e74d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/174540ad43736c7d1a4c4f83c775e74d?s=96&d=mm&r=g","caption":"Prasanna"},"url":"https:\/\/mcq-questions.com\/author\/prasanna\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/posts\/37493"}],"collection":[{"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/comments?post=37493"}],"version-history":[{"count":4,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/posts\/37493\/revisions"}],"predecessor-version":[{"id":37500,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/posts\/37493\/revisions\/37500"}],"wp:attachment":[{"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/media?parent=37493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/categories?post=37493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mcq-questions.com\/wp-json\/wp\/v2\/tags?post=37493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}