{"id":37493,"date":"2022-02-22T10:14:33","date_gmt":"2022-02-22T04:44:33","guid":{"rendered":"https:\/\/mcq-questions.com\/?p=37493"},"modified":"2022-02-22T10:14:33","modified_gmt":"2022-02-22T04:44:33","slug":"mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3","status":"publish","type":"post","link":"https:\/\/mcq-questions.com\/mcq-questions-for-class-12-informatics-practices-societal-impacts-and-data-protection-matplotlib-part-3\/","title":{"rendered":"MCQ Questions for Class 12 Informatics Practices \u2013 Societal Impacts and Data Protection Matplotlib Part 3"},"content":{"rendered":"
Question 1.<\/p>\n
(a) Ethics in the online environment
\n(b) Online gaming
\n(c) Ethics at school
\n(d) Telecommunications
\nAnswer:
\n(a) Ethics in the online environment<\/p>\n
<\/p>\n
Question 2.<\/p>\n
(a) E-commerce
\n(b) Encryption
\n(c) Plagiarism
\n(d) Digital property
\nAnswer:
\n(b) Encryption<\/p>\n
Question 3.<\/p>\n
(a) Patent
\n(b) Security certificate
\n(c) Digital signature
\n(d) Integrity
\nAnswer:
\n(c) Digital signature<\/p>\n
Question 4.<\/p>\n
(a) Security certificate
\n(b) Patent
\n(c) Digital signature
\n(d) None of these
\nAnswer:
\n(a) Security certificate<\/p>\n
Question 5.<\/p>\n
(a) Secure Session Layer
\n(b) Session Secure Layer
\n(c) Secure Socket Layer
\n(d) Socket Session Layer
\nAnswer:
\n(c) Secure Socket Layer<\/p>\n
<\/p>\n
Question 6.<\/p>\n
(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n
Question 7.<\/p>\n
(a) Accessing your hardware
\n(b) Accessing your property
\n(c) Accessing your software
\n(d) None of the above
\nAnswer:
\n(c) Accessing your software<\/p>\n
Question 8.<\/p>\n
(a) digital documents
\n(b) audio files
\n(c) video files
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n
Question 9.<\/p>\n
(a) digital signature
\n(b) patent
\n(c) open source software
\n(d) None of these
\nAnswer:
\n(c) open source software<\/p>\n
Question 10.<\/p>\n
(a) free software licence
\n(b) copyright
\n(c) open source software
\n(d) patent
\nAnswer:
\n(a) free software licence<\/p>\n
Question 11.<\/p>\n
(a) Provides no rights
\n(b) Right to use, modify or redistribute
\n(c) Receiver becomes the owner
\n(d) Full copyrights of software
\nAnswer:
\n(b) Right to use, modify or redistribute<\/p>\n
<\/p>\n
Question 12.<\/p>\n
(a) Everyone is skilled
\n(b) No one is skilled
\n(c) Only half the society is skilled .
\n(d) Only rural areas have the Internet
\nAnswer:
\n(a) Everyone is skilled<\/p>\n
Question 13.<\/p>\n
(a) Digital signature
\n(b) Patent
\n(c) Digital unite
\n(d) Netquettes
\nAnswer:
\n(d) Netiquettes<\/p>\n
Question 14.<\/p>\n
(a) Digital union
\n(b) Electronic unite
\n(c) Digital unite
\n(d) Digital divide
\nAnswer:
\n(c) Digital unite<\/p>\n
Question 15.<\/p>\n
(a) Hacking
\n(b) Identity theft
\n(c) Cyber bullying
\n(d) Plagiarism
\nAnswer:
\n(b) Identity theft
\nIdentity theft means obtaining someone\u2019s credentials to commit some online fraud.<\/p>\n
Question 16.<\/p>\n
(a) You sent an email to your friend with a message saying that \u201cI am sorry\u201d.
\n(b) You sent a threatening message to your friend saying ‘”Do not try to call or talk to me\u201d.
\n(c) You created an embarrassing picture of your friend and \u2022 uploaded on your account on a social networking site.
\n(d) None of the above
\nAnswer:
\n(a) you sent an email to your friend with a message saying that \u201d1 am sorry\u201d.<\/p>\n
Question 17.<\/p>\n
(a) Weather conditions
\n(b) Availability of air tickets and fares
\n(c) Places to visit
\n(d) Best hotel deals
\nWhich of your above mentioned actions might have created a digital footprint?
\n(a) a and b
\n(b) a, b and c
\n(c) a, c and d
\n(d) All of these
\nAnswer:
\n(d) All of these<\/p>\n
<\/p>\n
Question 18.<\/p>\n
(a) Parents
\n(b) Friends
\n(c) Neighbours
\n(d) Home tutors
\nAnswer:
\n(a) Parents
\nWiFi router security is important otherwise any one can use our WiFi to commit fraud or cybercrimes. We shall share the password with parents only.<\/p>\n
Question 19.<\/p>\n
(a) Malware
\n(b) Adware
\n(c) Antivi
\n(d) Both b and c
\nAnswer:
\n(c) Antivirus
\nAn antivirus is a kind of software that is specially designed to help the user’s computer to detect the virus as well as to avoid the harmful effect of them. In some cases where the virus already resides in the user’s computer, it can be easily removed by scanning the entire system with antivirus help.<\/p>\n
Question 20.<\/p>\n
(a) Question uick heal
\n(b) Mcafee
\n(c) Kaspersky
\n(d) All of these
\nAnswer:
\n(d) All of these
\nAntivirus is a kind of software program that helps to detect and remove viruses form the user’s computer and provides a safe environment for users to work on. There are several kinds of antivirus software are available in the market, such as Kaspersky, Mcafee, Question uick Heal, Norton etc., so the correct answer is D.<\/p>\n
Question 21.<\/p>\n
(a) Antivirus
\n(b) Firewall
\n(c) Cookies
\n(d) Malware .
\nAnswer:
\n(b) Firewall
\nThere are two types of firewalls – software programs and hardware-based firewalls. These types of firewalls filter each and every data packet coming from the outside environment such as network; internet so that any kind of virus would not be able to enter in the user’s system. In some cases where the firewall detects any suspicious data packet, it immediately burns or terminates that data packet. In short, we can also say that it is the first line of defense of the system to avoid several kinds of viruses. \u2022<\/p>\n
Question 22.<\/p>\n
(a) Piracy
\n(b) Plagiarism
\n(c) Intellectual property rights
\n(d) All of the above
\nAnswer:
\n(d) All of the above
\nThe stealing ideas or the invention of others and using them for their own profits can also be defined in several different ways, such as piracy, intellectual property rights, and plagiarism.<\/p>\n
Question 23.<\/p>\n
(a) Cyber law
\n(b) Cyberethics
\n(c) Cybersecurity
\n(d) Cybersafety
\nAnswer:
\n(b) Cyberethics
\nCyber Ethics refers to exploring the appropriate, ethical behaviours related to online environments and digital media.<\/p>\n
<\/p>\n
Question 24.<\/p>\n
(a) Access control
\n(b) Confidentiality
\n(c) Availability
\n(d) All of these
\nAnswer:
\n(c) Availability .
\nAvailability refers to the violation of principle, if the system is no more accessible.<\/p>\n
Question 25.<\/p>\n
(a) Digital signature
\n(b) Decryption algorithm
\n(c) Protocol
\n(d) Message digest
\nAnswer:
\n(d) Message digest
\nMessage Digest is a type of cryptographic hash function that contains a string of digits that are created by the one-way hashing formul(a) It is also known as a type of techniQuestion ue used for verifying the integrity of the message, data or media, and to detect if any manipulations are made. Therefore the correct answer is (d)<\/p>\n
Question 26.<\/p>\n
(a) Aircrack-ng
\n(b) Wireshark
\n(c) Norton
\n(d) All of these
\nAnswer:
\n(a) Aircrack-ng
\nThe Aircrack-ng is a kind of software program available in the Linux-based operating systems such as Parrot, kali et(c) it is usually used by users while hacking the Wi-Fi-networks or finding vulnerabilities in the network to capture or monitor the data packets traveling in the network.<\/p>\n
Question 27.<\/p>\n
(a) Cain and Abel
\n(b) Angry IP Scanner
\n(c) Snort
\n(d) Ettercap
\nAnswer:
\n(b) Angry IP Scanner
\nAngry IP Scanner is a type of hacking tool that is usually used by both white hat and black hat types of hackers. It is very famous among the users because it helps to find the weaknesses in the network devices.<\/p>\n
Question 28.<\/p>\n
(a) 1
\n(b) 2
\n(c) 3
\n(d) 4
\nAnswer:
\n(c) 3
\nThere are usually three types of scanning in ethical hacking and cyber security. Therefore the correct answer is C.<\/p>\n
Question 29.<\/p>\n
(a) Xmas Tree Scan
\n(b) Cloud scan
\n(c) Null Scan
\n(d) SYN Stealth
\nAnswer:
\n(b) Cloud scan
\nAmong the following-given options, the Cloud Scan is one, and only that is not a type of scanning.<\/p>\n
<\/p>\n
Question 30.<\/p>\n
(a) Information gathering
\n(b) Covering tracks
\n(c) Cracking passwords
\n(d) None of these
\nAnswer:
\n(c) Cracking passwords
\nWhile trying to hack a system, the most important thing is cracking the passwords.<\/p>\n
Question 31.<\/p>\n
(a) Sasser
\n(b) Blaster
\n(c) Creeper
\n(d) Both a and c
\nAnswer:
\n(c) Creeper
\nThe Creeper is called the first computer virus as it replicates itself (or clones itself) and spread from one system to another. It is created by Bob Thomas at BBN in early 1971 as an experimental computer program.<\/p>\n
Question 32.<\/p>\n
(a) Antivirus
\n(b) Firewall
\n(c) Vic player
\n(d) Script
\nAnswer:
\n(b) Firewall
\nIt is essential to always keep the firewall on in our computer system. It saves the computer system against hackers, viruses, and installing software from unknown sources. We can also consider it the first line of defense of the computer system.<\/p>\n
Question 33.<\/p>\n
(a) an antivirus program
\n(b) a photo editing software
\n(c) a computer virus
\n(d) a video editing software
\nAnswer:
\n(c) a computer virus
\nCod Red is a type of Computer virus that was first discovered on 15 July in 2001 as it attacks the servers of Microsoft. In a couple of next days, it infects almost 300,000 servers.<\/p>\n
Question 34.<\/p>\n
(a) Application security
\n(b) Operational security
\n(c) Network security
\n(d) All of these
\nAnswer:
\n(d) All of these
\nApplication security, operational security, network security all are the main and unforgettable elements of Cyber Security. Therefore the correct answer is D.<\/p>\n
Question 35.<\/p>\n
(a) DDos and Derive-by Downloads
\n(b) Malware & Malvertising
\n(c) Phishing and Password attacks
\n(d) All of the above
\nAnswer:
\n(a) DDos and Derive-by Downloads
\nDDoS (or denial of service), malware, drive-by downloads, phishing and password attacks are all some common and famous types of cyber-attacks used by hackers.<\/p>\n
Question 36.<\/p>\n
(a) Maliciousware
\n(b) Badware
\n(c) Ilegalware
\n(d) Malware
\nAnswer:
\n(d) Malware .
\nMalware is a kind of short program used by the hacker to gain access to sensitive data\/ information. It is used to denote many kinds of viruses, worms, Trojans, and several other harmful programs. Sometimes malware is also known as malicious software.<\/p>\n
<\/p>\n
Question 37.<\/p>\n
(a) WPA
\n(b) WPA2
\n(c) WPS
\n(d) Both a and c
\nAnswer:
\n(b) WPA2
\nNowadays, in Wi-Fi Security, the WPA2 is one of the most widely used protocols because it offers a more secure connection rather than the WP(a) It is also known as the upgraded version of the WPA protocol.<\/p>\n
Question 38.<\/p>\n
(a) Reliability
\n(b) Performance
\n(c) Security
\n(d) Longevity
\nAnswer:
\n(b) Performance
\nWhen the numbers of users on a network get increased and exceed the network’s limit, therefore the performance is one of the factors of the network that is hugely impacted by it.<\/p>\n
Question 39.<\/p>\n
(a) Moral
\n(b) Ethics
\n(c) Guideline
\n(d) Code of standard
\nAnswer:
\n(a) Moral<\/p>\n
Question 40.<\/p>\n
(a) Moral standard
\n(b) Moral principle
\n(c) Moral
\n(d) Ethics
\nAnswer:
\n(a) Moral standard<\/p>\n
Question 41.<\/p>\n
(a) Ethics
\n(b) Law
\n(c) Moral
\n(d) Privacy
\nAnswer:
\n(b) Law<\/p>\n
Question 42.<\/p>\n
(a) software Piracy
\n(b) fair treatment
\n(c) communication
\n(d) co-operation
\nAnswer:
\n(a) software Piracy<\/p>\n
<\/p>\n
Question 43.<\/p>\n
(a) Code of ethics
\n(b) Guidelines
\n(c) Privacy
\n(d) Security
\nAnswer:
\n(a) Code of ethics<\/p>\n
Question 44.<\/p>\n
(a) Copyright
\n(b) Software privacy
\n(c) Fair use
\n(d) Law
\nAnswer:
\n(b) Software privacy<\/p>\n
Question 45.<\/p>\n
(a) Unselect
\n(b) Worms’s
\n(c) Microbes
\n(d) Bacteria
\nAnswer:
\n(b) Worms’s<\/p>\n
Question 46.<\/p>\n
(a) management
\n(b) operator
\n(c) people
\n(d) software developers
\nAnswer:
\n(d) software developers<\/p>\n
Question 47.<\/p>\n
(a) Unauthorized access
\n(b) Legal access
\n(c) Without permission
\n(d) With permission
\nAnswer:
\n(a) Unauthorized access<\/p>\n
Question 48.<\/p>\n
(a) IT act
\n(b) Cyber crime
\n(c) Cyber law
\n(d) Fair use
\nAnswer:
\n(c) Cyber law<\/p>\n
Question 49.<\/p>\n
(a) Digital signature
\n(b) Coded signature
\n(c) Double signature
\n(d) Simple signature
\nAnswer:
\n(a) Digital signature<\/p>\n
<\/p>\n
Question 50.<\/p>\n
(a) Cyber crime
\n(b) Cyber law
\n(c) IT act
\n(d) Code of standard
\nAnswer:
\n(b) Cyber law<\/p>\n
Question 51.<\/p>\n
(a) Web browser
\n(b) Email
\n(c) Record
\n(d) Anti-virus
\nAnswer:
\n(d) Anti-virus<\/p>\n
Question 52.<\/p>\n
(a) Single user
\n(b) Network
\n(c) Site
\n(d) Lab pack
\nAnswer:
\n(b) Network<\/p>\n
Question 53.<\/p>\n
(a) Data
\n(b) Signature
\n(c) Access
\n(d) Program
\nAnswer:
\n(a) Data<\/p>\n
Question 54.<\/p>\n
(a) Electronic gazette
\n(b) Electronic record
\n(c) Electronic form
\n(d) All of these
\nAnswer:
\n(a) Electronic gazette<\/p>\n
Question 55.<\/p>\n
(a) Private
\n(b) Public
\n(c) Both a and b
\n(d) Security key
\nAnswer:
\n(a) Private<\/p>\n
<\/p>\n
Question 56.<\/p>\n
(a) cyber law
\n(b) cyber crime
\n(c) criminal law
\n(d) IT act
\nAnswer:
\n(a) cyber law<\/p>\n
Question 57.<\/p>\n
(a) IT Act, 2000
\n(b) Negotiable Instrument Act
\n(c) Power of Attorney
\n(d) Code of ethics
\nAnswer:
\n(a) IT Act, 2000<\/p>\n
Question 58.<\/p>\n
(a) Data
\n(b) Information
\n(c) Function
\n(d) Process
\nAnswer:
\n(b) Information<\/p>\n
Question 59.<\/p>\n
(a) Security
\n(b) Privacy
\n(c) Liability
\n(d) Accountability
\nAnswer:
\n(b) Privacy<\/p>\n
Question 60.<\/p>\n
(a) an intelectual property right attached to original works in which the right subsist with him
\n(b) individuals right to access the information
\n(c) right of information
\n(d) that is not cop(yrightrd software
\nAnswer:
\n(a) an intelectual property right attached to original works in which the right subsist with him<\/p>\n
Question 61.<\/p>\n
(a) Freeware
\n(b) Shareware
\n(c) Public domain
\n(d) Non-freeware
\nAnswer:
\n(a) Freeware<\/p>\n
Question 62.<\/p>\n
(a) freeware
\n(b) shareware
\n(c) public domain
\n(d) None of these
\nAnswer:
\n(c) public domain<\/p>\n
Question 63.<\/p>\n
(a) Shareware
\n(b) Freeware
\n(c) Non-freeware software
\n(d) Public domain software
\nAnswer:
\n(b) Freeware<\/p>\n
<\/p>\n
Question 64.<\/p>\n
(a) Cyber law
\n(b) IT Act
\n(c) Cyber crime
\n(d) Intellectual Property Rights
\nAnswer:
\n(a) Cyber law<\/p>\n
Question 65.<\/p>\n
(a) Copyright
\n(b) Cyber law
\n(c) Pair issue
\n(d) Cyber crime
\nAnswer:
\n(a) Copyright<\/p>\n
Question 66.<\/p>\n
(a) Access
\n(b) Address
\n(c) Users
\n(d) Copyright
\nAnswer:
\n(d) Copyright<\/p>\n
Question 67.<\/p>\n
(a) Copyright
\n(b) Fair use
\n(c) Unauthorized access
\n(d) Property right
\nAnswer:
\n(b) Fair use<\/p>\n
Question 68.<\/p>\n
(a) Data theft
\n(b) Forgery
\n(c) Damage to data and systems
\n(d) Installing antivirus for protection
\nAnswer:
\n(d) Installing antivirus for protection<\/p>\n
Question 69.<\/p>\n
(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n
Question 70.<\/p>\n
(a) Minimal plagiarism
\n(b) Mosaic
\n(c) Direct or complete plagiarism
\n(d) None of the above
\nAnswer:
\n(c) Direct or complete plagiarism<\/p>\n
Question 71.<\/p>\n
(a) Creations of the mind
\n(b) Literary works
\n(c) Industrial property
\n(d) All of the above
\nAnswer:
\n(d) All of the above<\/p>\n
Question 72.<\/p>\n
(a) Accessing your hardware
\n(b) Accessing your property
\n(c) Accessing your software
\n(d) None of the above
\nAnswer:
\n(c) Accessing your software<\/p>\n
Question 73.<\/p>\n
(a) digital certificate
\n(b) key
\n(c) firewall
\n(d) digital certification
\nAnswer:
\n(b) key<\/p>\n
<\/p>\n
Question 74.<\/p>\n
(a) Ethics in the online environment
\n(b) Online gaming
\n(c) Ethics at school
\n(d) Telecommunications
\nAnswer:
\n(a) Ethics in the online environment<\/p>\n
Societal Impacts and Data Protection Class 12 MCQ Questions Part 3 Question 1. Which of the following is related to cyberethics? (a) Ethics in the online environment (b) Online gaming (c) Ethics at school (d) Telecommunications Answer: (a) Ethics in the online environment Question 2. ………is a secure technique to protect data being transmitted over …<\/p>\n