Check the below NCERT MCQ Class 12 Informatics Practices Chapter 6 Societal Impacts with Answers available with PDF free download. MCQ Questions for Class 12 Informatics Practices with Answers were prepared based on the latest syllabus and examination pattern issued by CBSE, NCERT and KVS. Our teachers have provided below Societal Impacts Class 12 Informatics Practices MCQs Questions with answers which will help students to revise and get more marks in exams
Societal Impacts Class 12 Informatics Practices MCQs Questions with Answers
Refer below for MCQ Class 12 Informatics Practices Chapter 6 Societal Impacts with solutions. Solve questions and compare with the answers provided below
Question. The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called ………………..
(a) Computer security law
(b) aggregate information
(c) copyright law
(d) data security standards
Answer
C
Question. The real-time chat, audio calls, videos call happening on the internet is
(a) Synchronous Communication
(b) Asynchronous Communication
(c) Realtime Communications
(d) Live Communication
Answer
A
Question. Which of the following would be a creative work protected by copyright?
(a) A list of all Indian President names
(b) A portrait of your family
(c) A song you wrote
(d) The name of your pet dog
Answer
C
Question. Which of the following is/are ethical issues associated with Information Technology?
i) Personal Privacy
ii) Access Rights
iii) Harmful actions
(a) Only i
(b) Only i and ii
(c) All of them i, ii and iii
(d) None of them
Answer
C
Question. How does excessive use of technology can affect physical health?
(a) Internet Addiction
(b) Social Isolation
(c) Anxiety & Depression
(d) a and c
Answer
D
Question. Which of the following is not ‘proprietary’ software ?
(a) Windows 10
(b) MAC OSX
(c) Linux
(d) McAffee
Answer
C
Question. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
(a) Agreement
(b) License
(c) Patent
(d) Copyright
Answer
B
Question. Select the incorrect statement-
(a) IPR gives owner right to decide how much information he/she can share with user.
(b) IPR encourages creators to invent new ideas, designs, and softwares.
(c) IPR ensures that some of the properties cannot be disclosed publically.
(d) IPR gives owner right to get financial benefits against their creation/inventions.
Answer
C
Question. Cyber troll or trolling is a cybercrime which is closely related to __________.
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of these
Answer
A
Question. To prevent unauthorized access to and or from the network, a system known as
(a) Gateway
(b) Antivirus
(c) Firewall
(d) Net Protector
Answer
C
Question. Which of the following not a part of digital technologies?
(a) Smartphones
(b) Computers
(c) Internet
(d) FM Radio
Answer
D
Question. Receiving irrelevant and unwanted emails repeatedly is an example of _____
(a) Junking
(b) Spamming
(c) Stacking
(d) DoS attack
Answer
B
Question. A kind of online harassment wherein the victim is subjected to a barrage of online messages and emails is called ______
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of these
Answer
C
Question. Code of the software will be protected by _____________
(a) copyright
(b) patent
(c) registered trademark
(d) None of the above
Answer
A
Question. What is meant by the term ‘cyber-crime’ ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks
Answer
D
Question. Any information created by us that exists in digital form is called
(a) Digital footprint
(b) Cyber print
(c) Internet print
(d) Web finger print
Answer
A
Question. A fraudulent process that extracts money from an ignorant person is called
(a) Spamming
(b) Phishing
(c) Bullying
(d) None of these
Answer
B
Question. The term Intellectual property rights cover
(a) Trademark
(b) Copyright
(c) Patents
(d) All of these
Answer
D
Question. Using someone’s Twitter handle to post something will be termed as
(a) Fraud
(b) Identity theft
(c) Online stealing
(d) Phishing
Answer
B
Question. In FOSS, source code is hidden from
(a) All users
(b) Purchaser
(c) Only the vendor
(d) In FOSS source code is not hidden.
Answer
D
Question. Which of the following are medium of cyber trolling?
(a) Facebook
(b) Twitter
(c) You tube video comments
(d) All of these
Answer
D
Question. Mr. Raghavendra found that after posting some images in social media , some people were writing negative messages. This is an instance of
(a) Phishing
(b) Trolling
(c) Hacking
(d) Spamming
Answer
B
Question. Which of the following are health disorders caused by overuse of technology?
(a) DNA damage
(b) Lung cancer
(c) Damage to heart liver and spleen
(d) All of the above
Answer
D
Question. Which of the following are not ways of data protection?
(a) Using password
(b) Using User IDs
(c) Using encryption techniques.
(d) None of these
Answer
D
Question. Anil never writes a subject line in his mails . This is an instance of :
(a) Spamming
(b) Phishing
(c) Non obeying of E-mail etiquettes
(d) Trolling
Answer
C
Question. Sneha found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do?
(a) Ignore the instance
(b) Report it to the cyber crime cell
(c) Try to delete the posts
(d) Enjoy the instance.
Answer
B
Question. Which among the following are good preventive measures against health hazards of technology use?
(a) Periodic walks between long usage of devices
(b) Using screen guards
(c) No overuse of technology
(d) All of the above
Answer
D
Question. Jack is a good programmer and wants to contribute to the features of one of the softwares , that he uses. What kind of software he can contribute to?
(a) Proprietary software
(b) Free software
(c) Open source software
(d) Shareware
Answer
C
Question. Which among the following is not a possible activity of a virus?
(a) Deleting data files
(b) Sending bulk mails
(c) Deleting system files
(d) None of these
Answer
B
Question. Read the statements given below and identify the right option about cyber crime.
Statement A Cyber crime involves the use of computer and network in attacking
computers and networks as well.
Statement B Cyber bullying is an act of cyber law.
(a) Statement A is correct.
(b) Statement B is correct.
(c) Statement A is correct but Statement B is incorrect.
(d) Statement B is correct but Statement A is incorrect.
Answer
C
Question. What kind of illegal activity may happen if given link is clicked?
(a) Illegal download
(b) Bullying
(c) Identity theft
(d) Hacking
Answer
C