MCQ Question For Class 12 Informatics Practices Chapter 6 Societal Impacts

MCQs Class 12

Check the below NCERT MCQ Class 12 Informatics Practices Chapter 6 Societal Impacts with Answers available with PDF free download. MCQ Questions for Class 12 Informatics Practices with Answers were prepared based on the latest syllabus and examination pattern issued by CBSE, NCERT and KVS. Our teachers have provided below Societal Impacts Class 12 Informatics Practices MCQs Questions with answers which will help students to revise and get more marks in exams

Societal Impacts Class 12 Informatics Practices MCQs Questions with Answers

Refer below for MCQ Class 12 Informatics Practices Chapter 6 Societal Impacts with solutions. Solve questions and compare with the answers provided below

Question. The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called ………………..
(a) Computer security law
(b) aggregate information
(c) copyright law
(d) data security standards   

Answer

C

Question. The real-time chat, audio calls, videos call happening on the internet is
(a) Synchronous Communication
(b) Asynchronous Communication
(c) Realtime Communications
(d) Live Communication 

Answer

A

Question. Which of the following would be a creative work protected by copyright?
(a) A list of all Indian President names
(b) A portrait of your family
(c) A song you wrote
(d) The name of your pet dog 

Answer

C

Question. Which of the following is/are ethical issues associated with Information Technology?
i) Personal Privacy
ii) Access Rights
iii) Harmful actions
(a) Only i
(b) Only i and ii
(c) All of them i, ii and iii
(d) None of them 

Answer

C

Question. How does excessive use of technology can affect physical health?
(a) Internet Addiction
(b) Social Isolation
(c) Anxiety & Depression
(d) a and c 

Answer

D

Question. Which of the following is not ‘proprietary’ software ?
(a) Windows 10
(b) MAC OSX
(c) Linux
(d) McAffee 

Answer

C

Question. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
(a) Agreement 
(b) License
(c) Patent
(d) Copyright

Answer

B

Question. Select the incorrect statement-
(a) IPR gives owner right to decide how much information he/she can share with user.
(b) IPR encourages creators to invent new ideas, designs, and softwares.
(c) IPR ensures that some of the properties cannot be disclosed publically.
(d) IPR gives owner right to get financial benefits against their creation/inventions. 

Answer

C

Question. Cyber troll or trolling is a cybercrime which is closely related to __________.
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of these

Answer

A

Question. To prevent unauthorized access to and or from the network, a system known as
(a) Gateway
(b) Antivirus
(c) Firewall
(d) Net Protector 

Answer

C

Question. Which of the following not a part of digital technologies?
(a) Smartphones
(b) Computers
(c) Internet
(d) FM Radio 

Answer

D

Question. Receiving irrelevant and unwanted emails repeatedly is an example of _____
(a) Junking
(b) Spamming
(c) Stacking
(d) DoS attack 

Answer

B

Question. A kind of online harassment wherein the victim is subjected to a barrage of online messages and emails is called ______
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of these 

Answer

C

Question. Code of the software will be protected by _____________
(a) copyright
(b) patent
(c) registered trademark
(d) None of the above 

Answer

A

Question. What is meant by the term ‘cyber-crime’ ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks 

Answer

D

Question. Any information created by us that exists in digital form is called
(a) Digital footprint
(b) Cyber print
(c) Internet print
(d) Web finger print

Answer

A

Question. A fraudulent process that extracts money from an ignorant person is called
(a) Spamming
(b) Phishing
(c) Bullying
(d) None of these

Answer

B

Question. The term Intellectual property rights cover
(a) Trademark
(b) Copyright
(c) Patents
(d) All of these

Answer

D

Question. Using someone’s Twitter handle to post something will be termed as
(a) Fraud
(b) Identity theft
(c) Online stealing
(d) Phishing

Answer

B

Question. In FOSS, source code is hidden from
(a) All users
(b) Purchaser
(c) Only the vendor
(d) In FOSS source code is not hidden.

Answer

D

Question. Which of the following are medium of cyber trolling?
(a) Facebook
(b) Twitter
(c) You tube video comments
(d) All of these

Answer

D

Question. Mr. Raghavendra found that after posting some images in social media , some people were writing negative messages. This is an instance of
(a) Phishing
(b) Trolling
(c) Hacking
(d) Spamming

Answer

B

Question. Which of the following are health disorders caused by overuse of technology?
(a) DNA damage
(b) Lung cancer
(c) Damage to heart liver and spleen
(d) All of the above

Answer

D

Question. Which of the following are not ways of data protection?
(a) Using password
(b) Using User IDs
(c) Using encryption techniques.
(d) None of these

Answer

D

Question. Anil never writes a subject line in his mails . This is an instance of :
(a) Spamming
(b) Phishing
(c) Non obeying of E-mail etiquettes
(d) Trolling

Answer

C

Question. Sneha found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do?
(a) Ignore the instance
(b) Report it to the cyber crime cell
(c) Try to delete the posts
(d) Enjoy the instance.

Answer

B

Question. Which among the following are good preventive measures against health hazards of technology use?
(a) Periodic walks between long usage of devices
(b) Using screen guards
(c) No overuse of technology
(d) All of the above

Answer

D

Question. Jack is a good programmer and wants to contribute to the features of one of the softwares , that he uses. What kind of software he can contribute to?
(a) Proprietary software
(b) Free software
(c) Open source software
(d) Shareware

Answer

C

Question. Which among the following is not a possible activity of a virus?
(a) Deleting data files
(b) Sending bulk mails
(c) Deleting system files
(d) None of these

Answer

B

Question. Read the statements given below and identify the right option about cyber crime.
Statement A Cyber crime involves the use of computer and network in attacking
computers and networks as well.
Statement B Cyber bullying is an act of cyber law.
(a) Statement A is correct.
(b) Statement B is correct.
(c) Statement A is correct but Statement B is incorrect.
(d) Statement B is correct but Statement A is incorrect.

Answer

C

Question. What kind of illegal activity may happen if given link is clicked?
(a) Illegal download
(b) Bullying
(c) Identity theft
(d) Hacking 

Answer

C

MCQ Question For Class 12 Informatics Practices Chapter 6 Societal Impacts