Please refer to Societal Impacts MCQ Questions Class 12 Informatics Practices below. These MCQ questions for Class 12 Informatics Practices with answers have been designed as per the latest NCERT, CBSE books, and syllabus issued for the current academic year. These objective questions for Societal Impacts will help you to prepare for the exams and get more marks.
Societal Impacts MCQ Questions Class 12 Informatics Practices
Please see solved MCQ Questions for Societal Impacts in Class 12 Informatics Practices. All questions and answers have been prepared by expert faculty of standard 12 based on the latest examination guidelines.
MCQ Questions Class 12 Informatics Practices Societal Impacts
Question. The intellectual property is legally protected through
(a) copyright
(b) patents
(c) trademarks
(d) all of the above
Answer
D
Question. By encryption of a text we mean
(a) Compressing it
(b) Expanding it
(c) Scrambling it to preserve its security
(d) Hashing it
Answer
A
Question. The digital trail which gets created as a person’s Internet usage using computers, smartphones, gaming consoles etc. is called ________ .
(a) Internet data
(b) Internet trail
(c) Digital footprint
(d) e-footprint
Answer
C
Question. The software made by techtipnow is type of
(a) Open source software
(b) Freeware
(c) Shareware
(d) Proprietary software
Answer
D
Question. In what ways, e-waste contributes to environmental pollution?
(a) emission of gases and fumes into the atmosphere
(b) discharge of liquid waste into drains
(c) disposal of solid e-waste materials
(d) All of these
Answer
D
Question. Spending too much time on Internet can have negative impact on our ___________ and ________ well being.
(a) mental, physical
(b) physical, psychological
(c) physical, body
(d) None of these
Answer
B
Question. In this era of digital society, we can do ________
(a) Online Shopping
(b) Online Banking
(c) Online Education
(d) All of the above
Answer
D
Question. Accepting links from untrusted emails can be hazardous, as they may potentially contain __________ .
(a) virus
(b) link to malicious website
(c) Both (a) and (b)
(d) All of these
Answer
C
Question. _________ use their skill for illegal or malicious purposes.
(a) ethical hacker
(b) non-ethical hacker
(c) Both (a) and (b)
(d) None of these
Answer
B
Question. If you receive an email claiming to need your username and/or password, what should you do ?
(a) Report it as phishing/spam through your email provider
(b) Delete the message
(c) Reply to the message with your email and password
Answer
A
Question. Cyber crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data, is called __________.
(a) Phishing
(b) Ransomware
(c) Identity theft
(d) None of these
Answer
B
Question. Feasible methods of e-waste management are ________.
(a) reduce
(b) reuse
(c) recycle
(d) All of these
Answer
D
Question. Which of the following is popular category of public licenses?
(a) GPL
(b) CC
(c) Both of the above
(d) None of the above
Answer
C
Question. Mr. Satyaveer is reading only relevant emails and did not expect an instant response from the recipient. This practice is which of the following communication etiquette?
(a) Be respectful
(b) Be punctual
(c) Be polite
(d) Be precise
Answer
D
Question. Sumona has invented a new theory in physics. She wants to protect it legally against unauthorized use. She should take its
(a) Copyright
(b) Patent
(c) Trademark
(d) None
Answer
A
Question. The process of re-selling old electronic goods at lower prices is called ________.
(a) Re-using
(b) Refurbishing
(c) Recycling
(d) None of these
Answer
B
Question. Which of the following website did not offer open/public licensing content?
(a) ceativecommons.org
(b) pixabay.com
(c) gnu.org
(d) Goolge
Answer
D