MCQ Chapter 6 Societal Impacts Class 12 Informatics Practices

MCQ Questions Class 12

Please refer to Societal Impacts MCQ Questions Class 12 Informatics Practices below. These MCQ questions for Class 12 Informatics Practices with answers have been designed as per the latest NCERT, CBSE books, and syllabus issued for the current academic year. These objective questions for Societal Impacts will help you to prepare for the exams and get more marks.

Societal Impacts MCQ Questions Class 12 Informatics Practices

Please see solved MCQ Questions for Societal Impacts in Class 12 Informatics Practices. All questions and answers have been prepared by expert faculty of standard 12 based on the latest examination guidelines.

MCQ Questions Class 12 Informatics Practices Societal Impacts

Question. The intellectual property is legally protected through
(a) copyright
(b) patents
(c) trademarks
(d) all of the above 

Answer

D

Question. By encryption of a text we mean
(a) Compressing it
(b) Expanding it
(c) Scrambling it to preserve its security
(d) Hashing it   

Answer

A

Question. The digital trail which gets created as a person’s Internet usage using computers, smartphones, gaming consoles etc. is called ________ .
(a) Internet data
(b) Internet trail
(c) Digital footprint
(d) e-footprint 

Answer

C

Question. The software made by techtipnow is type of
(a) Open source software
(b) Freeware
(c) Shareware
(d) Proprietary software 

Answer

D

Question. In what ways, e-waste contributes to environmental pollution?
(a) emission of gases and fumes into the atmosphere
(b) discharge of liquid waste into drains
(c) disposal of solid e-waste materials
(d) All of these 

Answer

D

Question. Spending too much time on Internet can have negative impact on our ___________ and ________ well being.
(a) mental, physical
(b) physical, psychological
(c) physical, body
(d) None of these 

Answer

B

Question. In this era of digital society, we can do ________
(a) Online Shopping
(b) Online Banking
(c) Online Education
(d) All of the above 

Answer

D

Question. Accepting links from untrusted emails can be hazardous, as they may potentially contain __________ .
(a) virus
(b) link to malicious website
(c) Both (a) and (b)
(d) All of these 

Answer

C

Question. _________ use their skill for illegal or malicious purposes.
(a) ethical hacker
(b) non-ethical hacker
(c) Both (a) and (b)
(d) None of these 

Answer

B

Question. If you receive an email claiming to need your username and/or password, what should you do ?
(a) Report it as phishing/spam through your email provider
(b) Delete the message
(c) Reply to the message with your email and password

Answer

A

Question. Cyber crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data, is called __________.
(a) Phishing
(b) Ransomware
(c) Identity theft
(d) None of these 

Answer

B

Question. Feasible methods of e-waste management are ________.
(a) reduce
(b) reuse
(c) recycle
(d) All of these 

Answer

D

Question. Which of the following is popular category of public licenses?
(a) GPL
(b) CC
(c) Both of the above
(d) None of the above 

Answer

C

Question. Mr. Satyaveer is reading only relevant emails and did not expect an instant response from the recipient. This practice is which of the following communication etiquette?
(a) Be respectful
(b) Be punctual
(c) Be polite
(d) Be precise   

Answer

D

Question. Sumona has invented a new theory in physics. She wants to protect it legally against unauthorized use. She should take its
(a) Copyright
(b) Patent
(c) Trademark
(d) None 

Answer

A

Question. The process of re-selling old electronic goods at lower prices is called ________.
(a) Re-using
(b) Refurbishing
(c) Recycling
(d) None of these 

Answer

B

Question.  Which of the following website did not offer open/public licensing content?
(a) ceativecommons.org
(b) pixabay.com
(c) gnu.org
(d) Goolge 

Answer

D