NCERT Class 12/NCERT Societal Impact MCQ Sample Test,Sample questions

Question:
 A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention

1.copyright

2.trademark

3.patent

4.None of the above


Question:
 Anyone who uses digital technology along with Internet is a __

1.Digital citizen

2.Netizen

3.Both of the above

4.None of the above


Question:
 Code of the software will be protected by __

1.copyright

2.patent

3.registered trademark

4.None of the above


Question:
 Digital footprints can be used to _

1.Trace the user’s location

2.Trace the user’s digital activity

3.know the digital personality of user.

4.All the above


Question:
 e-waste is responsible for the degradation of our environment

1.True

2.False

3.Error

4.None of the above


Question:
 Intellectual Property is legally protected through _

1. copyright

2.patent

3. registered trademark

4.All the above


Question:
 Our digital footprint can be created by _

1.visiting any website

2.sending email

3. posting online

4.All the above


Question:
 Our digital footprints are stored in local web browser in the form of __

1. browsing history

2.cookies

3.passwords

4.All the above


Question:
 Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __

1.Plagiarism

2.Copyright Infringement

3.Trademark Infringement

4.Licence Infringement


Question:
 The owner of a work can create _______ different types of CC licenses.

1.2

2.4

3.6

4.8


Question:
 To use copyrighted material, one needs to obtain a license from owner.

1.True

2.False

3.Error

4.None of the above


Question:
 We should be very careful while uploading anything online?

1.True

2.False

3.Error

4.None of the above


Question:
 Which of the following constitute e-waste?

1.discarded computers

2.damaged printers

3. useless CDs

4.All the above


Question:
 Which of the following is not a cyber crime?

1.Phishing

2.Ransomware

3.Hacking

4.Tracking


Question:
 Which of the following is popular category of public licenses?

1.GPL

2.CC

3.Both of the above

4.All the above


Question:
A patent protects an invention for ___________ years, after which it can be freely used.

1.10

2.20

3.30

4.40


Question:
A responsible netizen must abide by _

1.net etiquettes

2.communication etiquettes

3. social media etiquettes

4.All the above


Question:
A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.

1.Cyber crime

2.Computer virus

3.Program

4.Software


Question:
A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.

1. Agreement

2.License

3.Patent

4.Copyright


Question:
After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?

1.Plagiarism

2.Hacking

3.Identity theft

4.Cyber bullying


Question:
Bad posture of using computer may cause ____

1.Backache

2.Neck Pain

3.Shoulder pain

4.All the above


Question:
Being a responsible digital citizen, we should _

1.not use copyrighted materials

2.avoid cyber bullying

3.respect privacy of others

4.All the above


Question:
CC (in reference to public license) stands for __

1.Creative Commons

2.Carbon copy

3.Creative Comments

4.Creative Culture


Question:
Communication etiquette include to _____

1.be polite with others

2.be credible

3.be precise

4.All the above


Question:
Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __

1.Sensitive data

2.Important data

3.security data

4.None of the above


Question:
Digital communication includes _

1.Email

2.Texting

3.Instant messaging

4.All the above


Question:
Digital footprints are also known as _

1.Digital data

2.Plagiarism

3. Digital tattoos

4. Digital print


Question:
Digital footprints are stored _

1.Temporarily (for few days)

2.Permanently

3.for 7 days only

4.for 3 days


Question:
Digital signature is the scanned copy of physical signature.

1.True

2.False

3.Error

4.None of the above


Question:
e-waste is responsible for air, water and land pollution.

1.True

2.False

3.Error

4.None of the above


Question:
e-waste is very healthy for human being.

1.True

2.False

3.Error

4.None of the above


Question:
E-waste stands for ____

1.Electrical waste

2.Electronic waste

3.Electricity waste

4.E-waste


Question:
EULA stands for __

1.End User Leave Agreement

2.End User License Aim

3.End User License Agreement

4.None of the above


Question:
Every information available on internet is always correct

1.True

2.False

3.Error

4.None of the above


Question:
Example of sensitive data is ____

1.Name of a person

2.Credit card detail of a person

3.Date of birth of a person

4.None of the above


Question:
FOSS stands for ___

1.For open source software

2.Free and open set software

3.Free and open source software

4.None of the above


Question:
Functional expression of the idea/invention will be protected by _____

1.copyright

2.patent

3.registered trademark

4.None of the above


Question:
GPL is primarily designed for providing public license to a ______

1.software

2.websites

3.literature

4.music


Question:
GPL stands for ____

1.General Public License

2.GNU General Private License

3.GNU General Public License

4.GNU Public License


Question:
Hackers try to break security system ___

1.for Identity theft

2.for monetary gain

3. to leak sensitive information

4.All the above


Question:
Hacking, when done with a positive intent, is called ____

1.Ethical hacking

2.Active hacking

3.Passive hacking

4.Ethics


Question:
In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.

1.. Information Technology Act, 2000

2.Indian Technology Act, 2000

3. Inform Technology Act, 2000

4.. Information Technology Act, 2000


Question:
In social media platform, we can share _____

1.images

2.text

3.videos

4.All the above


Question:
In this era of digital society, we can do ____

1.Online Shopping

2.Online Banking

3.Online Education

4.All the above


Question:
IPR stands for ______

1. Indian Property Right

2. Intellectual Property Right

3.Intelligent Property Right

4.Intellectual Property Resource


Question:
Is having the same password for all your accounts on different websites is safe

1.True

2.False

3.Both of the above

4.None of the above


Question:
Licensing and copyrights are same terms.

1.True

2.False

3.Error

4.None of the above


Question:
Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __

1.Cyber bullying

2.Cyber crime

3.Cyber insult

4.All the above


Question:
Our digital foot prints are stored in ________

1.Local web browser

2.Servers where the applications are hosted

3.Both of the above

4.None of the above


Question:
Patentee has the full right of using, selling, or distributing the protected invention.

1.True

2.False

3.Error

4.None of the above


Question:
Presenting someone else’s idea or work as one’s own idea or work is called _

1.Plagiarism

2.Copyright infringement

3.Patent infringement

4.None of the above


Question:
Primary focus of ________ is on security cracking and data stealing.

1.ethical hacker

2. non ethical hacker

3.white hat hacker

4.None of the above


Question:
Proprietary software is a software which is available ____

1. free of charge

2.on paying license fee

3. free for first year only

4.None of the above


Question:
Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?

1.Shareware

2.Freeware

3.FOSS

4.Malware


Question:
Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?

1.Inform Garvit so that he may change his password

2.Give the password of Garvit’s email ID to all other classmates

3.Use Garvit’s password to access his account

4.None of the above


Question:
The digital data trail we leave online intentionally is called ___

1. Active digital footprints

2.Passive digital footprints

3.Current digital footprints

4.None of the above


Question:
The digital data trail we leave online unintentionally is called _____

1.ctive digital footprints

2.Passive digital footprints

3.Current digital footprints

4.None of the above


Question:
The name and logo of the software will be protected by _______

1. copyright

2.patent

3. registered trademark

4.None of the above


Question:
The process of re-selling old electronic goods at lower prices is called _

1.refurbishing

2.recycle

3.reuse

4.reduce


Question:
The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.

1.Copyright

2.Patent

3.Createright

4.None of the above


Question:
There are _________ kinds of Digital footprints.

1.1

2.2

3.3

4.4


Question:
To be a responsible netizen, we should _

1.Choose password wisely

2.think before upload anything online.

3.change our password frequently.

4.All the above


Question:
What we have to ensures to maintain good health of a computer system?

1.Wipe monitor’s screen often using the regular microfiber soft cloth.

2.Keep it away from direct heat, sunlight and put it in a room with enough ventilation for air circulation.

3.Do not eat food or drink over the keyboard

4.All of the above


Question:
Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____

1.Digital footprint

2.Digital activities

3.Online handprint

4.Internet activities


Question:
Which of the following activity is an example of leaving Active digital footprints?

1. Surfing internet

2.Visiting a website

3.Sending an email to friend

4.None of the above


Question:
Which of the following are feasible methods of e-waste management?

1. Reduce

2.Reuse

3.Recycle

4.All the above


Question:
Which of the following are Net Etiquette?

1. Be Ethical

2.Be Respectful

3.Be Responsible

4.All the above


Question:
Which of the following can be considered as safety measures to reduce the risk of cyber crime?

1.Which of the following can be considered as safety measures to reduce the risk of cyber crime?

2.Avoid installing pirated software.

3.Use strong password for web login, and change it periodically.

4.All the above


Question:
Which of the following is called black hat hacker?

1.Ethical hacker

2.Non Ethical hacker

3.Both of the above

4.None of the above


Question:
Which of the following is cyber crime?

1.Hacking

2.Phishing

3.Spamming

4.All the above


Question:
Which of the following is example of Social media?

1.Facebook

2.Twitter

3.Instagram

4.All the above


Question:
Which of the following is not an example of Social media platform?

1.Facebook

2.Pinterest

3.Google+

4.Social channel


Question:
Which of the following is type of Digital Footprints?

1.Active digital footprints

2. Passive digital footprints

3.Both of the above

4.None of the above


Question:
Which of the following is white hat hacker?

1.Ethical hacker

2. Non Ethical hacker

3.Both of the above

4.None of the above


Question:
_____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data

1.Phishing

2.Identity theft

3.Ransomware

4.None of the above


Question:
_____ is defined as a crime in which computer is the medium of crime.

1. Computer crime

2.Cyber crime

3. Internet crime

4.Digital crime


Question:
______ are websites or applications that enable users to participate by creating and sharing content with others in the community.

1.Social media

2.Social channel

3.Social networking

4.None of the above


Question:
______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.

1.Netizen

2.Digital Citizen

3. Internet troll

4.None of the above


Question:
______ package come under FOSS.

1.Libre Office

2.Open Office

3.Both of the above

4.None of the above


Question:
_______ browser come under FOSS.

1.Internet explorer

2.Chrome

3.Mozilla Firefox

4.None of the above


Question:
_______ operating system come under FOSS.

1.Ubuntu

2.Unix

3.Mac

4.Windows


Question:
_________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.

1.Ergonomics

2.Ergomics

3.Agonomics

4.All the above


Question:
_________ is the unauthorized use or distribution of software.

1.Software piracy

2.Piracy

3.Software copy

4.Pirated Software


Question:
_________ means using other’s work and not giving adequate citation for use.

1.Plagiarism

2.Licensing

3.Copyright

4.None of the above


Question:
__________ is the act of unauthorized access to a computer, computer network or any digital system.

1.Sign in

2.Hacking

3.Tracking

4.None of the above


Question:
____________ is an activity where fake websites or emails that look original or authentic are presented to the user.

1.Phishing

2.Hacking

3.Spamming

4. Identity theft


Question:
____________ means unauthorized use of other’s trademark on products and services.

1.Copyright Infringement

2.Trademark Infringement

3.Plagiarism

4.Patent


Question:
_____________ are the records and traces that we left behind as we use Internet.

1.Digital Footprints

2.Data Protection

3.Plagiarism

4.Digital Data


Question:
_____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands

1.Trademark

2.Patent

3.Copyright

4.None of the above


Question:
_______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.

1.EULA

2.EULE

3.AULA

4.AULI


More MCQS

  1. NCERT Societal Impact MCQ
  2. MCQ Questions for Class 12 Maths Chapter 1 Relations and Functions
  3. MCQ Questions for Class 12 Physics Chapter 1 Electric Charges and Field
  4. MCQ Questions for Class 12 Physics Chapter 2 Electrostatic Potential and Capacitance
  5. Current Electricity Class 12 MCQs Questions
  6. MCQ Questions for Class 12 Physics Chapter 4 Moving Charges and Magnetism
  7. MCQ Questions for Class 12 Physics Chapter 5 Magnetism and Matter
  8. MCQ Questions for Class 12 Physics Chapter 6 Electromagnetic Induction
  9. MCQ Questions for Class 12 Physics Chapter 7 Alternating Current
  10. MCQ Questions for Class 12 Physics Chapter 8 Electromagnetic Waves
  11. MCQ Questions for Class 12 Physics Chapter 9 Ray Optics and Optical Instruments
  12. MCQ Questions for Class 12 Physics Chapter 10 Wave Optics
  13. MCQ Questions for Class 12 Physics Chapter 11 Dual Nature of Radiation and Matter
  14. MCQ Questions for Class 12 Physics Chapter 12 Atoms
  15. MCQ Questions for Class 12 Physics Chapter 13 Nuclei
  16. MCQ Questions for Class 12 Physics Chapter 14 Semiconductor Electronics: Materials, Devices and Simple Circuits
  17. MCQ Questions for Class 12 Physics Chapter 15 Communication Systems
  18. MCQ Questions for Class 12 English
  19. MCQ Questions for Class 12 English Flamingo Chapter 3 Deep Water
  20. MCQ Questions for Class 12 English Flamingo Chapter 4 The Rattrap
  21. Human Geography: Nature and Scope Class 12 MCQs Questions
  22. MCQ Questions for Class 12 Geography Chapter 2 The World Population: Distribution, Density and Growth
Search
R4R Team
R4Rin Top Tutorials are Core Java,Hibernate ,Spring,Sturts.The content on R4R.in website is done by expert team not only with the help of books but along with the strong professional knowledge in all context like coding,designing, marketing,etc!