Olete.in
Articles
Mock Tests
đź§Ş NCERT Class 12 MCQ Quiz Hub
NCERT Societal Impact MCQ
Choose a topic to test your knowledge and improve your NCERT Class 12 skills
1. _____________ are the records and traces that we left behind as we use Internet.
Digital Footprints
Data Protection
Plagiarism
Digital Data
2. Digital footprints are also known as _
Digital data
Plagiarism
Digital tattoos
Digital print
3. Digital footprints are stored _
Temporarily (for few days)
Permanently
for 7 days only
for 3 days
4. Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____
Digital footprint
Digital activities
Online handprint
Internet activities
5. There are _________ kinds of Digital footprints.
1
2
3
4
6. Which of the following is type of Digital Footprints?
Active digital footprints
Passive digital footprints
Both of the above
None of the above
7. The digital data trail we leave online unintentionally is called _____
ctive digital footprints
Passive digital footprints
Current digital footprints
None of the above
8. The digital data trail we leave online intentionally is called ___
Active digital footprints
Passive digital footprints
Current digital footprints
None of the above
9. Which of the following activity is an example of leaving Active digital footprints?
Surfing internet
Visiting a website
Sending an email to friend
None of the above
10. Our digital footprint can be created by _
visiting any website
sending email
posting online
All the above
11. Our digital footprints are stored in local web browser in the form of __
browsing history
cookies
passwords
All the above
12. Our digital foot prints are stored in ________
Local web browser
Servers where the applications are hosted
Both of the above
None of the above
13. Digital footprints can be used to _
Trace the user’s location
Trace the user’s digital activity
know the digital personality of user.
All the above
14. Anyone who uses digital technology along with Internet is a __
Digital citizen
Netizen
Both of the above
None of the above
15. In this era of digital society, we can do ____
Online Shopping
Online Banking
Online Education
All the above
16. Which of the following are Net Etiquette?
Be Ethical
Be Respectful
Be Responsible
All the above
17. Being a responsible digital citizen, we should _
not use copyrighted materials
avoid cyber bullying
respect privacy of others
All the above
18. Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __
Cyber bullying
Cyber crime
Cyber insult
All the above
19. ______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.
Netizen
Digital Citizen
Internet troll
None of the above
20. Digital communication includes _
Email
Texting
Instant messaging
All the above
21. Communication etiquette include to _____
be polite with others
be credible
be precise
All the above
22. Which of the following is example of Social media?
Facebook
Twitter
Instagram
All the above
23. Which of the following is not an example of Social media platform?
Facebook
Pinterest
Google+
Social channel
24. ______ are websites or applications that enable users to participate by creating and sharing content with others in the community.
Social media
Social channel
Social networking
None of the above
25. A responsible netizen must abide by _
net etiquettes
communication etiquettes
social media etiquettes
All the above
26. In social media platform, we can share _____
images
text
videos
All the above
27. Is having the same password for all your accounts on different websites is safe
True
False
Both of the above
None of the above
28. To be a responsible netizen, we should _
Choose password wisely
think before upload anything online.
change our password frequently.
All the above
29. We should be very careful while uploading anything online?
True
False
Error
None of the above
30. Every information available on internet is always correct
True
False
Error
None of the above
31. Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __
Sensitive data
Important data
security data
None of the above
32. Example of sensitive data is ____
Name of a person
Credit card detail of a person
Date of birth of a person
None of the above
33. IPR stands for ______
Indian Property Right
Intellectual Property Right
Intelligent Property Right
Intellectual Property Resource
34. Code of the software will be protected by __
copyright
patent
registered trademark
None of the above
35. Functional expression of the idea/invention will be protected by _____
copyright
patent
registered trademark
None of the above
36. The name and logo of the software will be protected by _______
copyright
patent
registered trademark
None of the above
37. Intellectual Property is legally protected through _
copyright
patent
registered trademark
All the above
38. The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.
Copyright
Patent
Createright
None of the above
39. To use copyrighted material, one needs to obtain a license from owner.
True
False
Error
None of the above
40. A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention
copyright
trademark
patent
None of the above
41. A patent protects an invention for ___________ years, after which it can be freely used.
10
20
30
40
42. Patentee has the full right of using, selling, or distributing the protected invention.
True
False
Error
None of the above
43. _____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands
Trademark
Patent
Copyright
None of the above
44. EULA stands for __
End User Leave Agreement
End User License Aim
End User License Agreement
None of the above
45. _______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.
EULA
EULE
AULA
AULI
46. _________ means using other’s work and not giving adequate citation for use.
Plagiarism
Licensing
Copyright
None of the above
47. Licensing and copyrights are same terms.
True
False
Error
None of the above
48. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
Agreement
License
Patent
Copyright
49. Presenting someone else’s idea or work as one’s own idea or work is called _
Plagiarism
Copyright infringement
Patent infringement
None of the above
50. Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __
Plagiarism
Copyright Infringement
Trademark Infringement
Licence Infringement
51. ____________ means unauthorized use of other’s trademark on products and services.
Copyright Infringement
Trademark Infringement
Plagiarism
Patent
52. GPL stands for ____
General Public License
GNU General Private License
GNU General Public License
GNU Public License
53. Which of the following is popular category of public licenses?
GPL
CC
Both of the above
All the above
54. CC (in reference to public license) stands for __
Creative Commons
Carbon copy
Creative Comments
Creative Culture
55. GPL is primarily designed for providing public license to a ______
software
websites
literature
music
56. FOSS stands for ___
For open source software
Free and open set software
Free and open source software
None of the above
57. _______ operating system come under FOSS.
Ubuntu
Unix
Mac
Windows
58. _______ browser come under FOSS.
Internet explorer
Chrome
Mozilla Firefox
None of the above
59. _________ is the unauthorized use or distribution of software.
Software piracy
Piracy
Software copy
Pirated Software
60. ______ package come under FOSS.
Libre Office
Open Office
Both of the above
None of the above
61. The owner of a work can create _______ different types of CC licenses.
2
4
6
8
62. _____ is defined as a crime in which computer is the medium of crime.
Computer crime
Cyber crime
Internet crime
Digital crime
63. Which of the following is cyber crime?
Hacking
Phishing
Spamming
All the above
64. A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.
Cyber crime
Computer virus
Program
Software
65. __________ is the act of unauthorized access to a computer, computer network or any digital system.
Sign in
Hacking
Tracking
None of the above
66. Hacking, when done with a positive intent, is called ____
Ethical hacking
Active hacking
Passive hacking
Ethics
67. Which of the following is called black hat hacker?
Ethical hacker
Non Ethical hacker
Both of the above
None of the above
68. Which of the following is white hat hacker?
Ethical hacker
Non Ethical hacker
Both of the above
None of the above
69. Primary focus of ________ is on security cracking and data stealing.
ethical hacker
non ethical hacker
white hat hacker
None of the above
70. Hackers try to break security system ___
for Identity theft
for monetary gain
to leak sensitive information
All the above
71. ____________ is an activity where fake websites or emails that look original or authentic are presented to the user.
Phishing
Hacking
Spamming
Identity theft
72. _____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data
Phishing
Identity theft
Ransomware
None of the above
73. Which of the following can be considered as safety measures to reduce the risk of cyber crime?
Which of the following can be considered as safety measures to reduce the risk of cyber crime?
Avoid installing pirated software.
Use strong password for web login, and change it periodically.
All the above
74. E-waste stands for ____
Electrical waste
Electronic waste
Electricity waste
E-waste
75. Which of the following constitute e-waste?
discarded computers
damaged printers
useless CDs
All the above
76. e-waste is responsible for the degradation of our environment
True
False
Error
None of the above
77. e-waste is very healthy for human being.
True
False
Error
None of the above
78. e-waste is responsible for air, water and land pollution.
True
False
Error
None of the above
79. Which of the following are feasible methods of e-waste management?
Reduce
Reuse
Recycle
All the above
80. The process of re-selling old electronic goods at lower prices is called _
refurbishing
recycle
reuse
reduce
81. _________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.
Ergonomics
Ergomics
Agonomics
All the above
82. Bad posture of using computer may cause ____
Backache
Neck Pain
Shoulder pain
All the above
83. What we have to ensures to maintain good health of a computer system?
Wipe monitor’s screen often using the regular microfiber soft cloth.
Keep it away from direct heat, sunlight and put it in a room with enough ventilation for air circulation.
Do not eat food or drink over the keyboard
All of the above
84. After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?
Plagiarism
Hacking
Identity theft
Cyber bullying
85. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?
Inform Garvit so that he may change his password
Give the password of Garvit’s email ID to all other classmates
Use Garvit’s password to access his account
None of the above
86. Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?
Shareware
Freeware
FOSS
Malware
87. Proprietary software is a software which is available ____
free of charge
on paying license fee
free for first year only
None of the above
88. Which of the following is not a cyber crime?
Phishing
Ransomware
Hacking
Tracking
89. In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.
. Information Technology Act, 2000
Indian Technology Act, 2000
Inform Technology Act, 2000
. Information Technology Act, 2000
90. Digital signature is the scanned copy of physical signature.
True
False
Error
None of the above
Submit