đź§Ş NCERT Class 12 MCQ Quiz Hub

NCERT Societal Impact MCQ

Choose a topic to test your knowledge and improve your NCERT Class 12 skills

1. _____________ are the records and traces that we left behind as we use Internet.




2. Digital footprints are also known as _




3. Digital footprints are stored _




4. Whenever we surf the Internet using smartphones we leave a trail of data reflecting the activities performed by us online, which is our _____




5. There are _________ kinds of Digital footprints.




6. Which of the following is type of Digital Footprints?




7. The digital data trail we leave online unintentionally is called _____




8. The digital data trail we leave online intentionally is called ___




9. Which of the following activity is an example of leaving Active digital footprints?




10. Our digital footprint can be created by _




11. Our digital footprints are stored in local web browser in the form of __




12. Our digital foot prints are stored in ________




13. Digital footprints can be used to _




14. Anyone who uses digital technology along with Internet is a __




15. In this era of digital society, we can do ____




16. Which of the following are Net Etiquette?




17. Being a responsible digital citizen, we should _




18. Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __




19. ______ is a person who deliberately sows discord on the Internet by starting quarrels or upsetting people, by posting inflammatory or off topic messages in an online community.




20. Digital communication includes _




21. Communication etiquette include to _____




22. Which of the following is example of Social media?




23. Which of the following is not an example of Social media platform?




24. ______ are websites or applications that enable users to participate by creating and sharing content with others in the community.




25. A responsible netizen must abide by _




26. In social media platform, we can share _____




27. Is having the same password for all your accounts on different websites is safe




28. To be a responsible netizen, we should _




29. We should be very careful while uploading anything online?




30. Every information available on internet is always correct




31. Data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called __




32. Example of sensitive data is ____




33. IPR stands for ______




34. Code of the software will be protected by __




35. Functional expression of the idea/invention will be protected by _____




36. The name and logo of the software will be protected by _______




37. Intellectual Property is legally protected through _




38. The ____________ include right to copy (reproduce) a work, right to distribute copies of the work to the public, and right to publicly display or perform the work.




39. To use copyrighted material, one needs to obtain a license from owner.




40. A ______________ provide an exclusive right to prevent others from using, selling, or distributing the protected invention




41. A patent protects an invention for ___________ years, after which it can be freely used.




42. Patentee has the full right of using, selling, or distributing the protected invention.




43. _____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands




44. EULA stands for __




45. _______________covers all clauses of software purchase, viz., how many copies can be installed, whether source is available, whether it can be modified and redistributed and so on.




46. _________ means using other’s work and not giving adequate citation for use.




47. Licensing and copyrights are same terms.




48. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.




49. Presenting someone else’s idea or work as one’s own idea or work is called _




50. Ravi copy some contents from Internet, but do not mention the source or the original creator. This is an act of __




51. ____________ means unauthorized use of other’s trademark on products and services.




52. GPL stands for ____




53. Which of the following is popular category of public licenses?




54. CC (in reference to public license) stands for __




55. GPL is primarily designed for providing public license to a ______




56. FOSS stands for ___




57. _______ operating system come under FOSS.




58. _______ browser come under FOSS.




59. _________ is the unauthorized use or distribution of software.




60. ______ package come under FOSS.




61. The owner of a work can create _______ different types of CC licenses.




62. _____ is defined as a crime in which computer is the medium of crime.




63. Which of the following is cyber crime?




64. A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.




65. __________ is the act of unauthorized access to a computer, computer network or any digital system.




66. Hacking, when done with a positive intent, is called ____




67. Which of the following is called black hat hacker?




68. Which of the following is white hat hacker?




69. Primary focus of ________ is on security cracking and data stealing.




70. Hackers try to break security system ___




71. ____________ is an activity where fake websites or emails that look original or authentic are presented to the user.




72. _____ is a kind of cyber crime in which attacker blackmails the victim to pay for getting access to the data




73. Which of the following can be considered as safety measures to reduce the risk of cyber crime?




74. E-waste stands for ____




75. Which of the following constitute e-waste?




76. e-waste is responsible for the degradation of our environment




77. e-waste is very healthy for human being.




78. e-waste is responsible for air, water and land pollution.




79. Which of the following are feasible methods of e-waste management?




80. The process of re-selling old electronic goods at lower prices is called _




81. _________ is a branch of science that deals with designing or arranging workplaces including the furniture, equipment and systems so that it becomes safe and comfortable for the user.




82. Bad posture of using computer may cause ____




83. What we have to ensures to maintain good health of a computer system?




84. After practical, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?




85. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit , her classmate. What is ethically correct for Rishika to do?




86. Ravi downloaded a software from internet (free of cost) and moreover the source code of the software is also available which can be modified. What category of software is this?




87. Proprietary software is a software which is available ____




88. Which of the following is not a cyber crime?




89. In India _______ law provides guidelines to the user on the processing, storage and transmission of sensitive information.




90. Digital signature is the scanned copy of physical signature.