Unit 4 Societal Impacts
Class 12 Informatics Practices New 065
Societal Impacts MCQ’s
Multiple Choice Questions Set – 10
181. Which of the following is/are examples of online fraud?
a) Sita placed an order online and made full payment but no goods were delivered to her.
b) Tim ordered a phone online with full advance payment but he received same brand phone of old model.
c) Your peer picked your credit card and made payment with it.
d) all of the above
182. ‘Tom got to know the password of Tim’s Social Media Handle and used it to posts as if Tim posted them. What will this act be called as ?
a) Online fraud
b) Identity theft
c) Plagiarism
d) Phishing
183. Manya received an email warning her of closure of her bank accounts if she did not update her banking information asap. She clicked the link in the email and entered her banking information. Next, she got to know was ‘she was duped’. This is an example of ________.
a) Online fraud
b) Identity theft
c) Plagiarism
d) Phishing
184. Which of the following is not a cyber crime ?
a) Scam
b) Phishing
c) Child pornography
d) Downvote a social media post
185. Which of the following is/are examples of cyber crime ?
a) Extracting money from using a person’s netbanking details
b) Posting/viewing child pornographic material
c) Taking online payment and not delivering goods
d) all of the above
186. Methods used for interpretation of computer media for digital evidence, are collectively known as _______.
a) Digital investigation
b) Digital clearing
c) e-forensics
d) Digital forensics
187. Which of the following are examples of online identity theft?
a) Paying online using someone else’s net banking information
b) Sending emails to others by hacking someone’s mail-id
c) Gaining access to someone’s social media handle and posting by posing them
d) Publishing online a negative article
188. The information/art/work that exists in digital form is called _________.
a) e-work
b) e-asset
c) digital property
d) e-property
189. Every activity you perform on the Internet is saved for how long.
a) one month
b) one year
c) as per my setting
d) forever
190. The digital trail which gets created as a person’s Internet usage using computers, smartphones, gaming consoles etc. is called ________ .
a) Internet data
b) Internet trail
c) Digital footprint
d) e-footprint
191. Gaining unauthorised access to a network or computer or digital files with malicious intentions, is called _______ .
a) Cracking
b) Hacking
c) Banging
d) Phishing
192. Legal term to describe the rights of a creator of original creative or artistic work is called _______ .
a) Copyright
b) Copyleft
c) CPL
d) none of these
193. A worm is ________.
a) A slimy pink thing that lives in dirt.
b) Pieces of malicious code that make copies of themselves and spread through computers without human interaction.
c) An unsolicited email message.
194. If you receive an email claiming to need your username and/or password, what should you do ?
a) Report it as phishing/spam through your email provider
b) Delete the message
c) Reply to the message with your email and password
195. What should your response be if you receive an email stating that you have won a lottery or received some inheritance from an unknown person ?
a) Send them email asking for further procedure
b) Ignore it
c) Mark it as spam and block it
196. A computer _______ is a malicious code which self-replicates by copying itself to other programs.
a) program
b) virus
c) application
d) worm
197. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains a damaging code.
a) Trojans
b) Viruses
c) Worm
d) Adware
198. Which of the following is the type of software that has self-replicating software that causes damage to files and system ?
a) Trojans
b) Viruses
c) Worm
d) Adware
199. Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited ?
a) Trojans
b) Viruses
c) Worm
d) Adware
200. What is the broad term covering computer viruses, worms trojan, adware, etc. ?
a) Malware
b) Spyware
c) Worm
d) Adware
201. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is _______.
a) Phishing
b) Eavesdropping
c) Scams
d) PC intrusion
202. Which of the following is/are source of spreading viruses from one computer to another?
a) Email
b) Infected data
c) Infected programs
d) all of the above
203. ________ are the attempts by individuals to obtain confidential information from you through an original looking site and URL.
a) Phishing scams
b) Spoofing
c) Eavesdropping
d) Pharming
204. ________ is an attempt where a hacker tries to divert network traffic to a bogus site.
a) Phishing scams
b) Spoofing
c) Eavesdropping
d) Pharming attack
Societal Impacts MCQ’s
- 200+ MCQ’s Class 12 Informatics Practices Unit 4 Societal Impacts Set 1
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 2
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 3
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 4
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 5
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 6
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 7
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 8
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 9
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 10
Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 1
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 2
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 3
Class 12 Informatics Practices : Data Visualization – Plotting in Python MCQ’s
- Class 12 Informatics Practices Data Visualization using Python Matplotlib MCQ’s Set 1
- Class 12 Informatics Practices Data Visualization using Python Matplotlib MCQ’s Set 2
- Class 12 Informatics Practices Data Visualization using Python Matplotlib MCQ’s Set 3
- Class 12 Informatics Practices Data Visualization using Python Matplotlib MCQ’s Set 4
Class 12 Informatics Practices NCERT Book Exercise Solutions
- Class 12 Informatics Practices- Ch.1 Querying & SQL Function – NCERT Solution
- Class 12 Informatics Practices Data Handling using pandas – I NCERT Solution
- Class 12 Informatics Practices Chapter 3 Data Handling Using Pandas – II NCERT Exercise Solution
- Class 12 Informatics Practices Unit 4 Plotting Data using Matplotlib NCERT Exercise Solution
- Class 12 Informatics Practices Chapter 5 Internet and Web NCERT Exercise Solution
- Class 12 Informatics Practices Chapter 6 Societal Impacts NCERT Exercise Solution
Credit of this set mcq’s – Move Fast With Class 12 Inofrmatics Practices, Sumita Arora