200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 10

Unit 4 Societal Impacts

Class 12 Informatics Practices New 065


Societal Impacts MCQ’s


Multiple Choice Questions Set – 10


181. Which of the following is/are examples of online fraud?

a) Sita placed an order online and made full payment but no goods were delivered to her.

b) Tim ordered a phone online with full advance payment but he received same brand phone of old model.

c) Your peer picked your credit card and made payment with it.

d) all of the above

Ans. a & b

182. ‘Tom got to know the password of Tim’s Social Media Handle and used it to posts as if Tim posted them. What will this act be called as ?

a) Online fraud

b) Identity theft

c) Plagiarism

d) Phishing

Ans. b) Identity theft

183. Manya received an email warning her of closure of her bank accounts if she did not update her banking information asap. She clicked the link in the email and entered her banking information. Next, she got to know was ‘she was duped’. This is an example of ________.

a) Online fraud

b) Identity theft

c) Plagiarism

d) Phishing

Ans. d) Phishing

184. Which of the following is not a cyber crime ?

a) Scam

b) Phishing

c) Child pornography

d) Downvote a social media post

Ans. d) Downvote a social media post

185. Which of the following is/are examples of cyber crime ?

a) Extracting money from using a person’s netbanking details

b) Posting/viewing child pornographic material

c) Taking online payment and not delivering goods

d) all of the above

Ans. d) all of the above

186. Methods used for interpretation of computer media for digital evidence, are collectively known as _______.

a) Digital investigation

b) Digital clearing

c) e-forensics

d) Digital forensics

Ans. d) Digital forensics

187. Which of the following are examples of online identity theft?

a) Paying online using someone else’s net banking information

b) Sending emails to others by hacking someone’s mail-id

c) Gaining access to someone’s social media handle and posting by posing them

d) Publishing online a negative article

Ans. a, b & c

188. The information/art/work that exists in digital form is called _________.

a) e-work

b) e-asset

c) digital property           

d) e-property

Ans. c) digital property

189. Every activity you perform on the Internet is saved for how long.

a) one month

b) one year

c) as per my setting

d) forever

Ans. d) forever

190. The digital trail which gets created as a person’s Internet usage using computers, smartphones, gaming consoles etc. is called ________ .

a) Internet data

b) Internet trail

c) Digital footprint

d) e-footprint

Ans. c) Digital footprint

191. Gaining unauthorised access to a network or computer or digital files with malicious intentions, is called _______ .

a) Cracking

b) Hacking

c) Banging

d) Phishing

Ans. b) Hacking

192. Legal term to describe the rights of a creator of original creative or artistic work is called _______ .

a) Copyright

b) Copyleft

c) CPL

d) none of these

Ans. a) Copyright

193. A worm is ________.

a) A slimy pink thing that lives in dirt.

b) Pieces of malicious code that make copies of themselves and spread through computers without human interaction.

c) An unsolicited email message.

Ans. b) Pieces of malicious code that make copies of themselves and spread through computers without human interaction.

194. If you receive an email claiming to need your username and/or password, what should you do ?

a) Report it as phishing/spam through your email provider

b) Delete the message

c) Reply to the message with your email and password

Ans. a) Report it as phishing / spam through your email provider.

195. What should your response be if you receive an email stating that you have won a lottery or received some inheritance from an unknown person ?

a) Send them email asking for further procedure

b) Ignore it

c) Mark it as spam and block it

Ans. c) Mark it as spam and block it

196. A computer _______ is a malicious code which self-replicates by copying itself to other programs.

a) program

b) virus

c) application

d) worm

Ans. d) worm

197. Which of the following is a type of program that either pretends to have, or is described as having, a set of useful or desirable features but actually contains a damaging code.

a) Trojans

b) Viruses

c) Worm

d) Adware

Ans. a) Trojans

198. Which of the following is the type of software that has self-replicating software that causes damage to files and system ?

a) Trojans

b) Viruses

c) Worm

d) Adware

Ans. c) Worm

199. Which of the following tracks your internet browsing habits and sends you popups containing advertisements related to the sites and topics you’ve visited ? 

a) Trojans

b) Viruses

c) Worm

d) Adware

Ans. d) Adware

200. What is the broad term covering computer viruses, worms trojan, adware, etc. ?

a) Malware

b) Spyware

c) Worm

d) Adware

Ans. a) Malware

201. The attack that focuses on capturing small packets from the network transmitted by other computers and reading the data content in search of any type of information is _______.

a) Phishing         

b) Eavesdropping

c) Scams

d) PC intrusion

Ans. b) Eavesdropping

202. Which of the following is/are source of spreading viruses from one computer to another?     

a) Email

b) Infected data

c) Infected programs     

d) all of the above

Ans. d) all of the above

203. ________ are the attempts by individuals to obtain confidential information from you through an original looking site and URL.

a) Phishing scams

b) Spoofing

c) Eavesdropping

d) Pharming

Ans. a) Phishing scams

204.  ________ is an attempt where a hacker tries to divert network traffic to a bogus site.

a) Phishing scams

b) Spoofing

c) Eavesdropping

d) Pharming attack

Ans. d) Pharming attack


Thanks for Visiting www.mycstutorial.in
Important for Term 1 Examination


Societal Impacts MCQ’s


Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s


Class 12 Informatics Practices : Data Visualization – Plotting in Python MCQ’s


Class 12 Informatics Practices NCERT Book Exercise Solutions

Credit of this set mcq’s – Move Fast With Class 12 Inofrmatics Practices, Sumita Arora

You cannot copy content of this page

Scroll to Top