200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 4

Unit 4 Societal Impacts

Class 12 Informatics Practices New 065


Societal Impacts MCQ’s


Multiple Choice Questions Set – 4


Q61. Cyber crime is defined as a crime in which computer is the medium of crime ____________.

a. hacking

b. phishing

c. spamming

d. All of the above

Ans. d. All of the above

Q62. The computer is used as a tool to commit crimes ____________.

a. extortion

b. data breaches

c. theft

d. All of the above

Ans. d. All of the above

Q63. _________ is a software designed to specifically gain unauthorised access to computer systems.

a. virus

b. malware

c. spam

d. All of the above

Ans. b. malware

Q64. Which of the following is not a cyber crime?

a. hacking

b. talking on phone

c. ransomware attacks

d. Denial-of-service

Ans. b. talking on phone

Q65. Which of the following is not a cyber crime?

a. phishing

b. hacking

c. identity theft

d. denial-of-service

Ans. d. e-commerce

Q66. ___________ is the act of unauthorised access to a computer, computer network or any digital system.

a. phishing

b. hacking

c. identity theft

d. e-commerce

Ans. b. hacking

Q67. ___________ usually have technical expertise of the hardware and software.

a. Operators

b. Programmer

c. Hackers

d. None of these

Ans. c. Hackers

Q68. Hackers look for _________ to exploit and break into the system.

a. key

b. bugs

c. loop

d. None of these

Ans. b. bugs

Q69. Hacking, when done with a positive intent, is called ___________ hacking.

a. black

b. ethical

c. unethical

d. red

Ans. b. ethical

Q70. Ethical hackers are known as ___________ hackers.

a. white hat

b. black hat

c. red hat

d. None of these

Ans. a. white hat

Q71. Ethical hackers are specialists in exploring any _________ by during testing of the software.

a. vulnerability

b. loophole

c. Both (a) and (b)

d. None of these

Ans. c. Both (a) and (b)

Q72. Ethical hackers help in improving the ______ of software.

a. security

b. speed

c. performance

d. None of these

Ans. a. security

Q73. An ethical hacker may exploit a website in order to discover its security ___________.

a. vulnerability

b. loophole

c. Both (a) and (b)

d. None of these

Ans. c. Both (a) and (b)

Q74. A __________ is the one who tries to gain unauthorised access to computers or networks in order to steal sensitive data with the intent to damage or bring down systems .

a. ethical Hackers

b. non-ethical hackers

c. programmer

d. None of these

Ans. b. non-ethical hacker

Q75. A non-ethical hackers are called __________.

a. white hat hacker

b. black hat hacker

c. red hat hacker

d. None of these

Ans. b. black hat hacker

Q76. A cracker is also know as ____________.

a. ethical hacker

b. non-ethical hacker

c. Both (a) and (b)

d. None of these

Ans. b. non-ethical hacker

Q77. Primary focus of non-ethical hackers are _______________.

a. security cracking

b. data stealing

c. Both (a) and (b)

d. None of these

Ans. c. Both (a) and (b)

Q78. _________ use their skill for illegal or malicious purposes.

a. ethical hacker

b. non-ethical hacker

c. Both (a) and (b)

d. None of these

Ans. b. non-ethical hacker

Q79. Non-ethical hackers try to break through system securities for ____________.

a. identity theft

b. monetary gain

c. to rival or competitor web site down

d. to leak sensitive information

e. All of these

Ans. e. All of these

Q80. Hackers exploit your computer/network security and employ techniques like ________ to capture user’s personal or financial details.

a. spoofing

b. phishing

c. social engineering

d. All of these

Ans. d. All of these


Societal Impacts MCQ’s


Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s


Class 12 Informatics Practices NCERT Book Exercise Solutions

You cannot copy content of this page

Scroll to Top