Unit 4 Societal Impacts
Class 12 Informatics Practices New 065
Societal Impacts MCQ’s
Multiple Choice Questions Set 5
Q81. ________ is done on behalf of a company, which wants to find out the loopholes in the system in context to security.
a. Ethical hacking
b. Unethical hacking
c. Ethical and Unethical hacking
d. None of these
Q82. ________ is done in order to harm or cause loss to an individual or a company.
a. Ethical hacking
b. Unethical hacking
c. Ethical and Unethical hacking
d. None of these
Q83. ________ is an unlawful activity where fake websites or emails that look original or authentic are present the user to fraudulently collect sensitive and personal details .
a. Phishing
b. Spoofing
c. Social engineering
d. All of these
Q84. Through Phishing, they try to collect ______
a. username & passwords
b. credit card details
c. banking detials
d. All of these
Q85. The most common phishing method is through __________.
a. email spoofing
b. spamming
c. call on phone
d. All of these
Q86. In _________ , you receive mail from fake or forged email address, which looks like an authentic source.
a. phishing
b. email spoofing
c. spamming
d. All of these
Q87. We should ensure to open any email link or attachment only when it is from a trusted source and doesn’t look doubtful.
a. True
b. False
Q88. Accepting links from untrusted emails can be hazardous, as they may potentially contain __________ .
a. virus
b. link to malicious website
c. Both (a) and (b)
d. All of these
Q89. _________ refers to as a fraudulent or malicious practice in which communication is sent from an unknown source disguised as a trusted source known to the receiver.
a. Spoofing
b. Phishing
c. Pretexting
d. All of these
Q90. Obtaining the personal information from financial institutions, telephone companies and other sources, is called ___________
a. Spoofing
b. Phishing
c. Pretexting / Social Engineering
d. All of these
Q91. A user’s identifiable personal data like demographic details, email ID, banking credentials, passport, PAN, Aadhar number and various such personal data are stolen and misused by the hacker on behalf of the victim, is called ___________.
a. Spoofing
b. Phishing
c. Identity theft
d. All of these
Q92. The criminal can takes advantage of an individual’s stolen identity in __________ ways.
a. Financial Identity theft
b. Criminal identity theft
c. Medical identity theft
d. All of these
Q93. Cyber crime where the attacker gains access to the computer and blocks the user from accessing, usually by encrypting the data, is called __________.
a. Phishing
b. Ransomware
c. Identity theft
d. None of these
Q94. In ___________, the attacker blackmails the victim to pay for getting access to the data, or sometimes threatens to publish personal and sensitive information or photographs unless a ransom is paid.
a. Phishing
b. Ransomware
c. Identity theft
d. None of these
Q95. Ransomware can get downloaded on your computer when _______________________________
a. users visit any malicious or unsecure websites
b. download software from doubtful repositories
c. click on a malicious advertisement on the Internet
d. All of these
Q96. The challenges of cyber crime can be mitigated with the twin approach of _________.
a. being alert
b. taking legal help
c. Both (a) and (b)
d. None of these
Q97. __________ are the digital equivalent of a paper certificate.
a. Digital signature
b. Electronic signature
c. Signature
d. None of these
Q98. Derogatory messages or comments posted online targeting people are called ________.
a. Phishing
b. Spamming
c. Cyber troll
d. None of these
Q99. In Cyber troll, ‘troll’ is refer to _______.
a. person, who is doing it
b. derogatory comments, posted by a person
c. Both (a) and (b)
d. None of these
Q100. Cyber troll or trolling is a cybercrime which is closely related to __________.
a. Cyber bullying
b. Cyber phishing
c. Cyber stalking
d. None of these
Societal Impacts MCQ’s
- 200+ MCQ’s Class 12 Informatics Practices Unit 4 Societal Impacts Set 1
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 2
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 3
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 4
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 5
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 6
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 7
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 8
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 9
- 200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 10
Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 1
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 2
- Class 12 Informatics Practices Data Handling using Python Pandas-I MCQs Set 3
Class 12 Informatics Practices NCERT Book Exercise Solutions
- Class 12 Informatics Practices- Ch.1 Querying & SQL Function – NCERT Solution
- Class 12 Informatics Practices Data Handling using pandas – I NCERT Solution
- Class 12 Informatics Practices Chapter 3 Data Handling Using Pandas – II NCERT Exercise Solution
- Class 12 Informatics Practices Unit 4 Plotting Data using Matplotlib NCERT Exercise Solution
- Class 12 Informatics Practices Chapter 5 Internet and Web NCERT Exercise Solution
- Class 12 Informatics Practices Chapter 6 Societal Impacts NCERT Exercise Solution