200+ MCQs Class 12 Informatics Practices Unit 4 Societal Impacts Set 9

Unit 4 Societal Impacts

Class 12 Informatics Practices New 065


Societal Impacts MCQ’s


Multiple Choice Questions Set – 9


161. A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?

a) Spamming     

b) Phishing         

c) Plagiarism

d) Trojan

Ans. c) Plagiarism

162. The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called _________.

a) computer security law

b) aggregate information

c) copyright law

d) data security standards

Ans. c) copyright law

163.  Which of the following would be a creative work protected by copyright ?

a) A list of all Indian President names

b) A portrait of your family

c) A song you wrote

d) The name of your pet dog

Ans. c) A song you wrote

164. When someone steals someone else’s personal information to commit theft or fraud, it’s called ________.

a) Identity Theft              

b) Hacking

c) Computer Piracy

d) Infringement

Ans. a) Identity Theft

165. Which of the following is not a type of cybercrime ?

a) Data theft

b) Forgery

c) Damage to data and systems

d) Installing antivirus for protection

Ans. d) Installing antivirus for protection

166. Which of the following is not done by cyber criminals ?

a) Unauthorized account access

b) Mass attack using Trojans as botnets

c) Email spoofing and spamming

d) Report vulnerability in any system

Ans. d) Report vulnerability in any system

167. What is the name of the IT law that India is having in the Indian legislature?

a) India’s Technology (IT) Act, 2000

b) India’s Digital Information Technology (DIT) Act, 2000

c) India’s Information Technology (IT) Act, 2000

d) The Technology Act, 2008

Ans. c) India’s Information Technology (IT) Act, 2000

 168. What is meant by the term ‘cyber-crime’?

a) Any crime that uses computers to jeopardise or attempt to jeopardise national

b) The use of computer networks to commit financial or identity fraud

c) The theft of digital information

d) Any crime that involves computers and networks

Ans. d) Any crime that involved computers and networks.

169. What is an example of e-waste ?

a) A ripened banana      

b) An old computer

c) Old clothes

d) Empty soda cans

Ans. b) An old computer

170. Credit card fraud may include :

a) Stealing of credit card

b) Unauthorized and illegal use of credit card

c) Both of the above

d) Neither

Ans. c) Both of the above

171. Using someone else’s twitter handle to post something, will be termed as :

a) Fraud

b) Identity theft

c) Online stealing

d) Violation

Ans. b) Identity theft

172. Things like these, e.g., online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called ___________.

a) Online identity

b) Online estate

c) Digital identity

d) Digital property

Ans. d) Digital property

173. The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as ________. 

a) Intelligent Property Rights

b) Intellectual Property Rights

c) Interactive Property Rights

d) Instance Property Rights

Ans. b) Intellectual Property Rights

174. Stealing someone else’s intellectual work and representing it as own, is called ________.

a) Intellectual steal

b) Pluckism

c) Plagiarism

d) Pickism

Ans. c) Plagiarism

175. The information/art/work that exists in digital form is called _________.

a) e-work

b) e-asset

c) digital property

d) e-property

Ans. c) digital property

176. Which of the following organisations support free software movement?

a) OSI

b) FSF 

c) W3C

d) GNU

Ans. b) FSF

177. Which of the following software types are ‘free’ in monetary terms?

a) Proprietary software

b) Shareware

c) FOSS

d) Freeware

Ans. c) FOSS, and d) Freeware

178. Which of the following software types are ‘free’ in terms of ‘freedom’ of right to use.

a) Proprietary software

b) Shareware

c) FOSS

d) Freeware

Ans. c) FOSS

179. The least restrictive open source license is __________.

a) GNU

b) BSD

c) MIT

d) Apache

Ans. c) MIT

180. Which of the following is an act of ‘plagiarism’?

a) Stealing a painting and selling it to a buyer

b) Copying your friend’s essay and using it by own name.

c) Deleting your friend’s stored work on drive

d) Writing a virus program

Ans. b) Copying your friend’s essay and using it by own name.


Thanks for Visiting www.mycstutorial.in
Important for Term 1 Examination


Societal Impacts MCQ’s


Class 12 Informatics Practices Data Handling using Python Pandas – MCQ’s


Class 12 Informatics Practices : Data Visualization – Plotting in Python MCQ’s


Class 12 Informatics Practices NCERT Book Exercise Solutions

Credit of this set mcq’s – Move Fast With Class 12 Inofrmatics Practices, Sumita Arora

You cannot copy content of this page

Table of Contents
Scroll to Top