Multiple Choice Question For Societal Impact Class 12 Computer Science (CS), Informatics Practices (IP)
1. A software that can be freely accessed and modified is called _____.
(a) Synchronous Software
(b) Package Software
(c) Open Source Software
(d) Middleware
2. Which of the following is an advantage of 'open source' software?
(a) You can edit the source code to customise it.
(b) You need to be an expert to edit code.
(c) You have to pay.
(d) Can sometimes be too generic for specialist purposes.
3. Which of the following is a disadvantage of 'open source' software ?
(a) High quality software with lots of features
(b) Not as customizable
(c) May not have been tested as much as proprietary software, so might have bugs.
(d) You can edit the source code to customise it
4. Which of the following is an advantage of 'proprietary' software?
(a) It is usually free.
(b) Thoroughly tested because people are paying to use it.
(c) Not as customizable
(d) Can sometimes be too generic for specialist purposes
5. Which of the following is a disadvantage of 'proprietary' software ?
(a) You need to be an expert to edit code.
(b) You have to pay for this type of software.
(c) It's licensed.
(d) It is launched after proper testing.
6. The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called _____.
(a) computer security law
(b) aggregate information
(c) copyright law
(d) data security standards
7. Which of the following would be a creative work protected by copyright?
(a) A list of all Indian President names
(b) A portrait of your family
(c) A song you wrote
(d) The name of your pet dog
8. Which of the following is not a type of cybercrime?
(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
9. Which of the following is not done by cyber criminals?
(a) Unauthorized account access
(b) Mass attack using Trojans as botnets
(c) Email spoofing and spamming
(d) Report vulnerability in any system
10. What is the name of the IT law that India is having in the Indian legislature ?
(a) India's Technology (IT) Act, 2000
(b) India's Digital Information Technology (DIT) Act, 2000
(c) India's Information Technology (IT) Act, 2000
(d) The Technology Act, 2008
11. What is meant by the term 'cyber-crime' ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks
12. What is an example of e-waste ?
(a) a ripened banana
(b) an old computer
(c) old clothes
(d) empty soda cans
13. The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _____ (IPR).
(a) Intelligent Property Rights
(b) Intellectual Property Rights
(c) Interactive Property Rights
(d) Instance Property Rights
14. Stealing someone else's intellectual work and representing it as own, is called _____.
(a) Intellectual steal
(b) Pluckism
(c) Plagiarism
(d) Pickism
15. The information/art/work that exists in digital form is called _____.
(a) e-work
(b) e-asset
(c) digital property
(d) e-property
16. Every activity you perform on the Internet is saved for how long ?
(a) one month
(b) one year
(c) as per my setting
(d) forever
17. The digital trail which gets created as a person's Internet usage using computers, smartphones,
gaming consoles etc. is called
(a) Internet data
(b) Internet trail
(c) Digital footprint
(d) e-footprint
18. Gaining unauthorised access to a network or computer or digital files with malicious intentions, is
called _____.
(a) Cracking
(b) Hacking
(c) Banging
(d) Phishing
19. Legal term to describe the rights of a creator of original creative or artistic work is called _____.
(a) Copyright
(b) Copyleft
(c) GPL
(d) none of these
20. A software that can be freely accessed and modified is called _____.
(a) Synchronous Software
(b) Package Software
(c) Open Source Software
(d) Middleware
21. An example of an open source DBMS.
(a) MySQL
(b) Oracle
(c) SQL Server
(d) Sybase
22. An open source image editor similar to Adobe Photoshop.
(a) Nvu
(b) Open Office
(c) Bluefish
(d) GIMPshop
23. What is another name given to 'proprietary software' ?
(a) Open source software
(b) Bespoke software
(c) Tailor Made software
(d) Closed source software
24. What is meant by 'proprietary' software ?
(a) Software owned by an organisation, you may need to buy a license for.
(b) Freely available, constantly upgraded by users. No fee.
25. What is meant by 'open source' software ?
(a) Software owned by an organisation, you may need to buy a license for
(b) Freely available, constantly upgraded by users. No fee.
26. Which of the following would be a creative work protected by copyright ?
(a) A list of all Indian President names
(b) A portrait of your mily
(c) A song you wrote
(d) The name of your pet dog
27. When someone steals someone else's personal information to commit theft or fraud, it's called _____.
(a) Identity Theft
(b) Hacking
(c) Computer Piracy
(d) Infringement
28. Which of the following is not a type of cybercrime?
(a) Data theft
(b) Forgery
(c) Damage to data and systems
(d) Installing antivirus for protection
29. Which of the following is not done by cyber criminals?
(a) Unauthorized account access
(b) Mass attack using Trojans as botnets
(c) Email, spoofing and spamming
(d) Report vulnerability in any system
30. What is meant by the term 'cyber-crime' ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks
31. What is an example of e-waste ?
(a) a ripened banana
(b) an old computer
(c) old clothes
(d) empty soda cans
32. Credit card fraud may include:
(a) Stealing of credit card
(b) Unauthorized and illegal use of credit card
(c) Both of the above
(d) Neither
33. Using someone else's twitter handle to post something, will be termed as:
(a) Fraud
(b) Identity theft
(c) Online stealing
(d) Violation
34. Standard security protocol that establishes encrypted links between a web server and a browser is called ____.
(a) Online safety technology
(b) SDT technology
(c) Web encryption technology
(d) Secure sockets layer technology
35. Things like these, eg, online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called ____.
(a) Online identity
(b) Online estate
(c) Digital identity
(d) Digital property
36. The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _____ (IPR).
(a) Intelligent Property Rights
(b) Intellectual Property Rights
(c) Interactive Property Rights
(d) Instance Property Rights
37. Stealing someone else's intellectual work and representing it as own, is called _____.
(a) Intellectual steal
(b) Pluckism
(c) Plagiarism
(d) Pickism.
38. Which of the following is not a cyber crime?
(a) Scam
(b) Phishing
(c) Child pornography
(d) Downvote a social media post
39. Methods used for interpretation of computer media for digital evidence, are collectively known as _____.
(a) Digital investigation
(b) Digital clearing
(c) e-forensics
(d) Digital forensics
40. Which of the following are examples of online identity theft?
(a) Paying online using someone else's net-banking information.
(b) Sending emails to others by hacking someone's mail-id.
(c) Gaining access to someone's social media handle and posting by posing them.
(d) Publishing online a negative article
weri hepfull. thankings to you.
ReplyDeleteGreat reeading your blog
ReplyDeletePost a Comment
You can help us by Clicking on ads. ^_^
Please do not send spam comment : )