Multiple Choice Question For Societal Impact Class 12 Computer Science (CS), Informatics Practices (IP)


1. A software that can be freely accessed and modified is called _____.

(a) Synchronous Software

(b) Package Software

(c) Open Source Software

(d) Middleware

2. Which of the following is an advantage of 'open source' software?

(a) You can edit the source code to customise it.

(b) You need to be an expert to edit code.

(c) You have to pay.

(d) Can sometimes be too generic for specialist purposes.

3. Which of the following is a disadvantage of 'open source' software ?

(a) High quality software with lots of features

(b) Not as customizable

(c) May not have been tested as much as proprietary software, so might have bugs.

(d) You can edit the source code to customise it

4. Which of the following is an advantage of 'proprietary' software?

(a) It is usually free.

(b) Thoroughly tested because people are paying to use it.

(c) Not as customizable

(d) Can sometimes be too generic for specialist purposes

5. Which of the following is a disadvantage of 'proprietary' software ?

(a) You need to be an expert to edit code.

(b) You have to pay for this type of software.

(c) It's licensed.

(d) It is launched after proper testing.

6. The generally recognized term for the government protection afforded to intellectual property (written and electronic) is called _____.

(a) computer security law

(b) aggregate information

(c) copyright law

(d) data security standards

7. Which of the following would be a creative work protected by copyright?

(a) A list of all Indian President names

(b) A portrait of your family

(c) A song you wrote

(d) The name of your pet dog

8. Which of the following is not a type of cybercrime?

(a) Data theft

(b) Forgery

(c) Damage to data and systems

(d) Installing antivirus for protection

9. Which of the following is not done by cyber criminals?

(a) Unauthorized account access

(b) Mass attack using Trojans as botnets

(c) Email spoofing and spamming

(d) Report vulnerability in any system

10. What is the name of the IT law that India is having in the Indian legislature ?

(a) India's Technology (IT) Act, 2000

(b) India's Digital Information Technology (DIT) Act, 2000

(c) India's Information Technology (IT) Act, 2000

(d) The Technology Act, 2008

11. What is meant by the term 'cyber-crime' ?

(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security

(b) The use of computer networks to commit financial or identity fraud

(c) The theft of digital information

(d) Any crime that involves computers and networks

12. What is an example of e-waste ?

(a) a ripened banana

(b) an old computer

(c) old clothes

(d) empty soda cans

13. The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _____ (IPR).

(a) Intelligent Property Rights

(b) Intellectual Property Rights

(c) Interactive Property Rights

(d) Instance Property Rights

14. Stealing someone else's intellectual work and representing it as own, is called _____.

(a) Intellectual steal

(b) Pluckism

(c) Plagiarism

(d) Pickism

15. The information/art/work that exists in digital form is called _____.

(a) e-work

(b) e-asset

(c) digital property

(d) e-property

16. Every activity you perform on the Internet is saved for how long ?

(a) one month

(b) one year

(c) as per my setting

(d) forever

17. The digital trail which gets created as a person's Internet usage using computers, smartphones,

gaming consoles etc. is called

(a) Internet data

(b) Internet trail

(c) Digital footprint

(d) e-footprint

18. Gaining unauthorised access to a network or computer or digital files with malicious intentions, is

called _____.

(a) Cracking

(b) Hacking

(c) Banging

(d) Phishing

19. Legal term to describe the rights of a creator of original creative or artistic work is called _____.

(a) Copyright

(b) Copyleft

(c) GPL

(d) none of these

20. A software that can be freely accessed and modified is called _____.

(a) Synchronous Software

(b) Package Software

(c) Open Source Software

(d) Middleware

21. An example of an open source DBMS.

(a) MySQL

(b) Oracle

(c) SQL Server

(d) Sybase

22. An open source image editor similar to Adobe Photoshop.

(a) Nvu

(b) Open Office

(c) Bluefish

(d) GIMPshop

23. What is another name given to 'proprietary software' ?

(a) Open source software

(b) Bespoke software

(c) Tailor Made software

(d) Closed source software

24. What is meant by 'proprietary' software ?

(a) Software owned by an organisation, you may need to buy a license for.

(b) Freely available, constantly upgraded by users. No fee.


25. What is meant by 'open source' software ?

(a) Software owned by an organisation, you may need to buy a license for

(b) Freely available, constantly upgraded by users. No fee.


26. Which of the following would be a creative work protected by copyright ?

(a) A list of all Indian President names

(b) A portrait of your mily

(c) A song you wrote

(d) The name of your pet dog

27. When someone steals someone else's personal information to commit theft or fraud, it's called _____.

(a) Identity Theft

(b) Hacking

(c) Computer Piracy

(d) Infringement

28. Which of the following is not a type of cybercrime?

(a) Data theft

(b) Forgery

(c) Damage to data and systems

(d) Installing antivirus for protection

29. Which of the following is not done by cyber criminals?

(a) Unauthorized account access

(b) Mass attack using Trojans as botnets

(c) Email, spoofing and spamming

(d) Report vulnerability in any system

30. What is meant by the term 'cyber-crime' ?

(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security

(b) The use of computer networks to commit financial or identity fraud

(c) The theft of digital information

(d) Any crime that involves computers and networks

31. What is an example of e-waste ?

(a) a ripened banana

(b) an old computer

(c) old clothes

(d) empty soda cans

32. Credit card fraud may include:

(a) Stealing of credit card

(b) Unauthorized and illegal use of credit card

(c) Both of the above

(d) Neither

33. Using someone else's twitter handle to post something, will be termed as:

(a) Fraud

(b) Identity theft

(c) Online stealing

(d) Violation

34. Standard security protocol that establishes encrypted links between a web server and a browser is called ____.

(a) Online safety technology

(b) SDT technology

(c) Web encryption technology

(d) Secure sockets layer technology

35. Things like these, eg, online email account, social media account or handle, online shopping account, online photo sharing account, trademarks, patents, own registered domain name etc. are collectively called ____.

(a) Online identity

(b) Online estate

(c) Digital identity

(d) Digital property

36. The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _____ (IPR).

(a) Intelligent Property Rights

(b) Intellectual Property Rights

(c) Interactive Property Rights

(d) Instance Property Rights

37. Stealing someone else's intellectual work and representing it as own, is called _____.

(a) Intellectual steal

(b) Pluckism

(c) Plagiarism

(d) Pickism.

38. Which of the following is not a cyber crime?

(a) Scam

(b) Phishing

(c) Child pornography

(d) Downvote a social media post

39. Methods used for interpretation of computer media for digital evidence, are collectively known as _____.

(a) Digital investigation

(b) Digital clearing

(c) e-forensics

(d) Digital forensics

40. Which of the following are examples of online identity theft?

(a) Paying online using someone else's net-banking information.

(b) Sending emails to others by hacking someone's mail-id.

(c) Gaining access to someone's social media handle and posting by posing them.

(d) Publishing online a negative article

2 Comments

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Post a Comment

You can help us by Clicking on ads. ^_^
Please do not send spam comment : )

Previous Post Next Post