CUET MCQ IP Societal Impact

Get latest MCQs for Societal Impact which are best for practice for computer science , informatics practices , CUET, IT competitive or any entrance exams.

  1. Which of the following is disadvantage of open source software?

    a. Low quality software
    b. It is customizable
    c. Might have bugs as not tested critically
    d. It is free

Show Answer

c. Might have bugs as not tested critically

  1. Digital footprints are stored in

    a. Web browser
    b. Web server
    c. Both web browser and server
    d. None of these

Show Answer

c. Both web browser and server

  1. Which of the following is example of e-waste

    a. Laptop
    b. Pen Drive
    c. PVC
    d. All of the above
    e. Both (a) and (b)

Show Answer

e. Both (a) and (b)

  1. Any activity we perform on the Internet stays for

    a. 30 days
    b. 365 days
    c. 10 years
    d. Permanently

Show Answer

d. Permanently

  1. Which of the following RDBMS is Open Source?

    a. Oracle
    b. MS SQL Server
    c. MS Access
    d. MySQL

Show Answer

d. MySQL

  1. Example of online identity theft

    a. Stealing Debit Card Details
    b. Sending malwares in Computer System
    c. Emailing with forged address
    d. Gaining unauthorized access to a computer network

Show Answer

a. Stealing Debit Card Details

  1. Branch of science that deals with designing and arranging workplace safer and comfortable for user is

    a. Ergonomics
    b. Physiconomics
    c. Physiology
    d. Societal Impact

Show Answer

a. Ergonomics

  1. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate. What is ethically correct for Rishika to do? [NCERT]

    a. Inform Garvit so that he may change his password.
    b. Give the password of Garvit’s email ID to all other classmates.
    c. Use Garvit’s password to access his account.
    d. Any of the (a), (b) or (c)

Show Answer

a. Inform Garvit so that he may change his password.

  1. Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said, “Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of — [NCERT]

    a. Fair use
    b. Hacking
    c. Copyright infringement
    d. Cyber crime

Show Answer

c. Copyright infringement

  1. After a fight with your friend, you did the following activities. Which of these activities is an example of cyber bullying?

    a. You sent an email to your friend with a message saying that “I am sorry”.
    b. You sent a threatening message to your friend saying “Do not try to call or talk to me”.
    c. You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
    d. All of the above

Show Answer

c. You created an embarrassing picture of your friend and uploaded on your account on a social networking site.

  1. Which of the following is true about Digital Footprint?

    a. Everyone using Internet may have Digital Footprint
    b. Digital Footprints can be used to judge ones attitude and work ethics
    c. Digital Footprint once created cannot be eliminated fully from Internet
    d. All of the above

Show Answer

d. All of the above

  1. Software used in your school to manage different activities like fee, book, student records is _______

    a. Open source software
    b. Freeware
    c. Shareware
    d. Proprietary software

Show Answer

d. Proprietary software

  1. 3Rs in E-Waste management refers to

    a. Reduce-Reverse-Recycle
    b. Reduce-Reuse-Recycle
    c. Remove-Recycle-Reproduce
    d. Reuse-Renew-Refund

Show Answer

b. Reduce-Reuse-Recycle

  1. Shantanu is working in IT industry where he spend more time in front of screens that is impacting his health negatively. What is/are the point(s) you suggest him to take care of?

    a. Give your eyes a break from screen
    b. Take small break at regular interval and stretch yourself
    c. Use ergonomic furniture that minimizes discomfort and fatigue
    d. All of the above

Show Answer

d. All of the above

  1. E-waste is causing

    a. Air pollution
    b. Water pollution
    c. Soil pollution
    d. All of the above
    e. Both (a) and (c)

Show Answer

d. All of the above

  1. Act that provides legal framework for electronic governance by giving recognition to electronic record and digital signatures.

    a. Cyber Act 2000
    b. Indian Cyber Law 2008
    c. Information Technology Act 2000
    d. Information Technology Law 2008

Show Answer

c. Information Technology Act 2000

  1. Black hat hackers are

    a. Ethical hackers
    b. Non ethical hackers
    c. Crackers
    d. All of above
    e. Both (a) and (c)

Show Answer

b. Non ethical hackers

  1. Which is not true about White hat hackers?

    a. They are ethical hackers
    b. They try to break system security for ID theft or monetary gain
    c. They try to explore any vulnerability or loophole during testing of software
    d. They ensure that proprietary information of system is safe

Show Answer

b. They try to break system security for ID theft or monetary gain

  1. Following are statements written for Cyber crime.
    (i) It involves use of computer or digital environment to commit crime
    (ii) Sometimes computer or digital environment itself is the target for crime

    a. (i) True, (ii) False
    b. (i) False, (ii) True
    c. Both are True
    d. Both are False

Show Answer

c. Both are True

  1. Which of the following does not come under Cyber crime?

    a. Hacking
    b. Phishing
    c. Murder
    d. Spamming

Show Answer

c. Murder

  1. Which of the following does not match with the objective of Free Software?

    a. It gives user freedom to use program for any purpose
    b. It gives user freedom to study functionality of program
    c. It gives user freedom to redistribute copies to others and get benefited with incentives
    d. It gives user freedom to update the program and release updated version publically for community benefits

Show Answer

c. It gives user freedom to redistribute copies to others and get benefited with incentives

  1. Which of the following is not considered in the Creative Common License?

    a. Movie
    b. Image
    c. Book
    d. Software

Show Answer

d. Software

  1. Select the incorrect statement

    a. IPR gives owner right to decide how much information he/she can share with user.
    b. IPR encourages creators to invent new ideas, designs, and softwares.
    c. IPR ensures that some of the properties cannot be disclosed publically.
    d. IPR gives owner right to get financial benefits against their creation/inventions

Show Answer

c. IPR ensures that some of the properties cannot be disclosed publically.

  1. When user share a post in facebook, he leaves trail of data called as

    a. Active Digital Footprint
    b. Passive Digital Footprint
    c. E-Footprint
    d. Digital Marks

Show Answer

a. Active Digital Footprint

  1. GPL stands for

    a. General Property License
    b. General Public License
    c. General Proprietary License
    d. General Protection License

Show Answer

b. General Public License

  1. Raghav is making a website. He wants to get license for it so that he can decide to give rights to the recipients. What type of license he should get?

    a. CC
    b. GPL
    c. GNU GPL
    d. Any one of the above

Show Answer

a. CC

  1. Which of the following is primarily designed for providing public license to software?

    a. CC
    b. GPL
    c. Patent
    d. Any one of the above

Show Answer

b. GPL

  1. Unlawful activity where fake website or emails that look original are presented to the user to fraudulently collect sensitive information of user is

    a. ID Theft
    b. Cyber Stacking
    c. Spamming
    d. Phishing

Show Answer

d. Phishing

  1. EULA stands for

    a. Earn Under License Agreement
    b. End User License Agreement
    c. End User Lost Agreement
    d. None

Show Answer

b. End User License Agreement

  1. Which of the following is not correct security measure to reduce the risk of cyber crime?

    a. Do not visit or download anything from untrusted website.
    b. Always secure wireless network at home with strong password and regularly change it.
    c. While using someone else computer, allow browser to saved password or auto fill data to save your time
    d. Perform online transaction like shopping, ticketing, and other such services only through well Known and secure sites.

Show Answer

c. While using someone else computer, allow browser to saved password or auto fill data to save your time

  1. Techtipnow Pvt. Ltd. has created Learning Management Software for their students. Now   they want legal ownership for their LMS to avoid any illegal and unauthorized use of it. CEO of Techtipnow when applied for this they came across following questions. Help them out for the solution.
    For the name and logo they have to get

    a. Copyright
    b. Trademark
    c. Patent
    d. Creative common

Show Answer

b. Trademark

  1. They will get copyright only for

    a. Functional expression of the software
    b. Name and logo of the software
    c. Code of the software
    d. None of the above

Show Answer

c. Code of the software

  1. Contract or agreement between user and creator permitting to use creation with limitations is

    a. Copyright
    b. License
    c. Mutual Deed
    d. None of the above

Show Answer

b. License

  1. Read following statements: (CBSE Sample Paper oct-2020)
    i.    A copyright is automatically granted to authors or creators of content.
    ii.   In FOSS source code is usually hidden from the user.
    Which of the following is correct?

    a. (i) True, (ii) False
    b. (i) False, (ii) True
    c. Both are True
    d. Both are False

Show Answer

a. (i) True, (ii) False

  1. Dhumal is not able to differentiate between shareware and freeware. Help him to get the correct one.

    a. Freeware available for free and shareware is available free for a limited time
    b. Freeware can be modified but shareware is not
    c. a and b both
    d. None of the above

Show Answer

c. a and b both

  1. Which of the following is not protected by copyright?

    a. Photographs
    b. Sculptures
    c. Software
    d. Slogans

Show Answer

d. Slogans

  1. The symbol © signifies

    a. Patent
    b. Copyright
    c. Trademark
    d. Copyleft

Show Answer

b. Copyright

  1. The code of the software will be protected under

    a. Patent
    b. Copyright
    c. Trademark
    d. Digital property right

Show Answer

b. Copyright

  1. The name and logo of the software will be protected under

    a. Patent
    b. Copyright
    c. Trademark
    d. Digital property right

Show Answer

c. Trademark

  1. The functional expression of the idea will be protected under

    a. Patent
    b. Copyright
    c. Trademark
    d. Digital Property Right

Show Answer

a. Patent

  1. Symbols, words, short phrases, slogans, signs can be protected under

    a. Copyright
    b. Patent
    c. Trademark
    d. License

Show Answer

c. Trademark

  1. The practice of taking someone’s work or ideas and passing them off as one’s own is known as ___

    a. Identity Theft
    b. Spamming
    c. Hacking
    d. Plagiarism

Show Answer

d. Plagiarism

2 thoughts on “CUET MCQ IP Societal Impact”

Leave a Comment

Your email address will not be published. Required fields are marked *

error: Content is protected !!