Societal Impact MCQ | Data Protection MCQ

societal impact mcq

Everyone learning Computer Science can take the help of this post which containing latest and best Societal Impact MCQ questions and answers to prepare for their exams.

Societal Impact MCQ covers all objective type questions for following topics

Digital Footprint
Net Etiquette
Digital Communication Etiquette
Data Protection
Intellectual Property Rights
Copyright
Patent
Trademark
Plagiarism
Licensing
Free Software and Open Source Software
Cyber Crime
Phishing
Identity Theft
Indian IT Act
E-Waste
Health Concerns due to overuse of Digital technology

Societal Impact MCQ Set-1 (Q1-Q25)

  1. Sumona has invented a new theory in physics. She wants to protect it legally against unauthorized use. She should take its

    a. Copyright
    b. Patent
    c. Trademark
    d. None

Show Answer

a. Copyright

  1. Rajneesh’s continuous online classes and increasing use of computers made his mother worried about his health. Whic of the following point should not be suggested her mother to take care of?

    a. Sit in right posture
    b. Take breaks and do some physical activity
    c. Keep the gadget above your height
    d. Periodically rotate and watering eyes

Show Answer

c. Keep the gadget above your height

  1. Suresh has prepared a document on ‘Cyber Security’ and for this he

    (i) Downloaded an image and pasted in document with some editing
    (ii) Copied a phrase from website and rephrased it and used in document


    Which of the above activity suresh did is an act of plagiarism?

    a. Statement (i)
    b. Statement (ii)
    c. (i) and (ii)
    d. None of the above

Show Answer

c. (i) and (ii)

  1. While surfing on Internet if your geo location is turned on, than it makes

    a. Active digital footprint
    b. Passive digital footprint
    c. Active e footprint
    d. Passive e footprint

Show Answer

b. Passive digital footprint

  1. Read following statements:

    (i) Trademark is a document that provides legally binding guidelines for the use and distribution of software.
    (ii) Hacking is the act of unauthorized access to a computer, computer network or any digital system.

Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Show Answer

b. (i) False, (ii) True

  1. How does excessive use of technology can affect physical health?

    a. Internet Addiction
    b. Social Isolation
    c. Anxiety & Depression
    d. a and c

Show Answer

d. a and c

  1. Intellectual property refers to

    a. Inventions
    b. Artistic expressions
    c. Real estate
    d. a & b
    e. all

Show Answer

d. a & b

  1. Which of the following law is granted automatically to the creator/owner

    a. Copyright
    b. Patent
    c. Trademark
    d. License

Show Answer

a. Copyright

  1. Which of the following browser is an open source software?

    a. Chrome
    b. Firefox
    c. Edge
    d. All of the above

Show Answer

b. Firefox

  1. Read following statements:

    (i) Digital footprint is nothing but the record of what a person do online.
    (ii) Patents are automatically granted to creators and authors.

Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Show Answer

a. (i) True, (ii) False

  1. Hacking, when done with positive intent is called ____

    a. White Hacking
    b. Cracking
    c. Ethical Hacking
    d. Good hacking

Show Answer

c. Ethical Hacking

  1. A patent protects an invention for _____ years, after which it be freely used.

    a. 10
    b. 20
    c. 30
    d. Lifetime

Show Answer

b. 20

  1. Digital Footprint is also termed as

    a. Digital tattoo
    b. E-Footprint
    c. Digital Trail
    d. Digital Mark

Show Answer

a. Digital tattoo

  1. Which of the following does not match with the objective of Free Software?

    a. It gives user freedom to use program for any purpose
    b. It gives user freedom to study functionality of program
    c. It gives user freedom to redistribute copies to others and get benefited with incentives.
    d. It gives user freedom to update the program and release updated version publically for community benefits

Show Answer

c. It gives user freedom to redistribute copies to others and get benefited with incentives.

  1. Which of the following does not comes inder the Creative Common License?

    a. Movie
    b. Image
    c. Book
    d. Software

Show Answer

d. Software

  1. Select the incorrect statement-

    a. IPR gives owner right to decide how much information he/she can share with user.
    b. IPR encourages creators to invent new ideas, designs, and softwares.
    c. IPR ensures that some of the properties cannot be disclosed publically.
    d. IPR gives owner right to get financial benefits against their creation/inventions.

Show Answer

c. IPR ensures that some of the properties cannot be disclosed publically.

  1. The software which can be used and copied freely but cannot be modified

    a. Freeware
    b. Shareware
    c. Proprietary software
    d. Open source software

Show Answer

a. Freeware

  1. Which of the following is advantage of proprietary software?

    a. It is bug free
    b. It is customizable
    c. It is not free
    d. Too generic for specific purpose

Show Answer

a. It is bug free

  1. hackers who practices hacking with positive intent are known as

    a. Black hat hackers
    b. White hat hackers
    c. Red hat hackers
    d. Gray hat hackers

Show Answer

b. White hat hackers

  1. To grant user the rights to copy, modify, redistribute a Software______ public license is used-

    a. CC
    b. GNU GPL
    c. a and b both
    d. none

Show Answer

b. GNU GPL

  1. When a user share his image in Facebook deliberately,  he leaves trail of data called as

    a. Active Digital Footprint
    b. Passive Digital Footprint
    c. E- Footprint
    d. Digital Marks

Show Answer

a. Active Digital Footprint

  1. Read following statements:

    (i) Always check the content you post on the web.
    (ii) Copyright is usually granted for inventions.

Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Show Answer

c. Both are True

  1. The practice of taking someone’s work or ideas and passing them off as one’s own is known as ___

    a. Identity Theft
    b. Spamming
    c. hacking
    d. Plagiarism

Show Answer

d. Plagiarism

  1. To prevent unauthorized access to and or from the network, a system known as

    a. Gateway
    b. Antivirus
    c. Firewall
    d. Net Protector

Show Answer

c. Firewall

  1. Read following statements:

    (i) End user license Agreement (EULA) indicates the term under which the end user may use the software
    (ii) Netiquettes help in making good digital footprint of yours.

Which of the following is correct?

a. (i) True, (ii) False
b. (i) False, (ii) True
c. Both are True
d. Both are False

Show Answer

c. Both are True

Societal Impact MCQ Set-2 (Q25-Q50)

Societal Impact MCQ Set-3 (Q51-Q75)

Informatics Practices Class 12 MCQs

7 thoughts on “Societal Impact MCQ | Data Protection MCQ”

Leave a Comment

Your email address will not be published. Required fields are marked *

error: Content is protected !!