You are on page 1of 11

Societal Impact Class 11 MCQ

cbseskilleducation.com/societal-impact-class-11-mcq

28/10/2022

1. Whenever we surf the Internet using smartphones, tablets, computers, etc., we


leave a trail of data reflecting the activities performed by us online, which is our
________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above

a. Digital footprint
2. Digital footprints are also known as _________.
a. Digital print
b. Digital tattoos t
c. Digital Data
d. None of the above

b. Digital tattoos
3. Our digital footprint can be created and used with or without our knowledge. It
includes _________.
a. Websites we visit
b. Emails we send
c. Any information we submit online
d. All of the above t

d. All of the above


4. Which of the following belongs to digital footprint _________.
a. Active digital footprints
b. Passive digital footprints
c. Both a) and b) t
d. None of the above

c. Both a) and b)
Societal Impact Class 11 MCQ

5. Active digital footprints which includes data that we _______.


a. Email we write
b. Responses or posts we make
c. Different websites or mobile apps
d. All of the above t

d. All of the above

1/11
6. Every time we use a smartphone to browse the web, we leave a data trail that
reflects the online activities we engaged in. This data trail is known as our
________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above

a. Digital footprint
7. The rights to copy, distribute, and perform publicly are some examples of the
_______.
a. Copyright t
b. Trademark
c. Patent
d. All of the above

a. Copyright
8. EULA stands for __________.
a. End user license agreement t
b. End user license adorns
c. End user level agreement
d. None of the above

a. End user license agreement


9. The digital data trail we leave online unintentionally is called _________.
a. Passive digital footprints t
b. Active digital footprints
c. Both a) and b)
d. None of the above

a. Passive digital footprints


Societal Impact Class 11 MCQ

10. Everyone who is connected to the Internet may have a ________.


a. Digital footprint t
b. Social footprint
c. Smart footprint
d. None of the above

a. Digital footprint
11. We follow _________ etiquettes during our social interactions or while surfing
the Internet.
a. Be Ethical
b. Be Respectful
c. Be Responsible
d. All of the above t

2/11
d. All of the above
12. We should not use _______ materials without the permission of the creator or
owner.
a. Copyrighted t
b. Patent
c. Trademark
d. None of the above

a. Copyrighted
13. As an ethical digital citizen, we need to be careful while _________.
a. Streaming audio
b. Streaming Video
c. Downloading images and file
d. All of the above t

d. All of the above


14. Amit copies some internet articles without crediting the original author or
source. This is known as _______.
a. Copyright
b. Trade mark
c. Plagiarism t
d. None of the above

c. Plagiarism
Societal Impact Class 11 MCQ

15. Unauthorized use of another’s trademark on goods and services is referred to


as __________.
a. Trademark Infringement t
b. Plagiarism Infringement
c. Copyright Infringement
d. None of the above

a. Trademark Infringement
16. GPL stands for _______.
a. General Public License t
b. General Product License
c. General Purchase License
d. None of the above

a. General Public License


17. What do you mean by cyber bullying _________.
a. Insulting to others
b. Giving threats online
c. Sharing others personal information
d. All of the above t

3/11
d. All of the above
18. Accidentally leaving a digital data trail online is referred to as _________.
a. Active digital footprints
b. Passive digital footprints t
c. Both a) and b)
d. None of the above

b. Passive digital footprints


19. Which of the following public licence categories is most popular?
a. GPL t
b. CC
c. Both a) and b)
d. None of the above

a. GPL
Societal Impact Class 11 MCQ

20. Which of the following belong to sensiteve data __________.


a. Bank details
b. Personal Information
c. Both a) and b) t
d. None of the above

c. Both a) and b)
21. The digital footprint we knowingly leave online is referred to as _______.
a. Active digital footprints t
b. Passive digital footprints
c. Both a) and b)
d. None of the above

a. Active digital footprints


22. CC stands for ____________.
a. Creative commons license t
b. Create common license
c. Create communicatee license
d. None of the above

a. Creative commons license


23. The actual implementation of the concept or invention will be protected by
_______.
a. Trademark
b. Copyright
c. Patent t
d. None of the above

c. Patent

4/11
24. Good communication over email, chat room and other such forums require a
digital citizen to abide by the communication etiquettes as _________.
a. Be polite
b. Be credible
c. Be Precise
d. All of the above t

d. All of the above


Societal Impact Class 11 MCQ

25. Hacking is referred to as ________ when it is done with good intentions.


a. Cyber hacking
b. Ethical hacking t
c. Unknown hacking
d. None of the above

b. Ethical hacking
26. Elements of data that can cause substantial harm, embarrassment,
inconvenience and unfairness to an individual, if breached or compromised, is
called ________.
a. Sensitive data t
b. Original data
c. Fake data
d. None of the above

a. Sensitive data
27. GPL is basically made to grant a ______ a public license.
a. Software
b. Application
c. Both a) and b) t
d. None of the above

c. Both a) and b)
28. Who among the following known as a “black hat hacker”?
a. Crackers
b. Malicious hackers
c. Both a) and b) t
d. None of the above

c. Both a) and b)
29. What does a black hacker do?
a. Break into computer systems with malicious intent
b. Violate the confidentiality
c. Both a) and b) t
d. None of the above

c. Both a) and b)

5/11
Societal Impact Class 11 MCQ

30. What does a white hacker do?


a. Respect the rule of law
b. Identify company security flaws so they can make recommendations for improvement.
c. Also known as Ethical hacker
d. All of the above t

d. All of the above


31. IPR stands for _________.
a. Intellectual Property Right t
b. Internal Property Right
c. Indian Property Right
d. None of the above

a. Intellectual Property Right


32. A responsible internet user should follow ________.
a. Choose password wisely
b. Know who you befriend
c. Think before uploading
d. All of the above t

d. All of the above

a. Text message
b. Videos and Images
c. Personal or Bank related information
d. Both a) and b) t

d. Both a) and b)
34. FOSS stands for _______.
a. Free and Open source software t
b. First and Open source software
c. Flat and Open source software
d. None of the above

a. Free and Open source software


Societal Impact Class 11 MCQ

35. To be a responsible netizen (internet user), we should _______.


a. Frequently change the password
b. Choose secure password
c. Think before upload anything on the internet
d. All of the above t

d. All of the above

6/11
36. The act of presenting a person with a false website or email that appears
original or authentic is known as _________.
a. Hacking
b. Phishing t
c. Identity theft
d. None of the above

b. Phishing
37. The name and logo of the company will be protected by ________.
a. Trademark t
b. Copyright
c. Patent
d. None of the above

a. Trademark
38. Which _________ operating system came under FOSS.
a. Unix
b. Microsoft
c. Ubuntu t
d. None of the above

c. Ubuntu
39. Ajit has developed a new computer science theory. He wants to legally guard it
from unlawful use. He should take its ________.
a. Copyright t
b. Patent
c. Trademark
d. None of the above

a. Copyright
Societal Impact Class 11 MCQ

40. An example of a cybercrime where the victim is blackmailed into paying for
access to the data is __________.
a. Identity theft
b. Ransomware t
c. Spamming
d. None of the above

b. Ransomware
41. Our digital footprints are saved in the form of ________ on local web browsers.
a. Cookies
b. Browser History
c. Both a) and b) t
d. None of the above

c. Both a) and b)

7/11
42. The traces and records we leave behind when using the internet are called
_______.
a. Data protection
b. Digital Data
c. Digital Footprint t
d. None of the above

c. Digital Footprint
43. A ______ is someone who intentionally sows discord online by starting
arguments, upsetting people, or posting irrelevant or offensive messages in online
communities.
a. Copyright
b. Internet Bullying t
c. Cyber security
d. None of the above

b. Internet Bullying
44. _______ browser come under FOSS.
a. Google chrome
b. Firefox t
c. Microsoft edge
d. None of the above

b. Firefox
Societal Impact Class 11 MCQ

45. Digital communication includes _________.


a. Texting
b. Instant messaging
c. Email
d. All of the above t

d. All of the above


46. E-waste stands for ________.
a. Electronic waste t
b. Electrical waste
c. Ethical waste
d. None of the above

a. Electronic waste
47. Legal protection for intellectual property is provided by _______.
a. Patent
b. Copyright
c. Trademark
d. All of the above t

d. All of the above

8/11
48. Anyone who uses both digital and internet technology is a ________.
a. Digital citizen
b. Netizen
c. Both a) and b) t
d. None of the above

c. Both a) and b)
49. Which of the subsequent actions highlights leaving live digital traces?
a. Visiting a Website
b. Sending email t
c. Both a) and b)
d. None of the above

b. Sending email
Societal Impact Class 11 MCQ

50. The use of digital footprints is _______.


a. Trace user’s location
b. Know digital activity
c. Both a) and b) t
d. None of the above

c. Both a) and b)
51. In today’s technologically advanced society, can do ________ .
a. Online Education
b. Online Shopping
c. Online Banking
d. All of the above t

d. All of the above


52. Being a good digital citizens , we should _________.
a. Respect privacy of others
b. Avoid cyber bullying
c. Avoid copyright materials
d. All of the above t

d. All of the above


53. Online spreading of rumor’s, making threats online, disclosing personal
information about the victim, and making comments intended to publicly mock a
victim are all considered to be ______.
a. Cyber crime
b. Cyber bullying t
c. Both a) and b)
d. None of the above

b. Cyber bullying

9/11
54. Which of the following e-waste management strategies you will consider?
a. Reduce
b. Reuse
c. Recycle
d. All of the above t

d. All of the above


Societal Impact Class 11 MCQ

55. ______ are websites or applications that let users take part in the community by
publishing and sharing content with others.
a. Banking website
b. Social media website t
c. Financial website
d. None of the above

b. Social media website


56. ________ software package come under FOSS.
a. Open Office
b. Libre Office
c. Both a) and b) t
d. None of the above

c. Both a) and b)
57. Which of the following belong to cyber crime law?
a. Hacking
b. Spamming
c. Phishing
d. All of the above t

d. All of the above


58. The law in India gives the user instructions on how to process, store, and
transmit sensitive information.
a. Information Technology Act, 2000 t
b. Information Technology Act, 2001
c. Information Technology Act, 2002
d. Information Technology Act, 2003

a. Information Technology Act, 2000


59. Reselling used electronic products referred to as _________.
a. Reduce
b. Reuse
c. Recycle
d. Refurbishing t

d. Refurbishing

10/11
60. A scientific field known as _______ deals with building or setting up work
environments, including the furniture, technology, and systems, to ensure user
safety and comfort.
a. Arranger
b. Ergonomics t
c. Agronomics
d. None of the above

b. Ergonomics

11/11

You might also like