Professional Documents
Culture Documents
cbseskilleducation.com/societal-impact-class-11-mcq
28/10/2022
a. Digital footprint
2. Digital footprints are also known as _________.
a. Digital print
b. Digital tattoos t
c. Digital Data
d. None of the above
b. Digital tattoos
3. Our digital footprint can be created and used with or without our knowledge. It
includes _________.
a. Websites we visit
b. Emails we send
c. Any information we submit online
d. All of the above t
c. Both a) and b)
Societal Impact Class 11 MCQ
1/11
6. Every time we use a smartphone to browse the web, we leave a data trail that
reflects the online activities we engaged in. This data trail is known as our
________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above
a. Digital footprint
7. The rights to copy, distribute, and perform publicly are some examples of the
_______.
a. Copyright t
b. Trademark
c. Patent
d. All of the above
a. Copyright
8. EULA stands for __________.
a. End user license agreement t
b. End user license adorns
c. End user level agreement
d. None of the above
a. Digital footprint
11. We follow _________ etiquettes during our social interactions or while surfing
the Internet.
a. Be Ethical
b. Be Respectful
c. Be Responsible
d. All of the above t
2/11
d. All of the above
12. We should not use _______ materials without the permission of the creator or
owner.
a. Copyrighted t
b. Patent
c. Trademark
d. None of the above
a. Copyrighted
13. As an ethical digital citizen, we need to be careful while _________.
a. Streaming audio
b. Streaming Video
c. Downloading images and file
d. All of the above t
c. Plagiarism
Societal Impact Class 11 MCQ
a. Trademark Infringement
16. GPL stands for _______.
a. General Public License t
b. General Product License
c. General Purchase License
d. None of the above
3/11
d. All of the above
18. Accidentally leaving a digital data trail online is referred to as _________.
a. Active digital footprints
b. Passive digital footprints t
c. Both a) and b)
d. None of the above
a. GPL
Societal Impact Class 11 MCQ
c. Both a) and b)
21. The digital footprint we knowingly leave online is referred to as _______.
a. Active digital footprints t
b. Passive digital footprints
c. Both a) and b)
d. None of the above
c. Patent
4/11
24. Good communication over email, chat room and other such forums require a
digital citizen to abide by the communication etiquettes as _________.
a. Be polite
b. Be credible
c. Be Precise
d. All of the above t
b. Ethical hacking
26. Elements of data that can cause substantial harm, embarrassment,
inconvenience and unfairness to an individual, if breached or compromised, is
called ________.
a. Sensitive data t
b. Original data
c. Fake data
d. None of the above
a. Sensitive data
27. GPL is basically made to grant a ______ a public license.
a. Software
b. Application
c. Both a) and b) t
d. None of the above
c. Both a) and b)
28. Who among the following known as a “black hat hacker”?
a. Crackers
b. Malicious hackers
c. Both a) and b) t
d. None of the above
c. Both a) and b)
29. What does a black hacker do?
a. Break into computer systems with malicious intent
b. Violate the confidentiality
c. Both a) and b) t
d. None of the above
c. Both a) and b)
5/11
Societal Impact Class 11 MCQ
a. Text message
b. Videos and Images
c. Personal or Bank related information
d. Both a) and b) t
d. Both a) and b)
34. FOSS stands for _______.
a. Free and Open source software t
b. First and Open source software
c. Flat and Open source software
d. None of the above
6/11
36. The act of presenting a person with a false website or email that appears
original or authentic is known as _________.
a. Hacking
b. Phishing t
c. Identity theft
d. None of the above
b. Phishing
37. The name and logo of the company will be protected by ________.
a. Trademark t
b. Copyright
c. Patent
d. None of the above
a. Trademark
38. Which _________ operating system came under FOSS.
a. Unix
b. Microsoft
c. Ubuntu t
d. None of the above
c. Ubuntu
39. Ajit has developed a new computer science theory. He wants to legally guard it
from unlawful use. He should take its ________.
a. Copyright t
b. Patent
c. Trademark
d. None of the above
a. Copyright
Societal Impact Class 11 MCQ
40. An example of a cybercrime where the victim is blackmailed into paying for
access to the data is __________.
a. Identity theft
b. Ransomware t
c. Spamming
d. None of the above
b. Ransomware
41. Our digital footprints are saved in the form of ________ on local web browsers.
a. Cookies
b. Browser History
c. Both a) and b) t
d. None of the above
c. Both a) and b)
7/11
42. The traces and records we leave behind when using the internet are called
_______.
a. Data protection
b. Digital Data
c. Digital Footprint t
d. None of the above
c. Digital Footprint
43. A ______ is someone who intentionally sows discord online by starting
arguments, upsetting people, or posting irrelevant or offensive messages in online
communities.
a. Copyright
b. Internet Bullying t
c. Cyber security
d. None of the above
b. Internet Bullying
44. _______ browser come under FOSS.
a. Google chrome
b. Firefox t
c. Microsoft edge
d. None of the above
b. Firefox
Societal Impact Class 11 MCQ
a. Electronic waste
47. Legal protection for intellectual property is provided by _______.
a. Patent
b. Copyright
c. Trademark
d. All of the above t
8/11
48. Anyone who uses both digital and internet technology is a ________.
a. Digital citizen
b. Netizen
c. Both a) and b) t
d. None of the above
c. Both a) and b)
49. Which of the subsequent actions highlights leaving live digital traces?
a. Visiting a Website
b. Sending email t
c. Both a) and b)
d. None of the above
b. Sending email
Societal Impact Class 11 MCQ
c. Both a) and b)
51. In today’s technologically advanced society, can do ________ .
a. Online Education
b. Online Shopping
c. Online Banking
d. All of the above t
b. Cyber bullying
9/11
54. Which of the following e-waste management strategies you will consider?
a. Reduce
b. Reuse
c. Recycle
d. All of the above t
55. ______ are websites or applications that let users take part in the community by
publishing and sharing content with others.
a. Banking website
b. Social media website t
c. Financial website
d. None of the above
c. Both a) and b)
57. Which of the following belong to cyber crime law?
a. Hacking
b. Spamming
c. Phishing
d. All of the above t
d. Refurbishing
10/11
60. A scientific field known as _______ deals with building or setting up work
environments, including the furniture, technology, and systems, to ensure user
safety and comfort.
a. Arranger
b. Ergonomics t
c. Agronomics
d. None of the above
b. Ergonomics
11/11