STUDENT

SOCIETAL IMPACTS
Total Q: 79
Time: 70 Mins

Q 1.

We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:

Q 2.

______ is the gaining of unauthorized access to data In a computer system.

Q 3.

E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care. What are the health hazards which can be caused by E-waste ?

Q 4.

The software that is free for anyone, and its source code is available for access, modification, correction, and improvement is called

Q 5.

The legal and regulatory aspects of the internet refer to _____

Q 6.

The trail that is automatically created when a person uses internet on any digital device like laptops, smart phones, tablets etc is called

Q 7.

Technology not protected by copyright and available to everyone, is categorized as:

Q 8.

Following are the impact of e-waste on the environment.
Choose the odd one out.

Q 9.

Assertion (A): Cyber Bullying can have serious, emotional and psychological effects on victims.
Reason (R): Online Bullying is not a crime while offline bullying is a crime.

Q 10.

In FOSS source code is usually hidden from the users.

Q 11.

Ramanuj makes an app to sell fruits online. The code written by Ramanuj is protected by:

Q 12.

Out of the following, which crime(s) will come under cyber crime category ?

Q 13.

E-Waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The ___________ has issued a formal set of guidelines for proper handling and disposal of e-waste.

Q 14.

A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?

Q 15.

What is plagiarism?

Q 16.

Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:

Q 17.

Rama was unable to understand how the recruiters were able to know about her digital activity when she has not shared anything with them.
The recruiters might have checked _____ of Rama.

Q 18.

The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________

Q 19.

What is a common symptom of extended use of digital devices these days ?

Q 20.

Rupam created an assistive device for the blind. This device is very helpful for the blind and people with low vision. Now, she wants that no one should copy her innovation. What should she do ?

Q 21.

A patent protects an invention for __________ years, after which it can be freely used.

Q 22.

Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media platform about a person, such that he/she is mentally harassed ?

Q 23.

The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _________.

Q 24.

Which of the following is not a feature of Open Source Software ?

Q 25.

Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?

Q 26.

Rohit forgot his laptop in his car and when he came back, he found his laptop was missing. This act is _____.

Q 27.

Legal term to describe the rights of a creator of original creative or artistic work is:

Q 28.

________ operating system comes under FOSS

Q 29.

With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised parents to follow few health tips. Which of the following health tip should not be suggested?

Q 30.

Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as

Q 31.

________ is not a FOSS tool.

Q 32.

_______is the practice of taking someone else's work or ideas and passing them off as one's own:

Q 33.

Which of the following is not a violation of IPR?

Q 34.

________is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.

Q 35.

Emma is a student working on her research project. She finds a well-written paragraph on the Internet that perfectly explains the concept that she wants to include in her project. She copies and pastes the paragraph as it is into her research paper. Her research paper did not get selected due to plagiarism. What is the one way out of the following that Emma could have followed to avoid plagiarism in this case ?

Q 36.

Linux, MySQL and Mozilla Firefox software come under_______ category.

Q 37.

Excessive screen time and poor posture can lead to:

Q 38.

The digital footprint that we leave online unintentionally is called

Q 39.

Companies get their Trademark registered to protect?

Q 40.

Which out of the following cannot be included in digital footprint ?

Q 41.

There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?

Q 42.

Priya received an email that appeared to be from her bank, asking her to update her account information by clicking on a link. She clicked the link to enter her details, but immediately after, some amount was debited from her account. What type of cybercrime did Priya fall victim to?

Q 43.

GPL stands for

Q 44.

The following is automatically granted to the creator or owner of any invention

Q 45.

E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of e-waste management are reduce, ________ and recycle.

Q 46.

We need to exhibit proper manners and etiquettes while being online. Pick up one such net etiquette from the following :

Q 47.

Consider the following statement with reference to Trademark and Hacking
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.

Q 48.

Which of the following is not a type of cybercrime?

Q 49.

Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is:

Q 50.

Feasible method (s) to manage e-waste is:

Q 51.

Copyright, Patent and Trademark comes under:

Q 52.

Ridhima purchased a license for a copy of a software and made additional copies without the permission of the copyright owner. This act of hers is known as

Q 53.

Himanshi sets up he own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company?

Q 54.

A contract between the creator and the user to allow the user to use his/her work with some price is:

Q 55.

Primary law in India for matters related to e-commerce and cyber crime is:

Q 56.

'F' in FOSS stands for:

Q 57.

Which of the following is not a type of cyber crime?

Q 58.

IPR stands for:

Q 59.

Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?

Q 60.

Indian law to deal with cyber crime is :

Q 61.

What is an example of e-waste?

Q 62.

Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?

Q 63.

You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your name. This wrong/unethical act is considered as __________

Q 64.

Raheem created a unique computer software and wants to protect his creation from being copied or used without his permission. He is considering to apply for legal protection. Which type of intellectual property protection should Raheem apply for, to safeguard his software?

Q 65.

A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :

Q 66.

Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?

Q 67.

E-waste contains __________ that causes respiratory disorders and brain damage.

Q 68.

Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent?

Q 69.

'O' in FOSS stands for:

Q 70.

_______ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Q 71.

A copyright is automatically granted to authors or creators of content.

Q 72.

By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as:

Q 73.

What can an individual do to enhance the privacy of data stored digitally?

Q 74.

A _________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.

Q 75.

When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called ________which causes skin diseases, allergies and an increased risk of lung cancer.

Q 76.

_________is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.

Q 77.

Identify the type of cybercrime that involves sending fraudulent emails to deceive individuals into revealing sensitive information.

Q 78.

Assertion (A) : Hacking is a cyber crime.
Reason (R) : To avoid hacking, one should not share the password with anyone.

Q 79.

e-waste refers to: