STUDENT
SOCIETAL IMPACTS
Total Q: 79
Time: 70 Mins
Q 1.
We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:
Avoid Cyber Bullying
Respect Other's Privacy
No Copyright violation
All of these
Q 2.
______ is the gaining of unauthorized access to data In a computer system.
Phishing
Plagiarism
Hacking
Copyright violation
Q 3.
E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care. What are the health hazards which can be caused by E-waste ?
Lung cancer
DNA damage
Brain damage
All of these
Q 4.
The software that is free for anyone, and its source code is available for access, modification, correction, and improvement is called
Proprietary software
Commercial software
Free and Open Source Software
Copyrighted software
Q 5.
The legal and regulatory aspects of the internet refer to _____
Cyber Space
Cyber crime
Criminal law
IT act
Q 6.
The trail that is automatically created when a person uses internet on any digital device like laptops, smart phones, tablets etc is called
Cyber Bullying
Phishing
Digital Footprint
Digital Activity
Q 7.
Technology not protected by copyright and available to everyone, is categorized as:
Proprietary
Open Source
Experimental
Shareware
Q 8.
Following are the impact of e-waste on the environment.
Choose the odd one out.
Soil Pollution
Water Pollution
Air Pollution
Sound Pollution
Q 9.
Assertion (A): Cyber Bullying can have serious, emotional and psychological effects on victims.
Reason (R): Online Bullying is not a crime while offline bullying is a crime.
Both (A) and (R) are true and (R) is the correct explanation for (A).
Both (A) and (R) are true and (R) is not the correct explanation for (A).
(A) is true and (R) is false.
(A) is false but (R) is true.
Q 10.
In FOSS source code is usually hidden from the users.
True
False
-
-
Q 11.
Ramanuj makes an app to sell fruits online. The code written by Ramanuj is protected by:
Patents
Copyright
Design
Trademark
Q 12.
Out of the following, which crime(s) will come under cyber crime category ?
Identity theft
Invasion of privacy
Online harassment
All of these
Q 13.
E-Waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The ___________ has issued a formal set of guidelines for proper handling and disposal of e-waste.
Centra Pollution Control Board (CPCB)
Department of Information Technology (DIT)
Waste Electrical and Electronic Equipment (WEEE)
Information Communication Technology (ICT)
Q 14.
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
Spamming
Phishing
Plagiarism
Trojan
Q 15.
What is plagiarism?
Using copyrighted material without giving proper acknowledgement to the source
Downloading illegal software.
Spreading misinformation online.
Hacking into computer systems.
Q 16.
Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:
Ubuntu
Windows
Mozilla Firefox
Blender
Q 17.
Rama was unable to understand how the recruiters were able to know about her digital activity when she has not shared anything with them.
The recruiters might have checked _____ of Rama.
Carbon Footprint
Water Footprint
Online print
Digital Footprint
Q 18.
The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________
Plagiarism
Copyright Violation
Copyright
Trademark Infringement
Q 19.
What is a common symptom of extended use of digital devices these days ?
Improved eyesight
Enhanced physical fitness
Eye strain
Increased muscle strength
Q 20.
Rupam created an assistive device for the blind. This device is very helpful for the blind and people with low vision. Now, she wants that no one should copy her innovation. What should she do ?
Get the trademark for her invention
Get the license for her invention
Get the patent for her invention
Get the copyright for her invention
Q 21.
A patent protects an invention for __________ years, after which it can be freely used.
40
30
20
10
Q 22.
Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media platform about a person, such that he/she is mentally harassed ?
Phishing
Hacking
Cyber bullying
Identity Theft
Q 23.
The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _________.
Intelligent portable rights
Intellectual property rights
Interactive property rights
Instance Portability rights
Q 24.
Which of the following is not a feature of Open Source Software ?
It can be shared with others without any licensing burden.
It is same as free software.
It can be downloaded on multiple devices.
Its source code is available for free distribution.
Q 25.
Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?
Statements 1 and 2
Statements 2 and 3
Statements 3 and 4
Statements 2 and 4
Q 26.
Rohit forgot his laptop in his car and when he came back, he found his laptop was missing. This act is _____.
Cybercrime
Phishing
Theft
Plagiarism
Q 27.
Legal term to describe the rights of a creator of original creative or artistic work is:
Copyright
Copyleft
GPL
FOSS
Q 28.
________ operating system comes under FOSS
Windows
Ubuntu
Mac
Oracle
Q 29.
With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised parents to follow few health tips. Which of the following health tip should not be suggested?
The sitting posture should be correct
Breaks should be taken in between the online classes
To protect the eyes the gadgets should be placed above eye level
Wash the eyes regularly
Q 30.
Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as
Plagiarism
Identity Theft
Phishing
Piracy
Q 31.
________ is not a FOSS tool.
Libre Office
Mozilla Firefox
Google Chrome
Python
Q 32.
_______is the practice of taking someone else's work or ideas and passing them off as one's own:
Plagiarism
Copyright
Patent
All of these
Q 33.
Which of the following is not a violation of IPR?
Plagiarism
Copyright Infringement
Patent
Trademark Infringement
Q 34.
________is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.
Creative Cost
Critical Commons
Creative Commons
Creative Common
Q 35.
Emma is a student working on her research project. She finds a well-written paragraph on the Internet that perfectly explains the concept that she wants to include in her project. She copies and pastes the paragraph as it is into her research paper. Her research paper did not get selected due to plagiarism. What is the one way out of the following that Emma could have followed to avoid plagiarism in this case ?
Copying the content from a book in her college library.
Rewriting the paragraph in her own words and citing the original source.
Asking her friends for information and using it in her research paper, without mentioning her friend's input.
Posting the paper on her college website.
Q 36.
Linux, MySQL and Mozilla Firefox software come under_______ category.
Proprietary
FOSS
Freeware
Shareware
Q 37.
Excessive screen time and poor posture can lead to:
Faster Internet Speeds
Eye strain and other health issues
Better vision and bone density
Improved physical health
Q 38.
The digital footprint that we leave online unintentionally is called
Active digital footprint
Passive digital footprint
True digital footprint
False digital footprint
Q 39.
Companies get their Trademark registered to protect?
Logos, names and brands
Word, phrases or symbol
slogans, stylized fonts, and colors
Company furniture, worker, brands
Q 40.
Which out of the following cannot be included in digital footprint ?
Submitting the form online
Searching for your friend’s address online
Walking on the beach
Online shopping
Q 41.
There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?
Downloaded the images that marked as CC and pasted in her project file.
Copied the content from some website and pasted in her file.
Copied the content from website and gave reference about the same in the project.
Downloaded and installed the open source software for typing the synopsis.
Q 42.
Priya received an email that appeared to be from her bank, asking her to update her account information by clicking on a link. She clicked the link to enter her details, but immediately after, some amount was debited from her account. What type of cybercrime did Priya fall victim to?
Cyber stalking
Phishing
Fishing
Cyber bullying
Q 43.
GPL stands for
Guided Public License
General Public License
Global Public License
General Public Letter
Q 44.
The following is automatically granted to the creator or owner of any invention
Patent
Copyright
Trademark
License
Q 45.
E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of e-waste management are reduce, ________ and recycle.
reuse
recheck
resubmit
regular
Q 46.
We need to exhibit proper manners and etiquettes while being online. Pick up one such net etiquette from the following :
Do not share the expertise
Respect privacy and diversity
Feed the troll
Copyright violation
Q 47.
Consider the following statement with reference to Trademark and Hacking
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.
Statement 1 is True but Statement 2 is False
Statement 1 is False but Statement 2 is True
Both Statements are True
Both Statements are False
Q 48.
Which of the following is not a type of cybercrime?
Data theft
Forgery of online documents
Damage to data and systems
Installing antivirus for protection
Q 49.
Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is:
Cyber Crime
Phishing
Theft
Plagiarism
Q 50.
Feasible method (s) to manage e-waste is:
Reduce
Reuse
Recycle
All of the above
Q 51.
Copyright, Patent and Trademark comes under:
Intellectual Property Right
Individual Property Right
Industrial Property Right
None of these
Q 52.
Ridhima purchased a license for a copy of a software and made additional copies without the permission of the copyright owner. This act of hers is known as
Trademark Infringement
Identity Theft
Copyright Infringement
Patent
Q 53.
Himanshi sets up he own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company?
Patents
Copyright
Design
Trademark
Q 54.
A contract between the creator and the user to allow the user to use his/her work with some price is:
Agreement
Copyright
License
Patent
Q 55.
Primary law in India for matters related to e-commerce and cyber crime is:
IT Act 1995
IT Act 2000
IT Act 1998
IT Act 2010
Q 56.
'F' in FOSS stands for:
Free
Forever
Fire
Freezing
Q 57.
Which of the following is not a type of cyber crime?
Data theft
Installing antivirus for protection
Forgery
Cyber bullying
Q 58.
IPR stands for:
Intelligent Property Rights
Intellectual Property Reserve
Intellectual Property Rights
Intellectual Product Rights
Q 59.
Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?
Yes
No
May be
Not sure
Q 60.
Indian law to deal with cyber crime is :
Cyber Act (CA)
Internet Act (IA)
IT Act (ITA)
WWW Act (WWWA)
Q 61.
What is an example of e-waste?
A ripened mango
Unused old shoes
Unused old computers
Empty cola cans
Q 62.
Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?
ignore it and start chatting to someone else.
reply back to them and find out what their problem is.
shut down the computer and hope they'll leave him alone in future.
go to his parents, teacher, or other trusted adult and let them know that he feels uncomfortable.
Q 63.
You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your name. This wrong/unethical act is considered as __________
Copyright
Hacking
Plagiarism
Trademark
Q 64.
Raheem created a unique computer software and wants to protect his creation from being copied or used without his permission. He is considering to apply for legal protection. Which type of intellectual property protection should Raheem apply for, to safeguard his software?
Copyright
Plagiarism
Trademark
Lease
Q 65.
A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :
Business Waste
Commercial Waste
Solid Waste
E-Waste
Q 66.
Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?
Start chatting with unknown person.
Talk to her parents/teacher or other trusted adult and let them know that she is feeling uncomfortable.
Ignore the conversation.
She should delete the chat so that no one comes to know.
Q 67.
E-waste contains __________ that causes respiratory disorders and brain damage.
Cadmium
Beryllium
Lead
Mercury
Q 68.
Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent?
Patents
Copyright
Design
Trademark
Q 69.
'O' in FOSS stands for:
Outsource
Open
Original
Outstanding
Q 70.
_______ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Plagiarism
Phishing
Cyberstalking
Hacking
Q 71.
A copyright is automatically granted to authors or creators of content.
True
False
-
-
Q 72.
By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as:
Phishing
Identity Theft
Plagiarism
Ransomware
Q 73.
What can an individual do to enhance the privacy of data stored digitally?
Share sensitive information on social media platforms.
Use your date of birth as your password.
Regularly update software installed on your device.
Download and install software from unknown sources
Q 74.
A _________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.
Digital Handprint
Digital Footprint
Offline Footprint
Offline Handprint
Q 75.
When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called ________which causes skin diseases, allergies and an increased risk of lung cancer.
Hydrogen
Beryllium
Chlorine
Oxygen
Q 76.
_________is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.
Offline phishing
Offline footprint
Digital footprint
Digital phishing
Q 77.
Identify the type of cybercrime that involves sending fraudulent emails to deceive individuals into revealing sensitive information.
Hacking
Phishing
Cyberbullying
Cyberstalking
Q 78.
Assertion (A) : Hacking is a cyber crime.
Reason (R) : To avoid hacking, one should not share the password with anyone.
Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion (A).
Both Assertion (A) and Reason (R) are true, but Reason (R) is not the correct explanation of Assertion (A).
Assertion (A) is true, but Reason (R) is false.
Assertion (A) is false, but Reason (R) is true.
Q 79.
e-waste refers to:
Software that has become obsolete
Data that has been deleted from a storage device
Viruses that infect computers
Electronic devices that are no longer in use