Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
13 views9 pages

Informatics Practices-Assignment Questions

The document consists of assignment questions related to societal impacts of informatics practices for Grade XII students. It covers various topics such as digital footprints, cybercrime, e-waste management, intellectual property rights, and safety measures against cyber threats. The questions are designed to test students' understanding of these concepts and their implications in the digital world.

Uploaded by

rashood.ae16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views9 pages

Informatics Practices-Assignment Questions

The document consists of assignment questions related to societal impacts of informatics practices for Grade XII students. It covers various topics such as digital footprints, cybercrime, e-waste management, intellectual property rights, and safety measures against cyber threats. The questions are designed to test students' understanding of these concepts and their implications in the digital world.

Uploaded by

rashood.ae16
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

INFORMATICS PRACTICES

Assignment Questions - SOCIETAL IMPACTS


Name:_______________________ ​​ Grade: XII _______
------------------------------------------------------------------------------------------------------------
1.​ Read the following statement and select an appropriate term for the same:
“It includes websites visited by users, emails sent by user, information
submitted online by user, IP address, location and other services online.”
a) Digital Footprint​ b) IPR​ c) Plagiarism​ d) Cyber Stalking
2.​ The software which are sold commercially and their source code not shared or
distributed to the users are known as _____________
a) Proprietary software​ ​ ​ b) FOSS software
c) GPL License software​ ​ d) Pirated Software
3.​ Be secure refers to
a) Choose password wisely​​ b) Know who you be friend
c) Beware of fake information​ ​ d) All of these
4.​ The electronic equivalent of junk mail is known as
a) adware​ b) Cyber fraud​ c) Spam​ d) Packets
5.​ Ridhima purchased a license for a copy of a software and made additional
copies without the permission of the copyright owner. This act of hers is
known as .
(i) Trademark Infringement ​ ​ (ii) Identity Theft
(iii) Copyright Infringement​ ​ (iv) Patent
6.​ What can an individual do to enhance the privacy of data stored digitally ?
(i) Share sensitive information on social media platforms.
(ii) Use your date of birth as your password.
(iii) Regularly update software installed on your device.
(iv) Download and install software from unknown sources.
7.​ ___________________ is the gaining of unauthorized access to data in a
computer system.
8.​ Excessive screen time and poor posture can lead to:
(A) Faster Internet Speeds​​ (B) Eye strain and other health issues
(C) Better vision and bone density​ (D) Improved physical health
9.​ Priya received an email that appeared to be from her bank, asking her to
update her account information by clicking on a link. She clicked the link to
enter her details, but immediately after, some amount was debited from her
account. What type of cybercrime did Priya fall victim to?
(A) Cyber stalking​ (B) Phishing​ (C) Fishing​ (D) Cyber bullying
10.​ Raheem created a unique computer software and wants to protect his
creation from being copied or used without his permission. He is considering
applying for legal protection. Which type of intellectual property protection
should Raheem apply for, to safeguard his software?
(A) Copyright​ (B) Plagiarism​ (C) Trademark​ (D) Lease
11.​Rama was unable to understand how the recruiters were able to know about
her digital activity when she had not shared anything with them. The
recruiters might have checked _______________ of Rama.
(i) Carbon Footprint ​​ (ii) Water Footprint
(iii) Online print ​ ​ ​ (iv) Digital Footprint
12.​ A ______________ is a unique data trace of a user’s activities, actions,
communications or transactions in digital media.
a. Digital Handprint​​ b. Digital Footprint
c. Offline Footprint​ ​ d. Offline Handprint
13.​ The software that is free for anyone, and its source code is available for
access, modification, correction, and improvement is called .
(i) Proprietary software ​ ​ ​ (ii) Commercial software
(iii) Free and Open source software ​ ​ (iv) Copyrighted software
14.​ _______________ help in data protection through copyrights, patents and
trademarks.
(i) Data Privacy Right ​ ​ ​ ​ (ii) Right to Innovation
(iii) Intellectual Property Rights (IPR)​ (iv) Right to Data Protection
15.​ Digital footprints are also known as _____________
a. Digital data​b. Plagiarism​ c. Digital tattoos​ d. Digital print
16.​ Assertion (A) : Cyber Bullying can have serious, emotional and
psychological effects on victims.
Reason (R) : Online Bullying is not a crime while offline bullying is a crime.
(i) Both (A) and (R) are true and (R) is the correct explanation for (A).
(ii) Both (A) and (R) are true and (R) is not the correct explanation for (A).
(iii) (A) is true and (R) is false.
(iv) (A) is false but (R) is true.
17.​ Following are the impact of e-waste on the environment. Choose the odd
one out.
a. Soil Pollution​ b. Water Pollution​
c. Air Pollution​ d. Sound Pollution
18.​ E-waste is responsible for the degradation of our environment if not
properly treated or disposed of. Some of the feasible methods of e-waste
management are reduce, ____________ and recycle.
i. Reuse​ ​ ii. Recheck​ ​ iii. Resubmit​ iv. regular
19.​ IPR stands for:
a. Intelligent Property Rights​ ​ b. Intellectual Property Reserve
c. Intellectual Property Rights​ d. Intellectual Product Rights
20.​ According to a survey, one of the major Asian countries generates
approximately about 2 million tonnes of electronic waste per year. Only 1.5 %
of the total e-waste gets recycled.Which of the following is not a correct
method to manage e-waste .
a. Increase the lifespan of a product by repairing
b. Use prefabricated products
c. Burry the products in landfill
d. Company gives the buy back option
21.​ Assertion (A) : Digital footprint is the trail of data we leave behind when
we visit any website (or use any online application or portal) to fill-in data or
perform any transaction.
Reason (R) : While online, all of us need to be aware of how to conduct ourselves,
how best to relate with others and what ethics, morals and values to
maintain.
A. Both A and R are true and R is the correct explanation of A
B. Both A and R are true but R is not the correct explanation of A
C. A is true but R is false
D. A is false but R is true
22.​ Assertion (A): - Phishing is the practice of attempting to acquire sensitive
information in a legal way
Reasoning (R):- Phishing acquires sensitive information using deception
A. Both A and R are true and R is the correct explanation of A
B. Both A and R are true but R is not the correct explanation of A
C. A is true but R is false
D. A is false but R is true
23.​ The fraudulent practice of sending emails purporting to be from reputable
companies in order to induce individuals to reveal personal information such
as password and credit card numbers is known as _________________
a) scam​ b) spam​ c) phishing​ ​ d) trolling

24.​ __________ is a code hidden in a program such as a game or spreadsheet


that looks safe to run but has hidden side effects.
a. Virus ​b. Trojan horse ​ ​ c. Worms ​ ​ d. Bot
25.​ ---------------- is the act of unauthorized access to a computer, computer
network or digital system.
a. Illegal access​ b. Virus​ c. Hacking​ ​ d. None of the above
26.​ Mention any four net étiquettes.
27.​ Suggest a point which supports the statement the management of e-waste
will create jobs.
28.​ The garbage of electronic gadgets such as computer peripherals, laptop
accessories, mobiles is known as _________.
29.​ Mr. Sharma is writing a document on Cyber Crime. While writing he came
to know about Plagiarism. Which of the following statements is/are False?
Statement I: Plagiarism is using someone’s work and not giving credit for it
Statement II: Plagiarism is entering into someone’s computer to steal data
Statement III: Plagiarism is Criminal offense
a) Statement II only​​ b) Both Statements I and III
c) Statement II and III​ ​ d) Statements I, II, III
30.​ What is an example of e-waste?
i. A ripened mango​ ​ ii. Unused old shoes
iii. Unused old computers​ iv. Empty cola cans
31.​ When e-waste such as electronic circuit boards are burnt for disposal, the
elements contained in them create a harmful chemical called ________which
causes skin diseases, allergies and an increased risk of lung cancer.
i. Hydrogen ​ ii. Beryllium ​ iii. Chlorine ​ iv. Oxygen
32.​ A ____ is a type of contract between the creator of an original work
permitting someone to use their work, generally for some price.
33.​ The digital footprint that we leave online unintentionally is called
__________________
i. Active digital footprint​ ​ ii. Passive digital footprint
iii. True digital footprint​ ​ iv. False digital footprint
34.​ E-waste management in India is done as per guidelines of
(a) NITI Aayog​ ​
(b) Ministry of Commerce
(c) Central Pollution Control Board(CPCB)​
(d) National Green Tribunal(NGT)
35.​ “P” in GPL stands for __________________.
36.​ __________ is the legal term to describe terms under which people are
allowed to use the copyrighted material.
37.​ Describe e-waste management strategies.
38.​ What is an IPR? Give examples of IPR.
39.​ Police officials arrested four members of an interstate gang for allegedly
duping many people from different states on the pretext of providing them
with holiday packages after creating fake websites of Tours and Travels. The
cyber criminals sent fraudulent emails containing links to fraudulent
websites created by them. The victim in his complaint told police that he was
offered a holiday package to Dubai for a total of 10 times in the next 10 years
and was charged ₹ 1.45 lakh through his credit card. Answer the following
questions pertaining to the given news byte :
(i) Identify the type of cybercrime mentioned in the above case.
(ii) Which Act deals with such crimes in India.
(iii) Suggest any one precaution that can be taken to avoid falling prey to such
criminals.
40.​ ABC Electronics, a popular electronics retail chain, has been a prominent
player in the market for years. However, recent concerns over environmental
degradation and e waste have prompted the company to rethink its strategies
and practices. As the newly appointed sustainability manager, you've been
asked to answer the following questions:
a.​ Considering the environmental concerns associated with e-waste, outline any
one negative impact of the electronic products on the environment.
b.​ Gopal is a college student who recently bought his new smartphone from
ABC electronics. He's excited about the new features and improved
performance of his new device. However, he's now left with his old smart
phone, which is still functional but considered outdated. Suggest him any one
action that he can take for his old smartphone.
c.​ Provide any one recommendation on how ABC Electronics can responsibly
manage its e-waste while minimizing harm to the environment.
41.​ Priya has received an SMS on mobile, asking her to provide the details of
her old debit card in order to get a new one. She clicked on the link in the
message and entered the details of her debit card assuming that this message
was from her bank.
(i) Which cyber crime happened to her?
(ii) What immediate action should she take to handle it?
(iii) Is there any law in India to handle such issues. Discuss briefly.
42.​ What are cyber crimes? Name a few cyber crimes and is there any law in
India which guards its citizens against cyber crimes?
43.​ Write any three safety measures to reduce the risk of cyber crime.
44.​ Raj has created a group on social media to share and discuss academics.
But his friend Mitul is posting rumors in the group.
i) What is the term used for the task done by Mitul?
ii) Any act by the Indian Government imposed to protect and safeguard issues
like this? Explain in detail.
45.​ List any four benefits of e-waste management.
46.​ Mention any four net étiquettes.
47.​ Explain plagiarism with an example.
48.​
49.​ Describe three measures to recycle e-waste.
50.​

51.​
52.​ List any four health hazards due to excessive use of technology.
53.​ Differentiate phishing and hacking.
54.​ Differentiate between the active digital footprint and passive digital
footprints.
55.​ What do you understand by the term hacking? Write any two measures
that one should take to avoid being a victim of hacking.
56.​

57.​ Define the following:


a.​ Patents
b.​ Ethical hacking
c.​ FOSS
d.​ Digital Footprints.
e.​ Plagiarism

You might also like