STUDENT

SOCIETAL IMPACTS
Total Q: 79
Time: 70 Mins

Q 1.

Emma is a student working on her research project. She finds a well-written paragraph on the Internet that perfectly explains the concept that she wants to include in her project. She copies and pastes the paragraph as it is into her research paper. Her research paper did not get selected due to plagiarism. What is the one way out of the following that Emma could have followed to avoid plagiarism in this case ?

Q 2.

In FOSS source code is usually hidden from the users.

Q 3.

Legal term to describe the rights of a creator of original creative or artistic work is:

Q 4.

You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your name. This wrong/unethical act is considered as __________

Q 5.

A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?

Q 6.

_________is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.

Q 7.

Which out of the following cannot be included in digital footprint ?

Q 8.

The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________

Q 9.

We need to exhibit proper manners and etiquettes while being online. Pick up one such net etiquette from the following :

Q 10.

Himanshi sets up he own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company?

Q 11.

Ramanuj makes an app to sell fruits online. The code written by Ramanuj is protected by:

Q 12.

Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is:

Q 13.

A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :

Q 14.

The legal and regulatory aspects of the internet refer to _____

Q 15.

E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care. What are the health hazards which can be caused by E-waste ?

Q 16.

Copyright, Patent and Trademark comes under:

Q 17.

Raheem created a unique computer software and wants to protect his creation from being copied or used without his permission. He is considering to apply for legal protection. Which type of intellectual property protection should Raheem apply for, to safeguard his software?

Q 18.

Identify the type of cybercrime that involves sending fraudulent emails to deceive individuals into revealing sensitive information.

Q 19.

Rupam created an assistive device for the blind. This device is very helpful for the blind and people with low vision. Now, she wants that no one should copy her innovation. What should she do ?

Q 20.

Assertion (A): Cyber Bullying can have serious, emotional and psychological effects on victims.
Reason (R): Online Bullying is not a crime while offline bullying is a crime.

Q 21.

Which of the following is not a type of cybercrime?

Q 22.

Which of the following is not a violation of IPR?

Q 23.

The following is automatically granted to the creator or owner of any invention

Q 24.

A patent protects an invention for __________ years, after which it can be freely used.

Q 25.

What is a common symptom of extended use of digital devices these days ?

Q 26.

Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?

Q 27.

Technology not protected by copyright and available to everyone, is categorized as:

Q 28.

IPR stands for:

Q 29.

A contract between the creator and the user to allow the user to use his/her work with some price is:

Q 30.

Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media platform about a person, such that he/she is mentally harassed ?

Q 31.

Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?

Q 32.

A copyright is automatically granted to authors or creators of content.

Q 33.

Feasible method (s) to manage e-waste is:

Q 34.

When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called ________which causes skin diseases, allergies and an increased risk of lung cancer.

Q 35.

Excessive screen time and poor posture can lead to:

Q 36.

There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?

Q 37.

e-waste refers to:

Q 38.

What is plagiarism?

Q 39.

Priya received an email that appeared to be from her bank, asking her to update her account information by clicking on a link. She clicked the link to enter her details, but immediately after, some amount was debited from her account. What type of cybercrime did Priya fall victim to?

Q 40.

Ridhima purchased a license for a copy of a software and made additional copies without the permission of the copyright owner. This act of hers is known as

Q 41.

Consider the following statement with reference to Trademark and Hacking
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.

Q 42.

With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised parents to follow few health tips. Which of the following health tip should not be suggested?

Q 43.

______ is the gaining of unauthorized access to data In a computer system.

Q 44.

Primary law in India for matters related to e-commerce and cyber crime is:

Q 45.

Companies get their Trademark registered to protect?

Q 46.

E-waste contains __________ that causes respiratory disorders and brain damage.

Q 47.

Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent?

Q 48.

GPL stands for

Q 49.

Indian law to deal with cyber crime is :

Q 50.

E-Waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The ___________ has issued a formal set of guidelines for proper handling and disposal of e-waste.

Q 51.

Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:

Q 52.

________ is not a FOSS tool.

Q 53.

'F' in FOSS stands for:

Q 54.

The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _________.

Q 55.

E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of e-waste management are reduce, ________ and recycle.

Q 56.

The digital footprint that we leave online unintentionally is called

Q 57.

We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:

Q 58.

Linux, MySQL and Mozilla Firefox software come under_______ category.

Q 59.

Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as

Q 60.

By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as:

Q 61.

Out of the following, which crime(s) will come under cyber crime category ?

Q 62.

The software that is free for anyone, and its source code is available for access, modification, correction, and improvement is called

Q 63.

A _________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.

Q 64.

_______is the practice of taking someone else's work or ideas and passing them off as one's own:

Q 65.

Rama was unable to understand how the recruiters were able to know about her digital activity when she has not shared anything with them.
The recruiters might have checked _____ of Rama.

Q 66.

Assertion (A) : Hacking is a cyber crime.
Reason (R) : To avoid hacking, one should not share the password with anyone.

Q 67.

Rohit forgot his laptop in his car and when he came back, he found his laptop was missing. This act is _____.

Q 68.

Which of the following is not a feature of Open Source Software ?

Q 69.

________ operating system comes under FOSS

Q 70.

________is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.

Q 71.

Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?

Q 72.

'O' in FOSS stands for:

Q 73.

_______ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Q 74.

The trail that is automatically created when a person uses internet on any digital device like laptops, smart phones, tablets etc is called

Q 75.

Following are the impact of e-waste on the environment.
Choose the odd one out.

Q 76.

Which of the following is not a type of cyber crime?

Q 77.

What is an example of e-waste?

Q 78.

Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?

Q 79.

What can an individual do to enhance the privacy of data stored digitally?