STUDENT

SOCIETAL IMPACTS
Total Q: 79
Time: 70 Mins

Q 1.

In FOSS source code is usually hidden from the users.

Q 2.

_______ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Q 3.

Copyright, Patent and Trademark comes under:

Q 4.

Assertion (A) : Hacking is a cyber crime.
Reason (R) : To avoid hacking, one should not share the password with anyone.

Q 5.

Identify the type of cybercrime that involves sending fraudulent emails to deceive individuals into revealing sensitive information.

Q 6.

Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?

Q 7.

Himanshi sets up he own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company?

Q 8.

________ is not a FOSS tool.

Q 9.

Feasible method (s) to manage e-waste is:

Q 10.

'O' in FOSS stands for:

Q 11.

Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:

Q 12.

______ is the gaining of unauthorized access to data In a computer system.

Q 13.

E-Waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The ___________ has issued a formal set of guidelines for proper handling and disposal of e-waste.

Q 14.

Which of the following is not a violation of IPR?

Q 15.

Consider the following statement with reference to Trademark and Hacking
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.

Q 16.

Indian law to deal with cyber crime is :

Q 17.

The trail that is automatically created when a person uses internet on any digital device like laptops, smart phones, tablets etc is called

Q 18.

Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as

Q 19.

Which out of the following cannot be included in digital footprint ?

Q 20.

Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent?

Q 21.

We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:

Q 22.

Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?

Q 23.

A contract between the creator and the user to allow the user to use his/her work with some price is:

Q 24.

Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media platform about a person, such that he/she is mentally harassed ?

Q 25.

Rupam created an assistive device for the blind. This device is very helpful for the blind and people with low vision. Now, she wants that no one should copy her innovation. What should she do ?

Q 26.

Which of the following is not a type of cybercrime?

Q 27.

Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?

Q 28.

Raheem created a unique computer software and wants to protect his creation from being copied or used without his permission. He is considering to apply for legal protection. Which type of intellectual property protection should Raheem apply for, to safeguard his software?

Q 29.

Out of the following, which crime(s) will come under cyber crime category ?

Q 30.

Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is:

Q 31.

Which of the following is not a feature of Open Source Software ?

Q 32.

'F' in FOSS stands for:

Q 33.

Ridhima purchased a license for a copy of a software and made additional copies without the permission of the copyright owner. This act of hers is known as

Q 34.

Companies get their Trademark registered to protect?

Q 35.

The software that is free for anyone, and its source code is available for access, modification, correction, and improvement is called

Q 36.

A copyright is automatically granted to authors or creators of content.

Q 37.

E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care. What are the health hazards which can be caused by E-waste ?

Q 38.

What is a common symptom of extended use of digital devices these days ?

Q 39.

________ operating system comes under FOSS

Q 40.

Rohit forgot his laptop in his car and when he came back, he found his laptop was missing. This act is _____.

Q 41.

There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?

Q 42.

E-waste contains __________ that causes respiratory disorders and brain damage.

Q 43.

A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :

Q 44.

Primary law in India for matters related to e-commerce and cyber crime is:

Q 45.

We need to exhibit proper manners and etiquettes while being online. Pick up one such net etiquette from the following :

Q 46.

A patent protects an invention for __________ years, after which it can be freely used.

Q 47.

The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _________.

Q 48.

Ramanuj makes an app to sell fruits online. The code written by Ramanuj is protected by:

Q 49.

The legal and regulatory aspects of the internet refer to _____

Q 50.

Following are the impact of e-waste on the environment.
Choose the odd one out.

Q 51.

Legal term to describe the rights of a creator of original creative or artistic work is:

Q 52.

With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised parents to follow few health tips. Which of the following health tip should not be suggested?

Q 53.

When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called ________which causes skin diseases, allergies and an increased risk of lung cancer.

Q 54.

The following is automatically granted to the creator or owner of any invention

Q 55.

e-waste refers to:

Q 56.

You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your name. This wrong/unethical act is considered as __________

Q 57.

Assertion (A): Cyber Bullying can have serious, emotional and psychological effects on victims.
Reason (R): Online Bullying is not a crime while offline bullying is a crime.

Q 58.

Which of the following is not a type of cyber crime?

Q 59.

GPL stands for

Q 60.

What is plagiarism?

Q 61.

Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?

Q 62.

Excessive screen time and poor posture can lead to:

Q 63.

A _________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.

Q 64.

_______is the practice of taking someone else's work or ideas and passing them off as one's own:

Q 65.

_________is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.

Q 66.

Rama was unable to understand how the recruiters were able to know about her digital activity when she has not shared anything with them.
The recruiters might have checked _____ of Rama.

Q 67.

Technology not protected by copyright and available to everyone, is categorized as:

Q 68.

Emma is a student working on her research project. She finds a well-written paragraph on the Internet that perfectly explains the concept that she wants to include in her project. She copies and pastes the paragraph as it is into her research paper. Her research paper did not get selected due to plagiarism. What is the one way out of the following that Emma could have followed to avoid plagiarism in this case ?

Q 69.

Linux, MySQL and Mozilla Firefox software come under_______ category.

Q 70.

The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________

Q 71.

A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?

Q 72.

E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of e-waste management are reduce, ________ and recycle.

Q 73.

________is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.

Q 74.

What is an example of e-waste?

Q 75.

Priya received an email that appeared to be from her bank, asking her to update her account information by clicking on a link. She clicked the link to enter her details, but immediately after, some amount was debited from her account. What type of cybercrime did Priya fall victim to?

Q 76.

What can an individual do to enhance the privacy of data stored digitally?

Q 77.

The digital footprint that we leave online unintentionally is called

Q 78.

By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as:

Q 79.

IPR stands for: