STUDENT
SOCIETAL IMPACTS
Total Q: 79
Time: 70 Mins
Q 1.
In FOSS source code is usually hidden from the users.
True
False
-
-
Q 2.
_______ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
Plagiarism
Phishing
Cyberstalking
Hacking
Q 3.
Copyright, Patent and Trademark comes under:
Intellectual Property Right
Individual Property Right
Industrial Property Right
None of these
Q 4.
Assertion (A) : Hacking is a cyber crime.
Reason (R) : To avoid hacking, one should not share the password with anyone.
Both Assertion (A) and Reason (R) are true and Reason (R) is the correct explanation of Assertion (A).
Both Assertion (A) and Reason (R) are true, but Reason (R) is not the correct explanation of Assertion (A).
Assertion (A) is true, but Reason (R) is false.
Assertion (A) is false, but Reason (R) is true.
Q 5.
Identify the type of cybercrime that involves sending fraudulent emails to deceive individuals into revealing sensitive information.
Hacking
Phishing
Cyberbullying
Cyberstalking
Q 6.
Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?
Start chatting with unknown person.
Talk to her parents/teacher or other trusted adult and let them know that she is feeling uncomfortable.
Ignore the conversation.
She should delete the chat so that no one comes to know.
Q 7.
Himanshi sets up he own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company?
Patents
Copyright
Design
Trademark
Q 8.
________ is not a FOSS tool.
Libre Office
Mozilla Firefox
Google Chrome
Python
Q 9.
Feasible method (s) to manage e-waste is:
Reduce
Reuse
Recycle
All of the above
Q 10.
'O' in FOSS stands for:
Outsource
Open
Original
Outstanding
Q 11.
Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:
Ubuntu
Windows
Mozilla Firefox
Blender
Q 12.
______ is the gaining of unauthorized access to data In a computer system.
Phishing
Plagiarism
Hacking
Copyright violation
Q 13.
E-Waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The ___________ has issued a formal set of guidelines for proper handling and disposal of e-waste.
Centra Pollution Control Board (CPCB)
Department of Information Technology (DIT)
Waste Electrical and Electronic Equipment (WEEE)
Information Communication Technology (ICT)
Q 14.
Which of the following is not a violation of IPR?
Plagiarism
Copyright Infringement
Patent
Trademark Infringement
Q 15.
Consider the following statement with reference to Trademark and Hacking
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.
Statement 1 is True but Statement 2 is False
Statement 1 is False but Statement 2 is True
Both Statements are True
Both Statements are False
Q 16.
Indian law to deal with cyber crime is :
Cyber Act (CA)
Internet Act (IA)
IT Act (ITA)
WWW Act (WWWA)
Q 17.
The trail that is automatically created when a person uses internet on any digital device like laptops, smart phones, tablets etc is called
Cyber Bullying
Phishing
Digital Footprint
Digital Activity
Q 18.
Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha's gmail id to send mail. This act of Aditi is considered as
Plagiarism
Identity Theft
Phishing
Piracy
Q 19.
Which out of the following cannot be included in digital footprint ?
Submitting the form online
Searching for your friend’s address online
Walking on the beach
Online shopping
Q 20.
Ramandeep is a young woman with great aspirations and has a good team of like-minded people. She along with her team members started a company to sell handicrafts online and also designed a logo for their company. What type of intellectual property does this logo represent?
Patents
Copyright
Design
Trademark
Q 21.
We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:
Avoid Cyber Bullying
Respect Other's Privacy
No Copyright violation
All of these
Q 22.
Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?
Statements 1 and 2
Statements 2 and 3
Statements 3 and 4
Statements 2 and 4
Q 23.
A contract between the creator and the user to allow the user to use his/her work with some price is:
Agreement
Copyright
License
Patent
Q 24.
Which of the following is a type of cybercrime where objectionable and demeaning comments are posted on social media platform about a person, such that he/she is mentally harassed ?
Phishing
Hacking
Cyber bullying
Identity Theft
Q 25.
Rupam created an assistive device for the blind. This device is very helpful for the blind and people with low vision. Now, she wants that no one should copy her innovation. What should she do ?
Get the trademark for her invention
Get the license for her invention
Get the patent for her invention
Get the copyright for her invention
Q 26.
Which of the following is not a type of cybercrime?
Data theft
Forgery of online documents
Damage to data and systems
Installing antivirus for protection
Q 27.
Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?
Yes
No
May be
Not sure
Q 28.
Raheem created a unique computer software and wants to protect his creation from being copied or used without his permission. He is considering to apply for legal protection. Which type of intellectual property protection should Raheem apply for, to safeguard his software?
Copyright
Plagiarism
Trademark
Lease
Q 29.
Out of the following, which crime(s) will come under cyber crime category ?
Identity theft
Invasion of privacy
Online harassment
All of these
Q 30.
Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is:
Cyber Crime
Phishing
Theft
Plagiarism
Q 31.
Which of the following is not a feature of Open Source Software ?
It can be shared with others without any licensing burden.
It is same as free software.
It can be downloaded on multiple devices.
Its source code is available for free distribution.
Q 32.
'F' in FOSS stands for:
Free
Forever
Fire
Freezing
Q 33.
Ridhima purchased a license for a copy of a software and made additional copies without the permission of the copyright owner. This act of hers is known as
Trademark Infringement
Identity Theft
Copyright Infringement
Patent
Q 34.
Companies get their Trademark registered to protect?
Logos, names and brands
Word, phrases or symbol
slogans, stylized fonts, and colors
Company furniture, worker, brands
Q 35.
The software that is free for anyone, and its source code is available for access, modification, correction, and improvement is called
Proprietary software
Commercial software
Free and Open Source Software
Copyrighted software
Q 36.
A copyright is automatically granted to authors or creators of content.
True
False
-
-
Q 37.
E-waste is harmful to the environment and human health if not properly treated or disposed of, therefore they must be handled with care. What are the health hazards which can be caused by E-waste ?
Lung cancer
DNA damage
Brain damage
All of these
Q 38.
What is a common symptom of extended use of digital devices these days ?
Improved eyesight
Enhanced physical fitness
Eye strain
Increased muscle strength
Q 39.
________ operating system comes under FOSS
Windows
Ubuntu
Mac
Oracle
Q 40.
Rohit forgot his laptop in his car and when he came back, he found his laptop was missing. This act is _____.
Cybercrime
Phishing
Theft
Plagiarism
Q 41.
There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?
Downloaded the images that marked as CC and pasted in her project file.
Copied the content from some website and pasted in her file.
Copied the content from website and gave reference about the same in the project.
Downloaded and installed the open source software for typing the synopsis.
Q 42.
E-waste contains __________ that causes respiratory disorders and brain damage.
Cadmium
Beryllium
Lead
Mercury
Q 43.
A software company purchases new computers every year and discards the old ones into the local dumping yard. Write the name of the most appropriate category of waste that the organisation is creating every year, out of the following options :
Business Waste
Commercial Waste
Solid Waste
E-Waste
Q 44.
Primary law in India for matters related to e-commerce and cyber crime is:
IT Act 1995
IT Act 2000
IT Act 1998
IT Act 2010
Q 45.
We need to exhibit proper manners and etiquettes while being online. Pick up one such net etiquette from the following :
Do not share the expertise
Respect privacy and diversity
Feed the troll
Copyright violation
Q 46.
A patent protects an invention for __________ years, after which it can be freely used.
40
30
20
10
Q 47.
The rights of the owner of information to decide how much information is to be shared/exchanged/distributed, are collectively known as _________.
Intelligent portable rights
Intellectual property rights
Interactive property rights
Instance Portability rights
Q 48.
Ramanuj makes an app to sell fruits online. The code written by Ramanuj is protected by:
Patents
Copyright
Design
Trademark
Q 49.
The legal and regulatory aspects of the internet refer to _____
Cyber Space
Cyber crime
Criminal law
IT act
Q 50.
Following are the impact of e-waste on the environment.
Choose the odd one out.
Soil Pollution
Water Pollution
Air Pollution
Sound Pollution
Q 51.
Legal term to describe the rights of a creator of original creative or artistic work is:
Copyright
Copyleft
GPL
FOSS
Q 52.
With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised parents to follow few health tips. Which of the following health tip should not be suggested?
The sitting posture should be correct
Breaks should be taken in between the online classes
To protect the eyes the gadgets should be placed above eye level
Wash the eyes regularly
Q 53.
When e-waste such as electronic circuit boards are burnt for disposal, the elements contained in them create a harmful chemical called ________which causes skin diseases, allergies and an increased risk of lung cancer.
Hydrogen
Beryllium
Chlorine
Oxygen
Q 54.
The following is automatically granted to the creator or owner of any invention
Patent
Copyright
Trademark
License
Q 55.
e-waste refers to:
Software that has become obsolete
Data that has been deleted from a storage device
Viruses that infect computers
Electronic devices that are no longer in use
Q 56.
You were not able to create the IP project, therefore you downloaded a project from the internet and submitted it to your teacher by your name. This wrong/unethical act is considered as __________
Copyright
Hacking
Plagiarism
Trademark
Q 57.
Assertion (A): Cyber Bullying can have serious, emotional and psychological effects on victims.
Reason (R): Online Bullying is not a crime while offline bullying is a crime.
Both (A) and (R) are true and (R) is the correct explanation for (A).
Both (A) and (R) are true and (R) is not the correct explanation for (A).
(A) is true and (R) is false.
(A) is false but (R) is true.
Q 58.
Which of the following is not a type of cyber crime?
Data theft
Installing antivirus for protection
Forgery
Cyber bullying
Q 59.
GPL stands for
Guided Public License
General Public License
Global Public License
General Public Letter
Q 60.
What is plagiarism?
Using copyrighted material without giving proper acknowledgement to the source
Downloading illegal software.
Spreading misinformation online.
Hacking into computer systems.
Q 61.
Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?
ignore it and start chatting to someone else.
reply back to them and find out what their problem is.
shut down the computer and hope they'll leave him alone in future.
go to his parents, teacher, or other trusted adult and let them know that he feels uncomfortable.
Q 62.
Excessive screen time and poor posture can lead to:
Faster Internet Speeds
Eye strain and other health issues
Better vision and bone density
Improved physical health
Q 63.
A _________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.
Digital Handprint
Digital Footprint
Offline Footprint
Offline Handprint
Q 64.
_______is the practice of taking someone else's work or ideas and passing them off as one's own:
Plagiarism
Copyright
Patent
All of these
Q 65.
_________is the trail of data we leave behind when we visit any website (or use any online application or portal) to fill-in data or perform any transaction.
Offline phishing
Offline footprint
Digital footprint
Digital phishing
Q 66.
Rama was unable to understand how the recruiters were able to know about her digital activity when she has not shared anything with them.
The recruiters might have checked _____ of Rama.
Carbon Footprint
Water Footprint
Online print
Digital Footprint
Q 67.
Technology not protected by copyright and available to everyone, is categorized as:
Proprietary
Open Source
Experimental
Shareware
Q 68.
Emma is a student working on her research project. She finds a well-written paragraph on the Internet that perfectly explains the concept that she wants to include in her project. She copies and pastes the paragraph as it is into her research paper. Her research paper did not get selected due to plagiarism. What is the one way out of the following that Emma could have followed to avoid plagiarism in this case ?
Copying the content from a book in her college library.
Rewriting the paragraph in her own words and citing the original source.
Asking her friends for information and using it in her research paper, without mentioning her friend's input.
Posting the paper on her college website.
Q 69.
Linux, MySQL and Mozilla Firefox software come under_______ category.
Proprietary
FOSS
Freeware
Shareware
Q 70.
The practice of taking someone else's work or ideas and passing them off as one's own is known as _____________
Plagiarism
Copyright Violation
Copyright
Trademark Infringement
Q 71.
A research student is expected to write a thesis on a topic. The student browses Internet for the topic and luckily finds it on the Internet. He copies and submits the entire thesis as his own research work. Which of the following activities appropriately categorises the act of the writer ?
Spamming
Phishing
Plagiarism
Trojan
Q 72.
E-waste is responsible for the degradation of our environment if not properly treated or disposed of. Some of the feasible methods of e-waste management are reduce, ________ and recycle.
reuse
recheck
resubmit
regular
Q 73.
________is a non-profit organization that aims to build a publicly accessible global platform where a range of creative and academic work is shared freely.
Creative Cost
Critical Commons
Creative Commons
Creative Common
Q 74.
What is an example of e-waste?
A ripened mango
Unused old shoes
Unused old computers
Empty cola cans
Q 75.
Priya received an email that appeared to be from her bank, asking her to update her account information by clicking on a link. She clicked the link to enter her details, but immediately after, some amount was debited from her account. What type of cybercrime did Priya fall victim to?
Cyber stalking
Phishing
Fishing
Cyber bullying
Q 76.
What can an individual do to enhance the privacy of data stored digitally?
Share sensitive information on social media platforms.
Use your date of birth as your password.
Regularly update software installed on your device.
Download and install software from unknown sources
Q 77.
The digital footprint that we leave online unintentionally is called
Active digital footprint
Passive digital footprint
True digital footprint
False digital footprint
Q 78.
By restricting the server and encrypting the data, a software company's server is unethically accessed in order to obtain sensitive information. The attacker blackmails the company to pay money for getting access to the data, and threatens to publish sensitive information unless price is paid. This kind of attack is known as:
Phishing
Identity Theft
Plagiarism
Ransomware
Q 79.
IPR stands for:
Intelligent Property Rights
Intellectual Property Reserve
Intellectual Property Rights
Intellectual Product Rights