Teachers and Examiners (CBSESkillEduction) collaborated to create the Societal Impact Class 11 MCQ. All the important Information are taken from the NCERT Textbook Computer Science (083) class 11.
Societal Impact Class 11 MCQ
1. Whenever we surf the Internet using smartphones, tablets, computers, etc., we leave a trail of data reflecting the activities performed by us online, which is our ________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above
2. Digital footprints are also known as _________.
a. Digital print
b. Digital tattoos t
c. Digital Data
d. None of the above
3. Our digital footprint can be created and used with or without our knowledge. It includes _________.
a. Websites we visit
b. Emails we send
c. Any information we submit online
d. All of the above t
4. Which of the following belongs to digital footprint _________.
a. Active digital footprints
b. Passive digital footprints
c. Both a) and b) t
d. None of the above
Societal Impact Class 11 MCQ
5. Active digital footprints which includes data that we _______.
a. Email we write
b. Responses or posts we make
c. Different websites or mobile apps
d. All of the above t
6. Every time we use a smartphone to browse the web, we leave a data trail that reflects the online activities we engaged in. This data trail is known as our ________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above
7. The rights to copy, distribute, and perform publicly are some examples of the _______.
a. Copyright t
b. Trademark
c. Patent
d. All of the above
8. EULA stands for __________.
a. End user license agreement t
b. End user license adorns
c. End user level agreement
d. None of the above
9. The digital data trail we leave online unintentionally is called _________.
a. Passive digital footprints t
b. Active digital footprints
c. Both a) and b)
d. None of the above
Societal Impact Class 11 MCQ
10. Everyone who is connected to the Internet may have a ________.
a. Digital footprint t
b. Social footprint
c. Smart footprint
d. None of the above
11. We follow _________ etiquettes during our social interactions or while surfing the Internet.
a. Be Ethical
b. Be Respectful
c. Be Responsible
d. All of the above t
12. We should not use _______ materials without the permission of the creator or owner.
a. Copyrighted t
b. Patent
c. Trademark
d. None of the above
13. As an ethical digital citizen, we need to be careful while _________.
a. Streaming audio
b. Streaming Video
c. Downloading images and file
d. All of the above t
14. Amit copies some internet articles without crediting the original author or source. This is known as _______.
a. Copyright
b. Trade mark
c. Plagiarism t
d. None of the above
Societal Impact Class 11 MCQ
15. Unauthorized use of another’s trademark on goods and services is referred to as __________.
a. Trademark Infringement t
b. Plagiarism Infringement
c. Copyright Infringement
d. None of the above
16. GPL stands for _______.
a. General Public License t
b. General Product License
c. General Purchase License
d. None of the above
17. What do you mean by cyber bullying _________.
a. Insulting to others
b. Giving threats online
c. Sharing others personal information
d. All of the above t
18. Accidentally leaving a digital data trail online is referred to as _________.
a. Active digital footprints
b. Passive digital footprints t
c. Both a) and b)
d. None of the above
19. Which of the following public licence categories is most popular?
a. GPL t
b. CC
c. Both a) and b)
d. None of the above
Societal Impact Class 11 MCQ
20. Which of the following belong to sensiteve data __________.
a. Bank details
b. Personal Information
c. Both a) and b) t
d. None of the above
21. The digital footprint we knowingly leave online is referred to as _______.
a. Active digital footprints t
b. Passive digital footprints
c. Both a) and b)
d. None of the above
22. CC stands for ____________.
a. Creative commons license t
b. Create common license
c. Create communicatee license
d. None of the above
23. The actual implementation of the concept or invention will be protected by _______.
a. Trademark
b. Copyright
c. Patent t
d. None of the above
24. Good communication over email, chat room and other such forums require a digital citizen to abide by the communication etiquettes as _________.
a. Be polite
b. Be credible
c. Be Precise
d. All of the above t
Societal Impact Class 11 MCQ
25. Hacking is referred to as ________ when it is done with good intentions.
a. Cyber hacking
b. Ethical hacking t
c. Unknown hacking
d. None of the above
26. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called ________.
a. Sensitive data t
b. Original data
c. Fake data
d. None of the above
27. GPL is basically made to grant a ______ a public license.
a. Software
b. Application
c. Both a) and b) t
d. None of the above
28. Who among the following known as a “black hat hacker”?
a. Crackers
b. Malicious hackers
c. Both a) and b) t
d. None of the above
29. What does a black hacker do?
a. Break into computer systems with malicious intent
b. Violate the confidentiality
c. Both a) and b) t
d. None of the above
Societal Impact Class 11 MCQ
30. What does a white hacker do?
a. Respect the rule of law
b. Identify company security flaws so they can make recommendations for improvement.
c. Also known as Ethical hacker
d. All of the above t
31. IPR stands for _________.
a. Intellectual Property Right t
b. Internal Property Right
c. Indian Property Right
d. None of the above
32. A responsible internet user should follow ________.
a. Choose password wisely
b. Know who you befriend
c. Think before uploading
d. All of the above t
33. We can share _______ on social media platforms.
a. Text message
b. Videos and Images
c. Personal or Bank related information
d. Both a) and b) t
34. FOSS stands for _______.
a. Free and Open source software t
b. First and Open source software
c. Flat and Open source software
d. None of the above
Societal Impact Class 11 MCQ
35. To be a responsible netizen (internet user), we should _______.
a. Frequently change the password
b. Choose secure password
c. Think before upload anything on the internet
d. All of the above t
36. The act of presenting a person with a false website or email that appears original or authentic is known as _________.
a. Hacking
b. Phishing t
c. Identity theft
d. None of the above
37. The name and logo of the company will be protected by ________.
a. Trademark t
b. Copyright
c. Patent
d. None of the above
38. Which _________ operating system came under FOSS.
a. Unix
b. Microsoft
c. Ubuntu t
d. None of the above
39. Ajit has developed a new computer science theory. He wants to legally guard it from unlawful use. He should take its ________.
a. Copyright t
b. Patent
c. Trademark
d. None of the above
Societal Impact Class 11 MCQ
40. An example of a cybercrime where the victim is blackmailed into paying for access to the data is __________.
a. Identity theft
b. Ransomware t
c. Spamming
d. None of the above
41. Our digital footprints are saved in the form of ________ on local web browsers.
a. Cookies
b. Browser History
c. Both a) and b) t
d. None of the above
42. The traces and records we leave behind when using the internet are called _______.
a. Data protection
b. Digital Data
c. Digital Footprint t
d. None of the above
43. A ______ is someone who intentionally sows discord online by starting arguments, upsetting people, or posting irrelevant or offensive messages in online communities.
a. Copyright
b. Internet Bullying t
c. Cyber security
d. None of the above
44. _______ browser come under FOSS.
a. Google chrome
b. Firefox t
c. Microsoft edge
d. None of the above
Societal Impact Class 11 MCQ
45. Digital communication includes _________.
a. Texting
b. Instant messaging
c. Email
d. All of the above t
46. E-waste stands for ________.
a. Electronic waste t
b. Electrical waste
c. Ethical waste
d. None of the above
47. Legal protection for intellectual property is provided by _______.
a. Patent
b. Copyright
c. Trademark
d. All of the above t
48. Anyone who uses both digital and internet technology is a ________.
a. Digital citizen
b. Netizen
c. Both a) and b) t
d. None of the above
49. Which of the subsequent actions highlights leaving live digital traces?
a. Visiting a Website
b. Sending email t
c. Both a) and b)
d. None of the above
Societal Impact Class 11 MCQ
50. The use of digital footprints is _______.
a. Trace user’s location
b. Know digital activity
c. Both a) and b) t
d. None of the above
51. In today’s technologically advanced society, can do ________ .
a. Online Education
b. Online Shopping
c. Online Banking
d. All of the above t
52. Being a good digital citizens , we should _________.
a. Respect privacy of others
b. Avoid cyber bullying
c. Avoid copyright materials
d. All of the above t
53. Online spreading of rumor’s, making threats online, disclosing personal information about the victim, and making comments intended to publicly mock a victim are all considered to be ______.
a. Cyber crime
b. Cyber bullying t
c. Both a) and b)
d. None of the above
54. Which of the following e-waste management strategies you will consider?
a. Reduce
b. Reuse
c. Recycle
d. All of the above t
Societal Impact Class 11 MCQ
55. ______ are websites or applications that let users take part in the community by publishing and sharing content with others.
a. Banking website
b. Social media website t
c. Financial website
d. None of the above
56. ________ software package come under FOSS.
a. Open Office
b. Libre Office
c. Both a) and b) t
d. None of the above
57. Which of the following belong to cyber crime law?
a. Hacking
b. Spamming
c. Phishing
d. All of the above t
58. The law in India gives the user instructions on how to process, store, and transmit sensitive information.
a. Information Technology Act, 2000 t
b. Information Technology Act, 2001
c. Information Technology Act, 2002
d. Information Technology Act, 2003
59. Reselling used electronic products referred to as _________.
a. Reduce
b. Reuse
c. Recycle
d. Refurbishing t
60. A scientific field known as _______ deals with building or setting up work environments, including the furniture, technology, and systems, to ensure user safety and comfort.
a. Arranger
b. Ergonomics t
c. Agronomics
d. None of the above
Computer Science Class 11 Notes
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples in Python
- Unit 2 : Dictionary in Python
- Unit 3 : Society, Law and Ethics
Computer Science Class 11 MCQ
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples in Python
- Unit 2 : Dictionary in Python
- Unit 3 : Society, Law and Ethics
Computer Science Class 11 NCERT Solutions
- Unit 1 : Basic Computer Organisation
- Unit 1 : Encoding Schemes and Number System
- Unit 2 : Introduction to problem solving
- Unit 2 : Getting Started with Python
- Unit 2 : Conditional statement and Iterative statements in Python
- Unit 2 : Function in Python
- Unit 2 : String in Python
- Unit 2 : Lists in Python
- Unit 2 : Tuples and Dictionary in Python
- Unit 3 : Society, Law and Ethics