Societal Impact Class 11 MCQ

Teachers and Examiners (CBSESkillEduction) collaborated to create the Societal Impact Class 11 MCQ. All the important Information are taken from the NCERT Textbook Computer Science (083) class 11.

Societal Impact Class 11 MCQ

1. Whenever we surf the Internet using smartphones, tablets, computers, etc., we leave a trail of data reflecting the activities performed by us online, which is our ________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above

Show Answer ⟶
a. Digital footprint

2. Digital footprints are also known as _________.
a. Digital print
b. Digital tattoos t
c. Digital Data
d. None of the above

Show Answer ⟶
b. Digital tattoos

3. Our digital footprint can be created and used with or without our knowledge. It includes _________.
a. Websites we visit
b. Emails we send
c. Any information we submit online
d. All of the above t

Show Answer ⟶
d. All of the above

4. Which of the following belongs to digital footprint _________.
a. Active digital footprints
b. Passive digital footprints
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

Societal Impact Class 11 MCQ

5. Active digital footprints which includes data that we _______.
a. Email we write
b. Responses or posts we make
c. Different websites or mobile apps
d. All of the above t

Show Answer ⟶
d. All of the above

6. Every time we use a smartphone to browse the web, we leave a data trail that reflects the online activities we engaged in. This data trail is known as our ________.
a. Digital footprint t
b. Smart footprint
c. Social footprint
d. None of the above

Show Answer ⟶
a. Digital footprint

7. The rights to copy, distribute, and perform publicly are some examples of the _______.
a. Copyright t
b. Trademark
c. Patent
d. All of the above

Show Answer ⟶
a. Copyright

8. EULA stands for __________.
a. End user license agreement t
b. End user license adorns
c. End user level agreement
d. None of the above

Show Answer ⟶
a. End user license agreement

9. The digital data trail we leave online unintentionally is called _________.
a. Passive digital footprints t
b. Active digital footprints
c. Both a) and b)
d. None of the above

Show Answer ⟶
a. Passive digital footprints

Societal Impact Class 11 MCQ

10. Everyone who is connected to the Internet may have a ________.
a. Digital footprint t
b. Social footprint
c. Smart footprint
d. None of the above

Show Answer ⟶
a. Digital footprint

11. We follow _________ etiquettes during our social interactions or while surfing the Internet.
a. Be Ethical
b. Be Respectful
c. Be Responsible
d. All of the above t

Show Answer ⟶
d. All of the above

12. We should not use _______ materials without the permission of the creator or owner.
a. Copyrighted t
b. Patent
c. Trademark
d. None of the above

Show Answer ⟶
a. Copyrighted

13. As an ethical digital citizen, we need to be careful while _________.
a. Streaming audio
b. Streaming Video
c. Downloading images and file
d. All of the above t

Show Answer ⟶
d. All of the above

14. Amit copies some internet articles without crediting the original author or source. This is known as _______.
a. Copyright
b. Trade mark
c. Plagiarism t
d. None of the above

Show Answer ⟶
c. Plagiarism

Societal Impact Class 11 MCQ

15. Unauthorized use of another’s trademark on goods and services is referred to as __________.
a. Trademark Infringement t
b. Plagiarism Infringement
c. Copyright Infringement
d. None of the above

Show Answer ⟶
a. Trademark Infringement

16. GPL stands for _______.
a. General Public License t
b. General Product License
c. General Purchase License
d. None of the above

Show Answer ⟶
a. General Public License

17. What do you mean by cyber bullying _________.
a. Insulting to others
b. Giving threats online
c. Sharing others personal information
d. All of the above t

Show Answer ⟶
d. All of the above

18. Accidentally leaving a digital data trail online is referred to as _________.
a. Active digital footprints
b. Passive digital footprints t
c. Both a) and b)
d. None of the above

Show Answer ⟶
b. Passive digital footprints

19. Which of the following public licence categories is most popular?
a. GPL t
b. CC
c. Both a) and b)
d. None of the above

Show Answer ⟶
a. GPL

Societal Impact Class 11 MCQ

20. Which of the following belong to sensiteve data __________.
a. Bank details
b. Personal Information
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

21. The digital footprint we knowingly leave online is referred to as _______.
a. Active digital footprints t
b. Passive digital footprints
c. Both a) and b)
d. None of the above

Show Answer ⟶
a. Active digital footprints

22. CC stands for ____________.
a. Creative commons license t
b. Create common license
c. Create communicatee license
d. None of the above

Show Answer ⟶
a. Creative commons license

23. The actual implementation of the concept or invention will be protected by _______.
a. Trademark
b. Copyright
c. Patent t
d. None of the above

Show Answer ⟶
c. Patent

24. Good communication over email, chat room and other such forums require a digital citizen to abide by the communication etiquettes as _________.
a. Be polite
b. Be credible
c. Be Precise
d. All of the above t

Show Answer ⟶
d. All of the above

Societal Impact Class 11 MCQ

25. Hacking is referred to as ________ when it is done with good intentions.
a. Cyber hacking
b. Ethical hacking t
c. Unknown hacking
d. None of the above

Show Answer ⟶
b. Ethical hacking

26. Elements of data that can cause substantial harm, embarrassment, inconvenience and unfairness to an individual, if breached or compromised, is called ________.
a. Sensitive data t
b. Original data
c. Fake data
d. None of the above

Show Answer ⟶
a. Sensitive data

27. GPL is basically made to grant a ______ a public license.
a. Software
b. Application
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

28. Who among the following known as a “black hat hacker”?
a. Crackers
b. Malicious hackers
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

29. What does a black hacker do?
a. Break into computer systems with malicious intent
b. Violate the confidentiality
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

Societal Impact Class 11 MCQ

30. What does a white hacker do?
a. Respect the rule of law
b. Identify company security flaws so they can make recommendations for improvement.
c. Also known as Ethical hacker
d. All of the above t

Show Answer ⟶
d. All of the above

31. IPR stands for _________.
a. Intellectual Property Right t
b. Internal Property Right
c. Indian Property Right
d. None of the above

Show Answer ⟶
a. Intellectual Property Right

32. A responsible internet user should follow ________.
a. Choose password wisely
b. Know who you befriend
c. Think before uploading
d. All of the above t

Show Answer ⟶
d. All of the above

33. We can share _______ on social media platforms.
a. Text message
b. Videos and Images
c. Personal or Bank related information
d. Both a) and b) t

Show Answer ⟶
d. Both a) and b)

34. FOSS stands for _______.
a. Free and Open source software t
b. First and Open source software
c. Flat and Open source software
d. None of the above

Show Answer ⟶
a. Free and Open source software

Societal Impact Class 11 MCQ

35. To be a responsible netizen (internet user), we should _______.
a. Frequently change the password
b. Choose secure password
c. Think before upload anything on the internet
d. All of the above t

Show Answer ⟶
d. All of the above

36. The act of presenting a person with a false website or email that appears original or authentic is known as _________.
a. Hacking
b. Phishing t
c. Identity theft
d. None of the above

Show Answer ⟶
b. Phishing

37. The name and logo of the company will be protected by ________.
a. Trademark t
b. Copyright
c. Patent
d. None of the above

Show Answer ⟶
a. Trademark

38. Which _________ operating system came under FOSS.
a. Unix
b. Microsoft
c. Ubuntu t
d. None of the above

Show Answer ⟶
c. Ubuntu

39. Ajit has developed a new computer science theory. He wants to legally guard it from unlawful use. He should take its ________.
a. Copyright t
b. Patent
c. Trademark
d. None of the above

Show Answer ⟶
a. Copyright

Societal Impact Class 11 MCQ

40. An example of a cybercrime where the victim is blackmailed into paying for access to the data is __________.
a. Identity theft
b. Ransomware t
c. Spamming
d. None of the above

Show Answer ⟶
b. Ransomware

41. Our digital footprints are saved in the form of ________ on local web browsers.
a. Cookies
b. Browser History
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

42. The traces and records we leave behind when using the internet are called _______.
a. Data protection
b. Digital Data
c. Digital Footprint t
d. None of the above

Show Answer ⟶
c. Digital Footprint

43. A ______ is someone who intentionally sows discord online by starting arguments, upsetting people, or posting irrelevant or offensive messages in online communities.
a. Copyright
b. Internet Bullying t
c. Cyber security
d. None of the above

Show Answer ⟶
b. Internet Bullying

44. _______ browser come under FOSS.
a. Google chrome
b. Firefox t
c. Microsoft edge
d. None of the above

Show Answer ⟶
b. Firefox

Societal Impact Class 11 MCQ

45. Digital communication includes _________.
a. Texting
b. Instant messaging
c. Email
d. All of the above t

Show Answer ⟶
d. All of the above

46. E-waste stands for ________.
a. Electronic waste t
b. Electrical waste
c. Ethical waste
d. None of the above

Show Answer ⟶
a. Electronic waste

47. Legal protection for intellectual property is provided by _______.
a. Patent
b. Copyright
c. Trademark
d. All of the above t

Show Answer ⟶
d. All of the above

48. Anyone who uses both digital and internet technology is a ________.
a. Digital citizen
b. Netizen
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

49. Which of the subsequent actions highlights leaving live digital traces?
a. Visiting a Website
b. Sending email t
c. Both a) and b)
d. None of the above

Show Answer ⟶
b. Sending email

Societal Impact Class 11 MCQ

50. The use of digital footprints is _______.
a. Trace user’s location
b. Know digital activity
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

51. In today’s technologically advanced society, can do ________ .
a. Online Education
b. Online Shopping
c. Online Banking
d. All of the above t

Show Answer ⟶
d. All of the above

52. Being a good digital citizens , we should _________.
a. Respect privacy of others
b. Avoid cyber bullying
c. Avoid copyright materials
d. All of the above t

Show Answer ⟶
d. All of the above

53. Online spreading of rumor’s, making threats online, disclosing personal information about the victim, and making comments intended to publicly mock a victim are all considered to be ______.
a. Cyber crime
b. Cyber bullying t
c. Both a) and b)
d. None of the above

Show Answer ⟶
b. Cyber bullying

54. Which of the following e-waste management strategies you will consider?
a. Reduce
b. Reuse
c. Recycle
d. All of the above t

Show Answer ⟶
d. All of the above

Societal Impact Class 11 MCQ

55. ______ are websites or applications that let users take part in the community by publishing and sharing content with others.
a. Banking website
b. Social media website t
c. Financial website
d. None of the above

Show Answer ⟶
b. Social media website

56. ________ software package come under FOSS.
a. Open Office
b. Libre Office
c. Both a) and b) t
d. None of the above

Show Answer ⟶
c. Both a) and b)

57. Which of the following belong to cyber crime law?
a. Hacking
b. Spamming
c. Phishing
d. All of the above t

Show Answer ⟶
d. All of the above

58. The law in India gives the user instructions on how to process, store, and transmit sensitive information.
a. Information Technology Act, 2000 t
b. Information Technology Act, 2001
c. Information Technology Act, 2002
d. Information Technology Act, 2003

Show Answer ⟶
a. Information Technology Act, 2000

59. Reselling used electronic products referred to as _________.
a. Reduce
b. Reuse
c. Recycle
d. Refurbishing t

Show Answer ⟶
d. Refurbishing

60. A scientific field known as _______ deals with building or setting up work environments, including the furniture, technology, and systems, to ensure user safety and comfort.
a. Arranger
b. Ergonomics t
c. Agronomics
d. None of the above

Show Answer ⟶
b. Ergonomics
Computer Science Class 11 Notes
Computer Science Class 11 MCQ
Computer Science Class 11 NCERT Solutions

Computer Science Class 11 Practical Questions and Answers

error: Content is protected !!