CBSE Class 12
Informatics Practices
06 Societal Impacts
40
Total
0
Attempted
0
Correct
0
Wrong
00:00:00
Q-1
What is meant by digital footprint?
Easy
Digital Footprints
A
Physical marks left by computers
B
Data created when a person uses digital services
C
Software installed on a device
D
Password stored in a browser
Answer: Data created when a person uses digital services
Explanation: A digital footprint refers to the data left behind when users interact with digital platforms.
Q-2
Which of the following is an example of an active digital footprint?
Easy
Digital Footprints
A
Cookies stored by a website
B
Browsing history saved automatically
C
Posting a comment on social media
D
IP address logged by a server
Answer: Posting a comment on social media
Explanation: Active digital footprints are created intentionally, such as posting comments or content online.
Q-3
Who is a netizen?
Easy
Digital Society and Netizen
A
A computer programmer
B
A citizen who uses the Internet responsibly
C
A network administrator
D
A website developer
Answer: A citizen who uses the Internet responsibly
Explanation: A netizen is an active and responsible user of the Internet.
Q-4
Which practice helps protect personal data online?
Easy
Data Protection
A
Sharing passwords with friends
B
Using strong and unique passwords
C
Posting personal details publicly
D
Ignoring privacy settings
Answer: Using strong and unique passwords
Explanation: Strong and unique passwords help protect personal data from unauthorized access.
Q-5
What does Creative Commons primarily help with?
Easy
Creative Commons
A
Creating computer viruses
B
Sharing creative work legally
C
Blocking access to content
D
Encrypting digital data
Answer: Sharing creative work legally
Explanation: Creative Commons licenses allow creators to share their work legally with defined permissions.
Q-6
Which of the following is considered a cyber crime?
Easy
Cyber Crime
A
Sending an email
B
Online shopping
C
Identity theft
D
Video conferencing
Answer: Identity theft
Explanation: Identity theft involves illegal use of someone’s personal information and is a cyber crime.
Q-7
What is the primary purpose of the Information Technology (IT) Act?
Easy
IT Act
A
To regulate computer manufacturing
B
To provide legal recognition to electronic transactions
C
To control Internet speed
D
To develop software applications
Answer: To provide legal recognition to electronic transactions
Explanation: The IT Act provides legal recognition to electronic records and digital transactions.
Q-8
Why is e-waste considered hazardous?
Easy
E-waste
A
It occupies too much space
B
It contains toxic substances harmful to health and environment
C
It slows down computers
D
It increases Internet usage
Answer: It contains toxic substances harmful to health and environment
Explanation: E-waste contains harmful chemicals that can damage human health and the environment.
Q-9
Which practice helps in proper management of e-waste?
Easy
E-waste
A
Throwing electronics in regular trash
B
Burning electronic devices
C
Recycling electronic waste
D
Storing e-waste at home indefinitely
Answer: Recycling electronic waste
Explanation: Recycling e-waste ensures safe disposal and recovery of useful materials.
Q-10
Which health issue can result from excessive screen time?
Easy
Impact on Health
A
Improved eyesight
B
Better posture
C
Eye strain and fatigue
D
Increased immunity
Answer: Eye strain and fatigue
Explanation: Excessive screen time can cause eye strain, headaches, and fatigue.
Q-11
Which action contributes to a passive digital footprint?
Medium
Digital Footprints
A
Posting a photo on social media
B
Writing a blog post
C
A website tracking user activity
D
Sending an email intentionally
Answer: A website tracking user activity
Explanation: Passive digital footprints are created without direct user action, such as website tracking.
Q-12
Why should users regularly review privacy settings on digital platforms?
Medium
Digital Footprints
A
To increase Internet speed
B
To control who can access personal information
C
To download content faster
D
To avoid software updates
Answer: To control who can access personal information
Explanation: Privacy settings help users manage how their personal data is shared and viewed.
Q-13
Which behavior best reflects responsible digital citizenship?
Medium
Digital Society and Netizen
A
Forwarding unverified information
B
Respecting others’ privacy online
C
Using pirated software
D
Sharing passwords with friends
Answer: Respecting others’ privacy online
Explanation: Responsible netizens respect privacy, ethics, and online safety.
Q-14
Why is data encryption important for data protection?
Medium
Data Protection
A
It deletes data automatically
B
It converts data into unreadable form for unauthorized users
C
It increases file size
D
It improves Internet speed
Answer: It converts data into unreadable form for unauthorized users
Explanation: Encryption ensures that sensitive data cannot be understood by unauthorized parties.
Q-15
Which Creative Commons license condition allows others to use a work but not modify it?
Medium
Creative Commons
A
Attribution
B
NonCommercial
C
NoDerivatives
D
ShareAlike
Answer: NoDerivatives
Explanation: The NoDerivatives condition allows sharing but prohibits modification of the work.
Q-16
Which cyber crime involves tricking users into revealing sensitive information?
Medium
Cyber Crime
A
Hacking
B
Phishing
C
Spamming
D
Piracy
Answer: Phishing
Explanation: Phishing deceives users into sharing personal or financial details.
Q-17
Why is reporting cyber crime important?
Medium
Cyber Crime
A
To increase Internet usage
B
To help authorities prevent further misuse
C
To block websites permanently
D
To delete user accounts
Answer: To help authorities prevent further misuse
Explanation: Reporting helps authorities investigate and prevent future cyber crimes.
Q-18
Which provision of the IT Act helps ensure authenticity of electronic records?
Medium
IT Act
A
Digital signatures
B
IP addresses
C
Firewalls
D
Antivirus software
Answer: Digital signatures
Explanation: Digital signatures provide authenticity and integrity to electronic records.
Q-19
Which practice reduces health risks associated with prolonged computer use?
Medium
Impact on Health
A
Using brighter screens
B
Taking regular breaks
C
Increasing screen time
D
Avoiding posture changes
Answer: Taking regular breaks
Explanation: Regular breaks reduce eye strain and physical fatigue.
Q-20
Why should electronic devices not be disposed of with household waste?
Medium
E-waste
A
They occupy more space
B
They contain reusable materials only
C
They may release harmful substances
D
They increase recycling cost
Answer: They may release harmful substances
Explanation: E-waste contains toxic substances that can harm health and the environment.
Q-21
Which example best illustrates misuse of digital information?
Medium
Cyber Crime
A
Online banking
B
Identity theft
C
Video streaming
D
Email communication
Answer: Identity theft
Explanation: Identity theft involves illegal use of personal data.
Q-22
Why is Creative Commons licensing important in the digital age?
Medium
Creative Commons
A
It blocks content sharing
B
It clarifies how content can be used legally
C
It encrypts creative works
D
It prevents plagiarism automatically
Answer: It clarifies how content can be used legally
Explanation: Creative Commons licenses define legal permissions for using creative content.
Q-23
Which digital behavior can negatively impact a person’s online reputation?
Medium
Digital Footprints
A
Posting respectful comments
B
Sharing offensive content
C
Using privacy settings
D
Reporting cyber abuse
Answer: Sharing offensive content
Explanation: Offensive or inappropriate posts can harm one’s digital reputation.
Q-24
Which responsibility does the IT Act place on users?
Medium
IT Act
A
Creating software
B
Using the Internet ethically and legally
C
Increasing Internet access
D
Managing network hardware
Answer: Using the Internet ethically and legally
Explanation: The IT Act promotes lawful and ethical use of digital technologies.
Q-25
Which factor contributes most to digital addiction?
Medium
Impact on Health
A
Limited Internet access
B
Excessive and uncontrolled screen time
C
Using educational apps
D
Scheduled online activities
Answer: Excessive and uncontrolled screen time
Explanation: Uncontrolled and excessive screen usage can lead to digital addiction.
Q-26
Why is two-factor authentication more secure than passwords alone?
Medium
Data Protection
A
It reduces login time
B
It uses two different verification methods
C
It stores passwords safely
D
It removes need for encryption
Answer: It uses two different verification methods
Explanation: Two-factor authentication adds an extra layer of security beyond passwords.
Q-27
Which activity best represents ethical use of digital content?
Medium
Creative Commons
A
Downloading pirated movies
B
Using content without attribution
C
Using licensed content with proper credit
D
Sharing copyrighted material freely
Answer: Using licensed content with proper credit
Explanation: Ethical use involves respecting licenses and giving proper credit.
Q-28
How does e-waste recycling benefit society?
Medium
E-waste
A
Increases electronic consumption
B
Reduces environmental pollution
C
Eliminates need for new devices
D
Slows technological growth
Answer: Reduces environmental pollution
Explanation: Recycling e-waste reduces pollution and conserves resources.
Q-29
Which online activity is most likely to create a permanent digital footprint?
Medium
Digital Footprints
A
Clearing browser cache
B
Posting publicly on social media
C
Using private browsing
D
Logging out of accounts
Answer: Posting publicly on social media
Explanation: Public posts can remain accessible and form lasting digital footprints.
Q-30
Which practice supports mental well-being in a digital society?
Medium
Impact on Health
A
Continuous multitasking
B
Regular digital detox
C
Ignoring physical activity
D
Late-night screen usage
Answer: Regular digital detox
Explanation: Taking breaks from digital devices helps maintain mental and physical health.
Q-31
A student shares their school ID card photo on social media. Months later, the image is misused. Which concept best explains this situation?
Hard
Digital Footprints
A
Active digital footprint
B
Passive digital footprint
C
Digital permanence
D
Cyber surveillance
Answer: Digital permanence
Explanation: Once shared online, digital content can remain accessible and be misused later, showing digital permanence.
Q-32
A user downloads images licensed under Creative Commons but modifies them without checking the license terms. What is the most appropriate concern?
Hard
Creative Commons
A
Plagiarism
B
Violation of licensing conditions
C
Cyber bullying
D
Hacking
Answer: Violation of licensing conditions
Explanation: Some Creative Commons licenses restrict modification; ignoring terms violates licensing conditions.
Q-33
An employee receives an email requesting urgent bank details, appearing to be from their manager. What is the safest immediate response?
Hard
Cyber Crime
A
Reply immediately with details
B
Click links to verify sender
C
Verify the request through another trusted channel
D
Ignore all future emails
Answer: Verify the request through another trusted channel
Explanation: Verifying through a trusted channel helps prevent phishing attacks.
Q-34
A teenager repeatedly reposts unverified news articles. Which societal impact is most directly involved?
Hard
Digital Society and Netizen
A
Digital divide
B
Spread of misinformation
C
Cyber addiction
D
Data encryption
Answer: Spread of misinformation
Explanation: Sharing unverified content contributes to the spread of misinformation.
Q-35
A company encrypts customer data before storing it online. Which risk is being minimized?
Hard
Data Protection
A
Hardware failure
B
Unauthorized data access
C
Network congestion
D
Software updates
Answer: Unauthorized data access
Explanation: Encryption protects data from being read by unauthorized users.
Q-36
Old computers from an office are dumped in an open area instead of being recycled. What is the most serious consequence?
Hard
E-waste
A
Loss of storage space
B
Release of toxic substances into the environment
C
Increase in Internet usage
D
Higher electricity consumption
Answer: Release of toxic substances into the environment
Explanation: Improper e-waste disposal releases harmful chemicals affecting health and environment.
Q-37
A user spends long hours gaming online, affecting sleep and concentration. Which impact is most relevant?
Hard
Impact on Health
A
Cyber crime
B
Digital addiction affecting health
C
Data privacy breach
D
Creative Commons misuse
Answer: Digital addiction affecting health
Explanation: Excessive screen time can lead to digital addiction and health problems.
Q-38
A website collects user data without informing users. Which principle is being violated?
Hard
Data Protection
A
Freedom of expression
B
Informed consent
C
Cyber security
D
Digital literacy
Answer: Informed consent
Explanation: Users must be informed and give consent before their data is collected.
Q-39
A person uses pirated software despite knowing it is illegal. Which law addresses this offence in India?
Hard
IT Act
A
Right to Information Act
B
Information Technology Act
C
Environmental Protection Act
D
Consumer Protection Act
Answer: Information Technology Act
Explanation: The IT Act addresses cyber offences including illegal use of digital content.
Q-40
A student limits screen time, takes breaks, and maintains posture while using devices. Which outcome is most likely?
Hard
Impact on Health
A
Increased online popularity
B
Improved digital footprint
C
Better physical and mental health
D
Faster Internet speed
Answer: Better physical and mental health
Explanation: Healthy digital habits help maintain physical comfort and mental well-being.
◀
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
▶