Practice CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 provided below. The MCQ Questions for Class 12 Societal Impacts Informatics Practices with answers and follow the latest CBSE/ NCERT and KVS patterns. Refer to more Chapter-wise MCQs for CBSE Class 12 Informatics Practices and also download more latest study material for all subjects
MCQ for Class 12 Informatics Practices Societal Impacts
Class 12 Informatics Practices students should review the 50 questions and answers to strengthen understanding of core concepts in Societal Impacts
Societal Impacts MCQ Questions Class 12 Informatics Practices with Answers
Question. The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called ………………..
(a) Computer security law
(b) aggregate information
(c) copyright law
(d) data security standards
Answer : C
Question. The real-time chat, audio calls, videos call happening on the internet is
(a) Synchronous Communication
(b) Asynchronous Communication
(c) Realtime Communications
(d) Live Communication
Answer : A
Question. Which of the following is not ‘proprietary’ software ?
(a) Windows 10
(b) MAC OSX
(c) Linux
(d) McAffee
Answer : C
Question. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
(a) Agreement
(b) License
(c) Patent
(d) Copyright
Answer : B
Question. Select the incorrect statement-
(a) IPR gives owner right to decide how much information he/she can share with user.
(b) IPR encourages creators to invent new ideas, designs, and softwares.
(c) IPR ensures that some of the properties cannot be disclosed publically.
(d) IPR gives owner right to get financial benefits against their creation/inventions.
Answer : C
Question. Cyber troll or trolling is a cybercrime which is closely related to __________.
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of the options
Answer : A
Question. To prevent unauthorized access to and or from the network, a system known as
(a) Gateway
(b) Antivirus
(c) Firewall
(d) Net Protector
Answer : C
Question. Which of the following not a part of digital technologies?
(a) Smartphones
(b) Computers
(c) Internet
(d) FM Radio
Answer : D
Question. Which of the following would be a creative work protected by copyright?
(a) A list of all Indian President names
(b) A portrait of your family
(c) A song you wrote
(d) The name of your pet dog
Answer : C
Question. Which of the following is/are ethical issues associated with Information Technology?
i) Personal Privacy
ii) Access Rights
iii) Harmful actions
(a) Only i
(b) Only i and ii
(c) All of them i, ii and iii
(d) None of them
Answer : C
Question. How does excessive use of technology can affect physical health?
(a) Internet Addiction
(b) Social Isolation
(c) Anxiety & Depression
(d) a and c
Answer : D
Question. Receiving irrelevant and unwanted emails repeatedly is an example of _____
(a) Junking
(b) Spamming
(c) Stacking
(d) DoS attack
Answer : B
Question. A kind of online harassment wherein the victim is subjected to a barrage of online messages and emails is called ______
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of the options
Answer : C
Question. Code of the software will be protected by _____________
(a) copyright
(b) patent
(c) registered trademark
(d) None of the options
Answer : A
Question. What is meant by the term ‘cyber-crime’ ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks
Answer : D
Question. Any information created by us that exists in digital form is called
(a) Digital footprint
(b) Cyber print
(c) Internet print
(d) Web finger print
Answer : A
Question. Which of the following are health disorders caused by overuse of technology?
(a) DNA damage
(b) Lung cancer
(c) Damage to heart liver and spleen
(d) All of the options
Answer : D
Question. Which of the following are not ways of data protection?
(a) Using password
(b) Using User IDs
(c) Using encryption techniques.
(d) None of the options
Answer : D
Question. Anil never writes a subject line in his mails . This is an instance of :
(a) Spamming
(b) Phishing
(c) Non obeying of E-mail etiquettes
(d) Trolling
Answer : C
Question. Sneha found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do?
(a) Ignore the instance
(b) Report it to the cyber crime cell
(c) Try to delete the posts
(d) Enjoy the instance.
Answer : B
Question. Which among the following are good preventive measures against health hazards of technology use?
(a) Periodic walks between long usage of devices
(b) Using screen guards
(c) No overuse of technology
(d) All of the options
Answer : D
Question. A fraudulent process that extracts money from an ignorant person is called
(a) Spamming
(b) Phishing
(c) Bullying
(d) None of the options
Answer : B
Question. The term Intellectual property rights cover
(a) Trademark
(b) Copyright
(c) Patents
(d) All of the options
Answer : D
Question. Using someone’s Twitter handle to post something will be termed as
(a) Fraud
(b) Identity theft
(c) Online stealing
(d) Phishing
Answer : B
Question. In FOSS, source code is hidden from
(a) All users
(b) Purchaser
(c) Only the vendor
(d) In FOSS source code is not hidden.
Answer : D
Question. Which of the following are medium of cyber trolling?
(a) Facebook
(b) Twitter
(c) You tube video comments
(d) All of the options
Answer : D
Question. Mr. Raghavendra found that after posting some images in social media , some people were writing negative messages. This is an instance of
(a) Phishing
(b) Trolling
(c) Hacking
(d) Spamming
Answer : B
Question. Jack is a good programmer and wants to contribute to the features of one of the softwares , that he uses. What kind of software he can contribute to?
(a) Proprietary software
(b) Free software
(c) Open source software
(d) Shareware
Answer : C
Question. Which among the following is not a possible activity of a virus?
(a) Deleting data files
(b) Sending bulk mails
(c) Deleting system files
(d) None of the options
Answer : B
Question. Read the statements given below and identify the right option about cyber crime.
Statement A Cyber crime involves the use of computer and network in attacking computers and networks as well.
Statement B Cyber bullying is an act of cyber law.
(a) Statement A is correct.
(b) Statement B is correct.
(c) Statement A is correct but Statement B is incorrect.
(d) Statement B is correct but Statement A is incorrect.
Answer : C
Question. What kind of illegal activity may happen if given link is clicked?
(a) Illegal download
(b) Bullying
(c) Identity theft
(d) Hacking
Answer : C
| CBSE Class 12 Informatics Practices Querying and SQL Functions MCQs Set 02 |
| CBSE Class 12 Informatics Practices Querying and SQL Functions MCQs Set 01 |
| CBSE Class 12 Informatics Practices Data Handling using Pandas I MCQs Set 02 |
| CBSE Class 12 Informatics Practices Data Handling using Pandas I MCQs Set 01 |
| CBSE Class 12 Informatics Practices Data Handling Using Pandas II MCQs Set 01 |
| CBSE Class 12 Informatics Practices Plotting Data using Matplotlib MCQs Set 01 |
| CBSE Class 12 Informatics Practices Internet and Web MCQs Set 02 |
| CBSE Class 12 Informatics Practices Internet and Web MCQs Set 01 |
| CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 02 |
| CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 |
Free study material for Informatics Practices
MCQs for Societal Impacts Informatics Practices Class 12
Students can use these MCQs for Societal Impacts to quickly test their knowledge of the chapter. These multiple-choice questions have been designed as per the latest syllabus for Class 12 Informatics Practices released by CBSE. Our expert teachers suggest that you should practice daily and solving these objective questions of Societal Impacts to understand the important concepts and better marks in your school tests.
Societal Impacts NCERT Based Objective Questions
Our expert teachers have designed these Informatics Practices MCQs based on the official NCERT book for Class 12. We have identified all questions from the most important topics that are always asked in exams. After solving these, please compare your choices with our provided answers. For better understanding of Societal Impacts, you should also refer to our NCERT solutions for Class 12 Informatics Practices created by our team.
Online Practice and Revision for Societal Impacts Informatics Practices
To prepare for your exams you should also take the Class 12 Informatics Practices MCQ Test for this chapter on our website. This will help you improve your speed and accuracy and its also free for you. Regular revision of these Informatics Practices topics will make you an expert in all important chapters of your course.
You can get most exhaustive CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 for free on StudiesToday.com. These MCQs for Class 12 Informatics Practices are updated for the 2025-26 academic session as per CBSE examination standards.
Yes, our CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 include the latest type of questions, such as Assertion-Reasoning and Case-based MCQs. 50% of the CBSE paper is now competency-based.
By solving our CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01, Class 12 students can improve their accuracy and speed which is important as objective questions provide a chance to secure 100% marks in the Informatics Practices.
Yes, Informatics Practices MCQs for Class 12 have answer key and brief explanations to help students understand logic behind the correct option as its important for 2026 competency-focused CBSE exams.
Yes, you can also access online interactive tests for CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 on StudiesToday.com as they provide instant answers and score to help you track your progress in Informatics Practices.