CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01

Practice CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 provided below. The MCQ Questions for Class 12 Societal Impacts Informatics Practices with answers and follow the latest CBSE/ NCERT and KVS patterns. Refer to more Chapter-wise MCQs for CBSE Class 12 Informatics Practices and also download more latest study material for all subjects

MCQ for Class 12 Informatics Practices Societal Impacts

Class 12 Informatics Practices students should review the 50 questions and answers to strengthen understanding of core concepts in Societal Impacts

Societal Impacts MCQ Questions Class 12 Informatics Practices with Answers

Question. The generally recognised term for the government protection afforded to intellectual property (written and electronic) is called ………………..
(a) Computer security law
(b) aggregate information
(c) copyright law
(d) data security standards

Answer : C

Question. The real-time chat, audio calls, videos call happening on the internet is
(a) Synchronous Communication
(b) Asynchronous Communication
(c) Realtime Communications
(d) Live Communication

Answer : A

Question. Which of the following is not ‘proprietary’ software ?
(a) Windows 10
(b) MAC OSX
(c) Linux
(d) McAffee

Answer : C

Question. A ____________ is a type of contract between the creator of an original work permitting someone to use their work, generally for some price.
(a) Agreement
(b) License
(c) Patent
(d) Copyright

Answer : B

Question. Select the incorrect statement-
(a) IPR gives owner right to decide how much information he/she can share with user.
(b) IPR encourages creators to invent new ideas, designs, and softwares.
(c) IPR ensures that some of the properties cannot be disclosed publically.
(d) IPR gives owner right to get financial benefits against their creation/inventions.

Answer : C

Question. Cyber troll or trolling is a cybercrime which is closely related to __________.
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of the options

Answer : A

Question. To prevent unauthorized access to and or from the network, a system known as
(a) Gateway
(b) Antivirus
(c) Firewall
(d) Net Protector

Answer : C

Question. Which of the following not a part of digital technologies?
(a) Smartphones
(b) Computers
(c) Internet
(d) FM Radio

Answer : D

Question. Which of the following would be a creative work protected by copyright?
(a) A list of all Indian President names
(b) A portrait of your family
(c) A song you wrote
(d) The name of your pet dog

Answer : C

Question. Which of the following is/are ethical issues associated with Information Technology?
i) Personal Privacy
ii) Access Rights
iii) Harmful actions
(a) Only i
(b) Only i and ii
(c) All of them i, ii and iii
(d) None of them

Answer : C

Question. How does excessive use of technology can affect physical health?
(a) Internet Addiction
(b) Social Isolation
(c) Anxiety & Depression
(d) a and c

Answer : D

Question. Receiving irrelevant and unwanted emails repeatedly is an example of _____
(a) Junking
(b) Spamming
(c) Stacking
(d) DoS attack

Answer : B

Question. A kind of online harassment wherein the victim is subjected to a barrage of online messages and emails is called ______
(a) Cyber bullying
(b) Cyber phishing
(c) Cyber stalking
(d) None of the options

Answer : C

Question. Code of the software will be protected by _____________
(a) copyright
(b) patent
(c) registered trademark
(d) None of the options

Answer : A

Question. What is meant by the term ‘cyber-crime’ ?
(a) Any crime that uses computers to jeopardise or attempt to jeopardise national security
(b) The use of computer networks to commit financial or identity fraud
(c) The theft of digital information
(d) Any crime that involves computers and networks

Answer : D

Question. Any information created by us that exists in digital form is called
(a) Digital footprint
(b) Cyber print
(c) Internet print
(d) Web finger print

Answer : A

Question. Which of the following are health disorders caused by overuse of technology?
(a) DNA damage
(b) Lung cancer
(c) Damage to heart liver and spleen
(d) All of the options

Answer : D

Question. Which of the following are not ways of data protection?
(a) Using password
(b) Using User IDs
(c) Using encryption techniques.
(d) None of the options

Answer : D

Question. Anil never writes a subject line in his mails . This is an instance of :
(a) Spamming
(b) Phishing
(c) Non obeying of E-mail etiquettes
(d) Trolling

Answer : C

Question. Sneha found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do?
(a) Ignore the instance
(b) Report it to the cyber crime cell
(c) Try to delete the posts
(d) Enjoy the instance.

Answer : B

Question. Which among the following are good preventive measures against health hazards of technology use?
(a) Periodic walks between long usage of devices
(b) Using screen guards
(c) No overuse of technology
(d) All of the options

Answer : D

Question. A fraudulent process that extracts money from an ignorant person is called
(a) Spamming
(b) Phishing
(c) Bullying
(d) None of the options

Answer : B

Question. The term Intellectual property rights cover
(a) Trademark
(b) Copyright
(c) Patents
(d) All of the options

Answer : D

Question. Using someone’s Twitter handle to post something will be termed as
(a) Fraud
(b) Identity theft
(c) Online stealing
(d) Phishing

Answer : B

Question. In FOSS, source code is hidden from
(a) All users
(b) Purchaser
(c) Only the vendor
(d) In FOSS source code is not hidden.

Answer : D

Question. Which of the following are medium of cyber trolling?
(a) Facebook
(b) Twitter
(c) You tube video comments
(d) All of the options

Answer : D

Question. Mr. Raghavendra found that after posting some images in social media , some people were writing negative messages. This is an instance of
(a) Phishing
(b) Trolling
(c) Hacking
(d) Spamming

Answer : B

Question. Jack is a good programmer and wants to contribute to the features of one of the softwares , that he uses. What kind of software he can contribute to?
(a) Proprietary software
(b) Free software
(c) Open source software
(d) Shareware

Answer : C

Question. Which among the following is not a possible activity of a virus?
(a) Deleting data files
(b) Sending bulk mails
(c) Deleting system files
(d) None of the options

Answer : B

Question. Read the statements given below and identify the right option about cyber crime.
Statement A Cyber crime involves the use of computer and network in attacking computers and networks as well.
Statement B Cyber bullying is an act of cyber law.
(a) Statement A is correct.
(b) Statement B is correct.
(c) Statement A is correct but Statement B is incorrect.
(d) Statement B is correct but Statement A is incorrect.

Answer : C

Question. What kind of illegal activity may happen if given link is clicked?
(a) Illegal download
(b) Bullying
(c) Identity theft
(d) Hacking

Answer : C

MCQs for Societal Impacts Informatics Practices Class 12

Students can use these MCQs for Societal Impacts to quickly test their knowledge of the chapter. These multiple-choice questions have been designed as per the latest syllabus for Class 12 Informatics Practices released by CBSE. Our expert teachers suggest that you should practice daily and solving these objective questions of Societal Impacts to understand the important concepts and better marks in your school tests.

Societal Impacts NCERT Based Objective Questions

Our expert teachers have designed these Informatics Practices MCQs based on the official NCERT book for Class 12. We have identified all questions from the most important topics that are always asked in exams. After solving these, please compare your choices with our provided answers. For better understanding of Societal Impacts, you should also refer to our NCERT solutions for Class 12 Informatics Practices created by our team.

Online Practice and Revision for Societal Impacts Informatics Practices

To prepare for your exams you should also take the Class 12 Informatics Practices MCQ Test for this chapter on our website. This will help you improve your speed and accuracy and its also free for you. Regular revision of these Informatics Practices topics will make you an expert in all important chapters of your course.

Where can I access latest CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01?

You can get most exhaustive CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 for free on StudiesToday.com. These MCQs for Class 12 Informatics Practices are updated for the 2025-26 academic session as per CBSE examination standards.

Are Assertion-Reasoning and Case-Study MCQs included in the Informatics Practices Class 12 material?

Yes, our CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 include the latest type of questions, such as Assertion-Reasoning and Case-based MCQs. 50% of the CBSE paper is now competency-based.

How do practicing Informatics Practices MCQs help in scoring full marks in Class 12 exams?

By solving our CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01, Class 12 students can improve their accuracy and speed which is important as objective questions provide a chance to secure 100% marks in the Informatics Practices.

Do you provide answers and explanations for CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01?

Yes, Informatics Practices MCQs for Class 12 have answer key and brief explanations to help students understand logic behind the correct option as its important for 2026 competency-focused CBSE exams.

Can I practice these Informatics Practices Class 12 MCQs online?

Yes, you can also access online interactive tests for CBSE Class 12 Informatics Practices Societal Impacts MCQs Set 01 on StudiesToday.com as they provide instant answers and score to help you track your progress in Informatics Practices.