CHAPTER 11

SOCIETAL IMPACT
Multiple Choice Questions
1. What are the two types of digital footprints?
a) Active and Passive b) Intentional and Unintentional
c) Direct and Indirect d) Personal and Professional
2. What is a digital society?
a) A community based on physical interactions
b) A society that relies heavily on digital technologies
c) A society that avoids using the Internet
d) A community that only exists online
3. What is an example of sensitive data?
a) Social media posts b) Public email address
c) Biometric information d) Internet cookies
4. What does the Indian IT Act of 2000 address?
a) Cyber bullying b) Electronic governance
c) Physical theft d) Patent law
5. How can privacy of sensitive data be implemented?
a) By ignoring unauthorized access b) By using encryption and authentication
c) By sharing passwords d) By making data public
6. Which of the following is a health concern associated with digital device usage?
a) Improved vision b) Eye strain
c) Better posture d) Enhanced physical activity
7. What should you do to protect your digital footprints?
a) Share your passwords
b) Avoid using the Internet
c) Be cautious about what you upload or download
d) Post everything online
8. What is one of the primary focuses of ergonomics?
a) Increasing screen time b) Reducing strain on the body
c) Maximizing internet speed d) Enhancing software features
9. What is a passive digital footprint?
a) Data you intentionally leave online b) Data you unintentionally leave online
c) Data that is deleted immediately d) Data that cannot be tracked
10. What does the Cyber Appellate Tribunal do?
a) Resolves physical crimes
b) Resolves disputes arising from cyber crimes
c) Enforces traffic laws
d) Manages social media policies
11. What is the effect of spending too much time on the Internet?
a) Improved physical health
b) Enhanced social skills
c) Negative impact on physical and psychological well-being
d) Increased outdoor activities
12. What should you do before uploading content online?
a) Ensure it is sensitive
b) Think carefully about its potential impact
c) Upload it immediately without thought
d) Share it with everyone
13. What is the purpose of the IT Act in India?
a) To regulate offline transactions
b) To provide a legal framework for electronic governance
c) To restrict internet usage
d) To ban social media
14. What can be done to reduce eye strain from digital devices?
a) Increase screen brightness
b) Continuously use the device without breaks
c) Use ergonomically designed devices
d) Decrease the text size
15. What is the nature of the changes brought by digital technologies?
a) Slower communication b) More convenient and faster processes
c) Reduced productivity d) Limited access to information
16. What is one method to ensure data privacy?
a) Sharing passwords widely
b) Using strong and frequently changed passwords
c) Avoiding encryption
d) Ignoring data breaches
17. What should be done if you receive fake information on social media?
a) Believe it immediately
b) Validate it with knowledge and experience
c) Share it widely
d) Ignore it completely
18. What type of digital footprint includes emails you write?
a) Passive b) Active
c) Unintentional d) Invisible
19. What should you be cautious about in a digital society?
a) Only physical interactions b) How you conduct yourself online
c) Avoiding all digital transactions d) Never using social networks
20. What is one of the penalties outlined in the IT Act for cyber crimes?
a) Fine for physical assault
b) Punishment for hacking the computer system
c) Reward for using strong passwords
d) Incentive for not using the Internet
21. What is one impact of improper posture while using digital devices?
a) Improved mental health b) Physical strain and fatigue
c) Enhanced physical fitness d) Better concentration
22. How should you handle sensitive or confidential files online?
a) Upload them carelessly
b) Avoid uploading them whenever possible
c) Share them with unknown contacts
d) Ensure they are public
23. What does digital signature ensure?
a) Anonymity of the user
b) Authenticity of the document
c) Untraceability of the document
d) Permanent deletion of the document
24. What should you do with your passwords to protect your online accounts?
a) Keep the same password for all accounts
b) Share them with friends
c) Change them frequently
d) Write them down in a public place
25. What is the effect of continuously looking at small handheld devices?
a) Improved vision
b) Eye strain
c) Increased outdoor activity
d) Enhanced focus
26. How can fake news on social media be identified?
a) By sharing it without validation
b) By believing it immediately
c) By using experience and knowledge to validate
d) By ignoring all news
27. What does the term 'netizen' refer to?
a) A person who avoids using the Internet
b) A person who is actively involved in online communities
c) A person who uses only traditional communication
d) A person who has no digital footprint
28. What should you avoid doing on social networks?
a) Uploading everything immediately
b) Thinking before uploading
c) Validating information before sharing
d) Being cautious about privacy
29. What is the impact of digital technologies on human activities?
a) They have made things more difficult
b) They have evolved all spheres of activities
c) They have decreased efficiency
d) They have limited communication
30. What is one way to reduce physical strain from using digital devices?
a) Ignoring ergonomic guidelines b) Using ergonomic devices and furniture
c) Avoiding breaks d) Increasing screen brightness
31. What is an active digital footprint?
a) Data you unintentionally leave online b) Data that is deleted automatically
c) Data you intentionally leave online d) Data that cannot be tracked
32. What does the term 'digital signature' imply?
a) A person's handwritten signature
b) An electronic signature that verifies the authenticity of a document
c) A printed signature
d) An anonymous signature
33. What is the goal of privacy in a digital society?
a) To make all information public
b) To protect sensitive data from unauthorized access
c) To share passwords widely
d) To avoid using encryption
34. What can help reduce the risk of cybercrimes?
a) Ignoring software updates
b) Using outdated security software
c) Regularly updating security measures
d) Sharing passwords with everyone
35. What is a common health issue from excessive screen time?
a) Enhanced sleep quality b) Eye strain
c) Improved posture d) Increased physical activity
36. What should you do if you are unsure about the authenticity of online content?
a) Share it widely b) Validate it before sharing
c) Ignore it d) Believe it immediately
37. What type of information is considered public data?
a) Biometric information b) Internet cookies
c) Social media posts d) Financial records
38. What should be done to protect sensitive online transactions?
a) Use weak passwords b) Ignore security protocols
c) Use encryption and authentication d) Share transaction details publicly
39. What is one approach to dealing with digital footprints?
a) Sharing all personal data publicly
b) Ignoring the privacy settings
c) Being mindful about what you upload and download
d) Avoiding all online activities
40. What is the function of the Cyber Appellate Tribunal?
a) Handling offline crimes
b) Managing cybercrime disputes
c) Enforcing physical security measures
d) Regulating traditional media
41. What can cause ergonomic issues while using digital devices
a) Correct posture
b) Lack of breaks
c) Ergonomic furniture
d) Regular exercise
42. What is the outcome of spending excessive time online?
a) Enhanced physical fitness
b) Negative impact on health and well-being
c) Increased productivity
d) Better social interactions
43. What type of footprint includes data collected by websites you visit?
a) Active b) Passive
c) Public d) Private
44. What should you do to ensure digital security?
a) Avoid using security measures b) Use strong and unique passwords
c) Share your passwords d) Ignore security updates
45. What is one feature of a digital society?
a) Avoidance of digital technology
b) Dependence on digital technologies for various activities
c) Limited communication methods
d) Preference for physical interactions only
46. What is the primary goal of data privacy?
a) Making all data public
b) Preventing unauthorized access to sensitive data
c) Avoiding encryption
d) Sharing passwords widely
47. What is the primary concern with digital footprints?
a) Enhancing public profile b) Privacy and security risks
c) Improved social interactions d) Better online presence
48. What is one way to reduce eye strain from screens?
a) Increasing screen brightness b) Taking regular breaks
c) Reducing text size d) Ignoring ergonomic practices
49. What should you do with sensitive files online?
a) Share them with everyone b) Avoid uploading them if possible
c) Ignore their privacy settings d) Upload them without encryption
50. What is the importance of a digital signature?
a) It ensures anonymity
b) It verifies the authenticity of a document
c) It cannot be traced
d) It deletes documents permanently
51. Statement 1: Active and passive are the two types of digital foot prints.
Statement 2: Passive digital footprint means, data you unintentionally leave online.
a. Both statement 1 and 2 is false
b. Both statement 1 and 2 is true
c. Statement 1 is true, statement 2 is false
d. Statement 1 is false, statement 2 is true
52. Statement 1: India's IT act is amended in 2021.
Statement 2: The act outlines cyber crimes and penalties.
a. Both statement 1 and 2 is false
b. Both statement 1 and 2 is true
c. Statement 1 is true, statement 2 is false
d. Statement 1 is false, statement 2 is true
53. Statement 1: Trademark infringement means an unauthorized use of others
trademark on products and services.
Statement 2: An owner of a trademark cannot commence legal proceedings against
someone who infringes its registered trademark.
a. Both statement 1 and 2 is false
b. Both statement 1 and 2 is true
c. Statement 1 is true, statement 2 is false
d. Statement 1 is false, statement 2 is true
54. Statement 1: A patent is usually granted for inventions.
Statement 2: When a patent is granted, the owner gets an exclusive right to prevent
others from using selling or distributing the protected inventions.
a. Both statement 1 and 2 is false
b. Both statement 1 and 2 is true
c. Statement 1 is true, statement 2 is false
d. Statement 1 is false, statement 2 is true
55. Statement 1: IPR stands for Intellectual Property Rights.
Statement 2: GPL stands for General Public Language.
a. Both statement 1 and 2 is false
b. Both statement 1 and 2 is true
c. Statement 1 is true, statement 2 is false
d. Statement 1 is false, statement 2 is true
56. Statement – 1 : Copyright is a type of intellectual property.
Statement – 2 : In FOSS, no one is freely licensed to use, copy, study, and
changethesoftware in any way.
a) Statement – 1 is false but Statement – 2 is true
b) Statement – 1 is true but Statement – 2 is false
c) Both statements are false
d) Both statements are true
57. Statement – 1 : Plagiarism is the practice of taking someone else's work or ideas
andpassing them off as one's own.
Statement – 2 : Plagiarism is not a violation of IPR.
a) Both statements are true.
b) Both statements are false.
c) Only Statement-1 is true.
d) Only Statement-2 is true.
58. Assertion (A) : Data theft is not a type of cybercrime.
Reason(R) : A Digital Footprint is a unique data trace of a user’s activities,
actions,communications or transactions in digital media.
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.
59. Assertion (A) : A good digital citizen should avoid plagiarism, copyright
infringementand trademark infringement.
Reasoning (R) : Intellectual Property Rights (IPR) help in data protection
throughcopyrights, patents and trademarks.
a) Both A and R are true and R is not the correct explanation of A
b) Both A and R are true and R is the correct explanation of A
c) A is true, but R is false
d) A is false, but R is true
60. Assertion : Cyber bullying is a serious concern in the digital age.
Reason: It involves using digital platforms to intimidate or harm others.
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.
61. Assertion : Ransomware encrypts files on a victim's computer and demands payment
fordecryption.
Reason: Ransomware is a type of antivirus software designed to protect computers
from cyberthreats.
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.
62. Assertion : Adware is a type of malware that displays unwanted advertisements.
Reason: Adware enhances computer performance and speeds up internet browsing.
Correct
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.
63. Assertion : Proper disposal of used electronic gadgets is crucial for environmental
safety.
Reason: E-waste management mainly involves burning electronic waste to minimize
pollution.
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.
64. Assertion : The Information Technology Act (IT Act) primarily focuses on regulating
socialmedia usage.
Reason: IT Act addresses cybercrime and electronic commerce, providing legal
frameworks fordigital transactions.
a) A is false but R is true.
b) A is true but R is false.
c) Both A and R is true.
d) Both A and R is false.

ANSWERS FOR THE ABOVE

  1. a) Active and Passive
  2. b) A society that relies heavily on digital technologies
  3. c) Biometric information
  4. b) Electronic governance
  5. b) By using encryption and authentication
  6. b) Eye strain
  7. c) Be cautious about what you upload or download
  8. b) Reducing strain on the body
  9. b) Data you unintentionally leave online
  10. b) Resolves disputes arising from cyber crimes
  11. c) Negative impact on physical and psychological well-being
  12. b) Think carefully about its potential impact
  13. b) To provide a legal framework for electronic governance
  14. c) Use ergonomically designed devices
  15. b) More convenient and faster processes
  16. b) Using strong and frequently changed passwords
  17. b) Validate it with knowledge and experience
  18. b) Active
  19. b) How you conduct yourself online
  20. b) Punishment for hacking the computer system
  21. b) Physical strain and fatigue
  22. b) Avoid uploading them whenever possible
  23. b) Authenticity of the document
  24. c) Change them frequently
  25. b) Eye strain
  26. c) By using experience and knowledge to validate
  27. b) A person who is actively involved in online communities
  28. a) Uploading everything immediately (avoid this)
  29. b) They have evolved all spheres of activities
  30. b) Using ergonomic devices and furniture
  31. c) Data you intentionally leave online
  32. b) An electronic signature that verifies the authenticity of a document
  33. b) To protect sensitive data from unauthorized access
  34. c) Regularly updating security measures
  35. b) Eye strain
  36. b) Validate it before sharing
  37. c) Social media posts
  38. c) Use encryption and authentication
  39. c) Being mindful about what you upload and download
  40. b) Managing cybercrime disputes
  41. b) Lack of breaks
  42. b) Negative impact on health and well-being
  43. b) Passive
  44. b) Use strong and unique passwords
  45. b) Dependence on digital technologies for various activities
  46. b) Preventing unauthorized access to sensitive data
  47. b) Privacy and security risks
  48. b) Taking regular breaks
  49. b) Avoid uploading them if possible
  50. b) It verifies the authenticity of a document
  51. b) Both statement 1 and 2 is true
  52. d) Statement 1 is false, statement 2 is true
  53. c) Statement 1 is true, statement 2 is false
  54. b) Both statement 1 and 2 is true
  55. c) Statement 1 is true, statement 2 is false
  56. b) Statement – 1 is true but Statement – 2 is false
  57. c) Only Statement-1 is true
  58. a) A is false but R is true
  59. b) Both A and R are true and R is the correct explanation of A
  60. c) Both A and R is true
  61. b) A is true but R is false
  62. b) A is true but R is false
  63. b) A is true but R is false
  64. a) A is false but R is true


Comments

Popular posts from this blog

I PU Python 50 Marks Package - Theory - UPDATED

I PU Chapter 11 - Societal Impact