1 of 25

CBSE :: XII :: INFORMATION PRACTICES

UNIT 4 :: SOCIETAL IMPACTS

OLD CBSE QUESTIONS & ANSWERS

(10 Marks)

2 of 25

Unit 4: Societal Impacts

Syllabus

Digital footprint, net and communication etiquettes, data protection, intellectual property rights (IPR), plagiarism, licensing and copyright, free and open source software (FOSS), cybercrime and cyber laws, hacking, phishing, cyber bullying, overview of Indian IT Act.

E-waste: hazards and management.

Awareness about health concerns related to the usage of technology.

3 of 25

2022.23 ::CBSE Sample Paper::Questions

2. Which of the following is not a type of cyber crime?

    i. Data theft   ii. Installing antivirus for protection

    iii. Forgery    iv. Cyber bullying

3. What is an example of e-waste?

     i. A ripened mango              ii. Unused old shoes

    iii. Unused old computers    iv. Empty cola cans

6. ‘O’ in FOSS stands for:

      i. Outsource                  ii. Open

    iii. Original                    iv. Outstanding

15. Legal term to describe the rights of a creator of original creative or artistic work is:

     i. Copyright              ii. Copyleft     

    iii. GPL                       iv. FOSS 

16. __________is the trail of data we leave behind when we visit any website (or use any

online application or portal) to fill-in data or perform any transaction.

    i. Offline phishing           ii. Offline footprint

   iii. Digital footprint           iv. Digital phishing

4 of 25

23. List any four benefits of e-waste management.

OR

     Mention any four net etiquettes.

29. Nadar has recently shifted to a new city and school. She does not know many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile etc.

She is also getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.

i. What is this happening to Nadar?

ii. What immediate action should she take to handle it?

iii. Is there any law in India to handle such issues? Discuss briefly.

OR

What do you understand by plagiarism? Why is it a punishable offence? Mention any two ways to avoid plagiarism.

5 of 25

2. ii.   Installing antivirus for protection

3. iii. Unused old computers

6. ii. Open

15. i.    Copyright

16. iii.  Digital footprint

23. The e-waste management- 

    i. Saves the environment and natural resources 

   ii. Allows for recovery of precious metals 

  iii. Protects public health and water quality 

  iv. Saves landfill space 

OR

    i. No copyright violation 

   ii. Share the expertise with others on the internet 

  iii. Avoid cyber bullying 

  iv. Respect other’s privacy and diversity 

2022.23 ::CBSE Sample Paper::Answers

6 of 25

29. i. Nadar has become a victim of cyber bullying and cyber stalking.

ii. She must immediately bring it into the notice of her parents and school authorities. And she must report this cyber crime to local police with the help of her parents.

iii. Yes. The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is the primary law in India dealing with cybercrime and electronic commerce.

OR

Plagiarism is the act of using or stealing someone else’s intellectual work, ideas etc. and passing it as your own work. In other words, plagiarism is a failure in giving credit to its source.

Plagiarism is a fraud and violation of Intellectual Property Rights. Since IPR holds a legal entity status, violating its owners right is a legally punishable offence.

Any two ways to avoid plagiarism:

  • Be original
  • Cite/acknowledge the source

7 of 25

2021.22 ::CBSE Main Paper::Term 1 (Questions)

12. With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised the parents to follow a few health tips. Which of the following health tip should not be suggested.

(a) The sitting posture should be correct

(b) Breaks should be taken in between the online classes

(c)To protect the eyes the gadgets should be placed above eye level.

(d) Wash the eyes regularly.

 

13. The following is automatically granted to the creator or owner of any invention.

(a) Patent (b) Copyright (c) Trademark (d) License

8 of 25

14. Himanshi sets up her own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company.

(a) Patent (b) Copyright (c) Design (d) Trademark

 

15. GPL stands for

(a) Guided Public License (b) General Public License

(c) Global Public License (d) General Public Letter

 

16. E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The _________ has issued a formal set of guidelines for proper handling and disposal of e-waste.

(a) Central Pollution Control Board (CPCB)

(b) Department of Information Technology (DIT)

(c) Electrical and Electronic Equipment (EEE)

(d) Information Communication Technology (ICT)

9 of 25

25. Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?

(a) Start chatting with an unknown person.

(b) talk to her parents/teacher or other trusted adult and let them know that she is feeling

uncomfortable.

(c) Ignore the conversation

(d) She should delete the chat so that no one comes

to know.

 

27. The primary law in India dealing with cyber crime and electronic commerce is:

(a) India’s Technology (IT) Act, 2008

(b) India’s Digital Information Technology (DIT) Act, 2000

(c) India’s Information Technology (IT) Act, 2000

(d) The Technology Act, 2008

10 of 25

28. Consider the following statement with reference to Trademark and Hacking.

Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.

Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.

(a) Statement 1 is True but Statement 2 is False

(b) Statement 1 is False but Statement 2 is True

(c) Both the statements are True

(d) Both the statements are False

31. There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?

(a) Downloaded the images that were marked as CC and pasted in her project file.

(b) Copied the content from some website and pasted in her file.

(c) Copied the content from the website and gave references about the same in the project.

(d) Downloaded and installed the open source software for typing the synopsis.

11 of 25

32. A contract between the creator and the user to allow the user use his/her work with some price is

(a) Agreement (b) Copyright (c) License (d) Patent

35. Companies get their Trademark registered to protect?

(a) logos, names and brands (b) word, phrase, or symbol

(c)slogans, stylized fonts, and colors. (d) Company furniture, worker, brands

37. Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is

(a) Cyber Crime (b) Phishing (c) Theft (d) Plagiarism

45. The rights of the owner of information to decide how much information is to be shared/ exchanged/ distributed, are collectively known as ___________

(a) Intelligent Portable Rights (b) Intellectual Property Rights

(c) Interactive Property Rights (d) Instance Portability Rights

12 of 25

46. Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha’s gmail id to send mail. This act of Aditi is considered as

(a) Plagiarism (b) Identity Theft

(c) Phishing (d) Piracy

47. The trail that is automatically created when a person uses the internet on any digital devices like laptops, smart phones, tablets etc is called

(a) Cyberbullying (b)Phishing

(c) Digital Footprint (d) Digital Activity

48. ____________ operating system comes under FOSS

(a) Windows (b) Ubuntu

(c)Mac (d) Oracle

13 of 25

2021.22 ::CBSE Main Paper::Term 1 (Answers)

12. C 13. (b) Copyright 14. (d) Trademark

15. (b) General Public License 16. (a) 25. (b)

27. (c) India’s Information Technology (IT) Act, 2000

28. (b) Statement 1 is False but Statement 2 is True

31. (b) Copied the content from some website and pasted in her file.

32. (c)License

35. (a) logos, names and brands

37. (c) Theft

45. (b) Intellectual Property Rights

46. (b) Identity Theft

47. (c) Digital Footprint

48. (b) Ubuntu

14 of 25

2021.22 ::CBSE SP::Term 1 (Questions)

 

11. A ______________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.

a. Digital Handprint b. Digital Footprint

c. Offline Footprint d. Offline Handprint

12. Which of the following is not a type of cybercrime?

a. Data theft b. Forgery of online documents

c. Damage to data and systems

d. Installing antivirus for protection

13. ‘F’ in FOSS stands for:

a. Free b. Forever

c. Fire d. Freezing

15 of 25

15. IPR stands for:

a. Intelligent Property Rights b. Intellectual Property Reserve

c. Intellectual Property Rights d. Intellectual Product Rights

16. Which of the following is not a violation of IPR?

a. Plagiarism b. Copyright Infringement

c. Patent d. Trademark Infringement

18. ____________is the practice of taking someone else's work or ideas and passing them off

as one's own:

a. Plagiarism b. Copyright

c. Patent d. All of the above

20. Following are the impact of e-waste on the

environment. Choose the odd one out.

a. Soil Pollution b. Water Pollution

c. Air Pollution d. Sound Pollution

16 of 25

21. Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?

a. Yes b. No c. May be d. Not sure

22. The legal and regulatory aspects of the internet refer to.....................

a. Cyber Space b. Cyber crime

c. Criminal law d. IT act

29. ____________ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

a. Plagiarism b. Phishing

c. Cyberstalking d. Hacking

17 of 25

33. Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:

a. Ubuntu b. Windows c. Mozilla Firefox d. Blender

34. Consider the following statements with reference to the use of email:

Statement 1: Sending threatening messages to a classmate.

Statement 2: Inviting friends to participate in a school club or sports activity.

Statement 3: Asking your teacher for help on homework.

Statement 4: Responding to or forwarding spam emails.

Which of the above statements refer to appropriate use of email?

a. Statements 1 and 2. b. Statements 2 and 3.

c. Statements 3 and 4. d. Statements 2 and 4.

18 of 25

36. Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?

a. ignore it and start chatting to someone else.

b. reply back to them and find out what their problem is.

c. shut down the computer and hope they'll leave him alone in future.

d. go to his parents, teacher, or other trusted adult and let them know that he feels

uncomfortable.

38. Feasible method (s) to manage e-waste:

a. Reduce b. Reuse c. Recycle d. All of the above

41. We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:

a. Avoid Cyber Bullying b. Respect Other’s Privacy

c. No Copyright violation d. All of the above

45. Linux, MySQL and Mozilla Firefox software come under_______ category.

a. Proprietary b. FOSS c. Freeware d. Shareware

19 of 25

2021.22 ::CBSE SP::Term 1 (Answers)

11. b. Digital Footprint

12. d. Installing antivirus software

13. a. Free

15. c Intellectual Property Rights

16. c Patent

18. a. Plagiarism

20. d. Sound Pollution

21. b. No

22. d. IT Act

29. b. Phishing

33. a. Ubuntu

34. b Statements 2 and 3

36. d. go to his parents, teacher, or other trusted adult and let them know that he feels

uncomfortable.

38. d. All of the above 41. d. All of the above 45. b. FOSS

20 of 25

2020.21 ::CBSE SP::(Questions)

1. State whether True or False : (1)

i. A copyright is automatically granted to authors or creators of content. _________

ii. In FOSS source code is usually hidden from the users. _______________

12. The practice of taking someone else's work or ideas and passing them off as one's own

is known as __________ (1)

17. According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste per year. Only 1.5 % of the total e-waste gets recycled. Suggest a method to manage e-waste. (1)

32. List any two health hazards related to excessive use of Technology. (2)

35. What do you mean by Identity theft? Explain with the help of an example. (3)

OR

What do you understand by Net Ettiquetes? Explain any two such.

21 of 25

2020.21 ::CBSE SP::(Answers)

1. i) True ii) False 12. Plagiarism

17. Buy environmentally friendly electronics

Donate used electronics to social programs

Reuse , refurbish electronics

Recycling e-waste � Any other correct answer to be considered

32. The continuous use of devices like smartphones, computer desktop, laptops, head phones etc cause a lot of health hazards if not addressed. These are:

i. Impact on bones and joints: wrong posture or long hours of sitting in an uncomfortable position can cause muscle or bone injury.

ii. Impact on hearing: using headphones or earphones for a prolonged time and on high volume can cause hearing problems and in severe cases hearing impairments.

iii. Impact on eyes: This is the most common form of health hazard as prolonged hours of screen time can lead to extreme strain in the eyes.

iv. Sleep problem: Bright light from computer devices block a hormone called melatonin which helps us sleep. Thus we can experience sleep disorders leading to short sleep cycles.

22 of 25

35. Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to post inappropriate remarks , comments etc.

Example: Alex likes to do his homework late at night. He uses the Internet a lot and also sends useful data through email to many of his friends. One Day he forgot to sign out from his email account. In the morning, his twin brother, Flex started using the computer. He used Flex’s email account to send inappropriate messages to his contacts

OR

Net Ettiquets refers to the proper manners and behaviour we need to exhibit while being online.

These include :

1. No copyright violation: we should not use copyrighted materials without the permission of the creator or owner. We should give proper credit to owners/creators of open source content when using them.

2. Avoid cyber bullying: Avoid any insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information,

or comments aimed to publicly ridicule a victim.

23 of 25

2019.20 ::CBSE SP::(Questions)

5A) Which of the following is not an intellectual property? (1)

(i) A poem written by a poet (ii) An original painting made by a painter

(iii) Trademark of a Company (iv) A remixed song

5B)Jhilmalini has stolen a credit card. She used that credit card to purchase a laptop. What

type of offence has she committed? (1)

5c) Name the primary law in India dealing with cybercrime and electronic commerce.

5d) Sutapa received an email from her bank stating that there is a problem with her account. The email provides instructions and a link, by clicking on which she can logon to her account and fix the problem. Help Sutapa by telling her the precautions she should take when she receives these type of emails. (2)

5e) Explain any two ways in which technology can help students with disabilities. (2)

5f) Explain the role of online social media campaigns, crowdsourcing and smart mobs in society.

OR (3)

Ms Samtha has many electronics gadgets which are not usable due to outdated hardware and software. Help her to find any three best ways to dispose the used electronic gadgets.

24 of 25

2019.20 ::CBSE SP::(Answers)

5a) A remixed song is not an intellectual property

5b) She has committed a fraud

5c) The primary law is Information Technology Act 2000.

5d) She should check whether it is a valid bank site or not by checking in the url https. It is

always better to type the url and then login to the site. She should not click on the link

provided in the email.

5e) Different types of ICT tools assist people with learning disabilities to achieve positive

outcomes.

They are : Talking Word processors

Screen Readers

Conversion of local language to Braille

Eye Tracking mouse

5f) Role of Social Media Campaigns:-

A social media campaign should focus around a singular business goal, whether it's on Facebook or Instagram.

25 of 25

Common goals for a social media campaigns include:

  • Getting feedback from users.
  • Building email marketing lists
  • Increasing website traffic
  • Crowdsourcing is the practice of engaging a ‘crowd’ or group for a common goal — often innovation, problem solving, or efficiency. It is powered by new technologies, social media and web 2.0. Crowdsourcing can take place on many different levels and across various industries.
  • Smart mobs, so named because each person in the
  • group uses technology to receive information on where to go and what to do. This ability to stay on top of current events makes smart mobs extremely effective

OR

1. Give Your Electronic Waste to a Certified E-Waste Recycler

2. Donating Your Outdated Technology

3. Give Back to Your Electronic Companies and Drop Off Points.