CBSE :: XII :: INFORMATION PRACTICES
UNIT 4 :: SOCIETAL IMPACTS
OLD CBSE QUESTIONS & ANSWERS
(10 Marks)
Unit 4: Societal Impacts
Syllabus
Digital footprint, net and communication etiquettes, data protection, intellectual property rights (IPR), plagiarism, licensing and copyright, free and open source software (FOSS), cybercrime and cyber laws, hacking, phishing, cyber bullying, overview of Indian IT Act.
E-waste: hazards and management.
Awareness about health concerns related to the usage of technology.
2022.23 ::CBSE Sample Paper::Questions
2. Which of the following is not a type of cyber crime?
i. Data theft ii. Installing antivirus for protection
iii. Forgery iv. Cyber bullying
3. What is an example of e-waste?
i. A ripened mango ii. Unused old shoes
iii. Unused old computers iv. Empty cola cans
6. ‘O’ in FOSS stands for:
i. Outsource ii. Open
iii. Original iv. Outstanding
15. Legal term to describe the rights of a creator of original creative or artistic work is:
i. Copyright ii. Copyleft
iii. GPL iv. FOSS
16. __________is the trail of data we leave behind when we visit any website (or use any
online application or portal) to fill-in data or perform any transaction.
i. Offline phishing ii. Offline footprint
iii. Digital footprint iv. Digital phishing
23. List any four benefits of e-waste management.
OR
Mention any four net etiquettes.
�29. Nadar has recently shifted to a new city and school. She does not know many people in her new city and school. But all of a sudden, someone is posting negative, demeaning comments on her social networking profile etc.
She is also getting repeated mails from unknown people. Every time she goes online, she finds someone chasing her online.
i. What is this happening to Nadar?
ii. What immediate action should she take to handle it?
iii. Is there any law in India to handle such issues? Discuss briefly.
OR
What do you understand by plagiarism? Why is it a punishable offence? Mention any two ways to avoid plagiarism.
2. ii. Installing antivirus for protection
3. iii. Unused old computers
6. ii. Open
15. i. Copyright
16. iii. Digital footprint
23. The e-waste management-
i. Saves the environment and natural resources
ii. Allows for recovery of precious metals
iii. Protects public health and water quality
iv. Saves landfill space
OR
i. No copyright violation
ii. Share the expertise with others on the internet
iii. Avoid cyber bullying
iv. Respect other’s privacy and diversity
2022.23 ::CBSE Sample Paper::Answers
29. i. Nadar has become a victim of cyber bullying and cyber stalking.
ii. She must immediately bring it into the notice of her parents and school authorities. And she must report this cyber crime to local police with the help of her parents.
iii. Yes. The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is the primary law in India dealing with cybercrime and electronic commerce.
OR
Plagiarism is the act of using or stealing someone else’s intellectual work, ideas etc. and passing it as your own work. In other words, plagiarism is a failure in giving credit to its source.
Plagiarism is a fraud and violation of Intellectual Property Rights. Since IPR holds a legal entity status, violating its owners right is a legally punishable offence.
Any two ways to avoid plagiarism:
2021.22 ::CBSE Main Paper::Term 1 (Questions)
12. With the outset of Covid-19 schools started online classes but due to continuous online classes students health issues also started. Health practitioner advised the parents to follow a few health tips. Which of the following health tip should not be suggested.
(a) The sitting posture should be correct
(b) Breaks should be taken in between the online classes
(c)To protect the eyes the gadgets should be placed above eye level.
(d) Wash the eyes regularly.
13. The following is automatically granted to the creator or owner of any invention.
(a) Patent (b) Copyright (c) Trademark (d) License
14. Himanshi sets up her own company to sell her own range of clothes on Instagram. What type of intellectual property can she use to show that the clothes are made by his company.
(a) Patent (b) Copyright (c) Design (d) Trademark
15. GPL stands for
(a) Guided Public License (b) General Public License
(c) Global Public License (d) General Public Letter
16. E-waste is becoming one of the fastest growing environmental hazards in the world today. If it is not properly treated or disposed of it can cause serious health hazards, therefore The _________ has issued a formal set of guidelines for proper handling and disposal of e-waste.
(a) Central Pollution Control Board (CPCB)
(b) Department of Information Technology (DIT)
(c) Electrical and Electronic Equipment (EEE)
(d) Information Communication Technology (ICT)
25. Priya is a student of class 10 and she is a very frequent user of internet applications. One day she got an unpleasant message on her instant messenger. What do you think she should do?
(a) Start chatting with an unknown person.
(b) talk to her parents/teacher or other trusted adult and let them know that she is feeling
uncomfortable.
(c) Ignore the conversation
(d) She should delete the chat so that no one comes
to know.
27. The primary law in India dealing with cyber crime and electronic commerce is:
(a) India’s Technology (IT) Act, 2008
(b) India’s Digital Information Technology (DIT) Act, 2000
(c) India’s Information Technology (IT) Act, 2000
(d) The Technology Act, 2008
28. Consider the following statement with reference to Trademark and Hacking.
Statement 1: Trademark is a document that provides legally binding guidelines for the use and distribution of software.
Statement 2: Hacking is the act of unauthorized access to a computer network or any digital system.
(a) Statement 1 is True but Statement 2 is False
(b) Statement 1 is False but Statement 2 is True
(c) Both the statements are True
(d) Both the statements are False
31. There is only 1 day left for Ravisha to submit her Science project. Therefore she performed the following activities to complete her task. Which of the following activities can be considered as plagiarism?
(a) Downloaded the images that were marked as CC and pasted in her project file.
(b) Copied the content from some website and pasted in her file.
(c) Copied the content from the website and gave references about the same in the project.
(d) Downloaded and installed the open source software for typing the synopsis.
32. A contract between the creator and the user to allow the user use his/her work with some price is
(a) Agreement (b) Copyright (c) License (d) Patent
35. Companies get their Trademark registered to protect?
(a) logos, names and brands (b) word, phrase, or symbol
(c)slogans, stylized fonts, and colors. (d) Company furniture, worker, brands
37. Rohit forgot his laptop in his car and when he came back he found his laptop was missing. This act is
(a) Cyber Crime (b) Phishing (c) Theft (d) Plagiarism
45. The rights of the owner of information to decide how much information is to be shared/ exchanged/ distributed, are collectively known as ___________
(a) Intelligent Portable Rights (b) Intellectual Property Rights
(c) Interactive Property Rights (d) Instance Portability Rights
46. Abhilasha forgot to sign out from her gmail id and Aditi used Abhilasha’s gmail id to send mail. This act of Aditi is considered as
(a) Plagiarism (b) Identity Theft
(c) Phishing (d) Piracy
47. The trail that is automatically created when a person uses the internet on any digital devices like laptops, smart phones, tablets etc is called
(a) Cyberbullying (b)Phishing
(c) Digital Footprint (d) Digital Activity
48. ____________ operating system comes under FOSS
(a) Windows (b) Ubuntu
(c)Mac (d) Oracle
2021.22 ::CBSE Main Paper::Term 1 (Answers)
12. C 13. (b) Copyright 14. (d) Trademark
15. (b) General Public License 16. (a) 25. (b)
27. (c) India’s Information Technology (IT) Act, 2000
28. (b) Statement 1 is False but Statement 2 is True
31. (b) Copied the content from some website and pasted in her file.
32. (c)License
35. (a) logos, names and brands
37. (c) Theft
45. (b) Intellectual Property Rights
46. (b) Identity Theft
47. (c) Digital Footprint
48. (b) Ubuntu
2021.22 ::CBSE SP::Term 1 (Questions)
11. A ______________ is a unique data trace of a user’s activities, actions, communications or transactions in digital media.
a. Digital Handprint b. Digital Footprint
c. Offline Footprint d. Offline Handprint
12. Which of the following is not a type of cybercrime?
a. Data theft b. Forgery of online documents
c. Damage to data and systems
d. Installing antivirus for protection
13. ‘F’ in FOSS stands for:
a. Free b. Forever
c. Fire d. Freezing
15. IPR stands for:
a. Intelligent Property Rights b. Intellectual Property Reserve
c. Intellectual Property Rights d. Intellectual Product Rights
16. Which of the following is not a violation of IPR?
a. Plagiarism b. Copyright Infringement
c. Patent d. Trademark Infringement
18. ____________is the practice of taking someone else's work or ideas and passing them off
as one's own:
a. Plagiarism b. Copyright
c. Patent d. All of the above
20. Following are the impact of e-waste on the
environment. Choose the odd one out.
a. Soil Pollution b. Water Pollution
c. Air Pollution d. Sound Pollution
21. Abdul deleted all his chats from all his social media accounts, and he thinks that all his traces are deleted completely. Is he right in thinking so?
a. Yes b. No c. May be d. Not sure
22. The legal and regulatory aspects of the internet refer to.....................
a. Cyber Space b. Cyber crime
c. Criminal law d. IT act
29. ____________ is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.
a. Plagiarism b. Phishing
c. Cyberstalking d. Hacking
33. Suhhani is confused about the free operating system available in the market. Few of her friends suggested a few operating systems. Help her in choosing free operating system for her device:
a. Ubuntu b. Windows c. Mozilla Firefox d. Blender
34. Consider the following statements with reference to the use of email:
Statement 1: Sending threatening messages to a classmate.
Statement 2: Inviting friends to participate in a school club or sports activity.
Statement 3: Asking your teacher for help on homework.
Statement 4: Responding to or forwarding spam emails.
Which of the above statements refer to appropriate use of email?
a. Statements 1 and 2. b. Statements 2 and 3.
c. Statements 3 and 4. d. Statements 2 and 4.
36. Saharsh is a student of class -9 and he is a very frequent user of internet applications. One day he got an unpleasant message on his instant messenger. What do you think he should do?
a. ignore it and start chatting to someone else.
b. reply back to them and find out what their problem is.
c. shut down the computer and hope they'll leave him alone in future.
d. go to his parents, teacher, or other trusted adult and let them know that he feels
uncomfortable.
38. Feasible method (s) to manage e-waste:
a. Reduce b. Reuse c. Recycle d. All of the above
41. We should exhibit proper manners and etiquettes while being online. Choose the right net etiquette (s) from the following:
a. Avoid Cyber Bullying b. Respect Other’s Privacy
c. No Copyright violation d. All of the above
45. Linux, MySQL and Mozilla Firefox software come under_______ category.
a. Proprietary b. FOSS c. Freeware d. Shareware
2021.22 ::CBSE SP::Term 1 (Answers)
11. b. Digital Footprint
12. d. Installing antivirus software
13. a. Free
15. c Intellectual Property Rights
16. c Patent
18. a. Plagiarism
20. d. Sound Pollution
21. b. No
22. d. IT Act
29. b. Phishing
33. a. Ubuntu
34. b Statements 2 and 3
36. d. go to his parents, teacher, or other trusted adult and let them know that he feels
uncomfortable.
38. d. All of the above 41. d. All of the above 45. b. FOSS
2020.21 ::CBSE SP::(Questions)
1. State whether True or False : (1)
i. A copyright is automatically granted to authors or creators of content. _________
ii. In FOSS source code is usually hidden from the users. _______________
12. The practice of taking someone else's work or ideas and passing them off as one's own
is known as __________ (1)
17. According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste per year. Only 1.5 % of the total e-waste gets recycled. Suggest a method to manage e-waste. (1)
32. List any two health hazards related to excessive use of Technology. (2)
35. What do you mean by Identity theft? Explain with the help of an example. (3)
OR
What do you understand by Net Ettiquetes? Explain any two such.
2020.21 ::CBSE SP::(Answers)
1. i) True ii) False 12. Plagiarism
17. Buy environmentally friendly electronics
Donate used electronics to social programs
Reuse , refurbish electronics
Recycling e-waste � Any other correct answer to be considered
32. The continuous use of devices like smartphones, computer desktop, laptops, head phones etc cause a lot of health hazards if not addressed. These are:
i. Impact on bones and joints: wrong posture or long hours of sitting in an uncomfortable position can cause muscle or bone injury.
ii. Impact on hearing: using headphones or earphones for a prolonged time and on high volume can cause hearing problems and in severe cases hearing impairments.
iii. Impact on eyes: This is the most common form of health hazard as prolonged hours of screen time can lead to extreme strain in the eyes.
iv. Sleep problem: Bright light from computer devices block a hormone called melatonin which helps us sleep. Thus we can experience sleep disorders leading to short sleep cycles.
35. Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to post inappropriate remarks , comments etc.
Example: Alex likes to do his homework late at night. He uses the Internet a lot and also sends useful data through email to many of his friends. One Day he forgot to sign out from his email account. In the morning, his twin brother, Flex started using the computer. He used Flex’s email account to send inappropriate messages to his contacts
OR
Net Ettiquets refers to the proper manners and behaviour we need to exhibit while being online.
These include :
1. No copyright violation: we should not use copyrighted materials without the permission of the creator or owner. We should give proper credit to owners/creators of open source content when using them.
2. Avoid cyber bullying: Avoid any insulting, degrading or intimidating online behaviour like repeated posting of rumours, giving threats online, posting the victim’s personal information,
or comments aimed to publicly ridicule a victim.
2019.20 ::CBSE SP::(Questions)
5A) Which of the following is not an intellectual property? (1)
(i) A poem written by a poet (ii) An original painting made by a painter
(iii) Trademark of a Company (iv) A remixed song
5B)Jhilmalini has stolen a credit card. She used that credit card to purchase a laptop. What
type of offence has she committed? (1)
5c) Name the primary law in India dealing with cybercrime and electronic commerce.
5d) Sutapa received an email from her bank stating that there is a problem with her account. The email provides instructions and a link, by clicking on which she can logon to her account and fix the problem. Help Sutapa by telling her the precautions she should take when she receives these type of emails. (2)
5e) Explain any two ways in which technology can help students with disabilities. (2)
5f) Explain the role of online social media campaigns, crowdsourcing and smart mobs in society.
OR (3)
Ms Samtha has many electronics gadgets which are not usable due to outdated hardware and software. Help her to find any three best ways to dispose the used electronic gadgets.
2019.20 ::CBSE SP::(Answers)
5a) A remixed song is not an intellectual property
5b) She has committed a fraud
5c) The primary law is Information Technology Act 2000.
5d) She should check whether it is a valid bank site or not by checking in the url https. It is
always better to type the url and then login to the site. She should not click on the link
provided in the email.
5e) Different types of ICT tools assist people with learning disabilities to achieve positive
outcomes.
They are : Talking Word processors
Screen Readers
Conversion of local language to Braille
Eye Tracking mouse
5f) Role of Social Media Campaigns:-
A social media campaign should focus around a singular business goal, whether it's on Facebook or Instagram.
Common goals for a social media campaigns include:
OR
1. Give Your Electronic Waste to a Certified E-Waste Recycler
2. Donating Your Outdated Technology
3. Give Back to Your Electronic Companies and Drop Off Points.