SOCIETAL IMAPCT- EXERCISE
OBJECTIVE TYPE QUESTIONS
1. Fill in the blanks.
a. Any information about you or created by you that exists in digital form is referred
to as _____________________.
b. Stealing someone’s intellectual work and representing it as your own is known as
_________________________.
c. Creative creations of mind such as patents, trademarks and copyright are
___________________ property.
d. Any fraudulent business practice that extracts money from an ignorant person is
called a (n) _________________________.
e. Software which usually limit the functionality after a trial period are known as
___________________.
f. IT Amendment Act, 2008 come into force from the year ____________________.
g. Online ______________________ is a theft of personal information in order to commit
fraud.
h. A _____________________ is an organized group of people who have gathered
through the use of social media to protest for a social or political cause.
i. ___________________ is a specific type of disorder where a person can’t strike a
balance between their time online and offline.
j. The practice of attempting to acquire sensitive information from individuals over
internet by means of deception is called _________________.
Answers: a. Digital property b. Plagiarism c. intellectual
a. Scam e. Shareware f. 2009
a. Identity theft h. smart mob i. internet addiction
J. Phishing
2. State whether the following statements are TRUE or FALSE.
a. Public Domain Software is free and can be used with restrictions.
b. An important factor of privacy is consumer consent.
c. Intellectual Property Rights are the rights of owners to decide how much
information/data is to be shared or exchanged.
d. Copying and pasting data from internet or other digital resources is ethical.
e. E-document becomes legal after it is digitally signed.
f. E-waste is very hazardous if not handled carefully.
g. The data stored in biometric database can be updated.
h. Source code of proprietary software is normally available.
i. Free software is same as freeware.
j. Never respond to an email or advertisement that claims you have won something.
Answers: a. False b. True c. True d. False e. True
f. True g. False h. False i. False j. True
3. Multiple Choice Questions (MCQs)
a. Using someone else’s twitter handle to post something will be termed as:
(i) Fraud (ii) Identity theft (iii) Online streaming (iv) Violation
b. Standard security protocol that establishes encrypted links between a web server
and a browser is called ………….
(i) Online safety technology (ii) SDT technology
(iii) Web encryption technology (iv) Secure Sockets Layer technology
c. Intellectual Property Rights protect the use of information and ideas that are of:
(i) Ethical values (ii) Moral values (iii) Social values (iv) Commercial values
d. Credit card fraud may include:
(i) Stealing of credit card (ii) Unauthorized and illegal use of credit card.
(iii) Stealing information (iv) Phishing
e. The term “Intellectual Property Rights” covers:
(i) Copyrights (ii) Trademarks (iii) Patents (iv) All of the above
f. Which of the following is a/an open-source software?
(i) Microsoft Windows (ii) Adobe Photoshop (iii) MySQL (iv) MS PowerPoint
g. “Rice Bucket Challenge” is an example of:
(i) Crowd Sourcing (ii) Online Campaigns (iii) Smart Mobs (iv) Internet Addiction
h. Online personal account, personal websites are example of:
(i) Digital Wallet (ii) Digital Property (iii) Digital Certificate (iv) Digital Signatures
i. Unsolicited commercial email is known as ……………….
(i) Spam (ii) Malware (iii) Virus (iv) spyware
j. Which of the following is not a type of a cybercrime?
(i) Data theft (ii) Forgery (iii) Damage to data (iv) Installing antivirus for protection
Answers: a. (ii) b. (iv) c. (iv) d. (ii) e. (iv) f. (iii) g. (ii) h. (ii)
i. (i) j. (iv)