THE EMIRATES NATIONAL SCHOOL – SHARJAH
INFORMATICS PRACTICES
CLASS: XII SOCIETAL IMPACTS WORKSHEET (2025-2026)
A. OBJECTIVE TYPE QUESTIONS:
1. A copyright is automatically granted to authors or creators of content. (True/False)
2. In FOSS source code is usually hidden from the users. (True/False)
3. The practice of taking someone else's work or ideas and passing them off as one's own is known as________
4. A mail or message sent to a large number of people indiscriminately without their consent is called________
5. Receiving irrelevant and unwanted emails repeatedly is an example of ______________.
6. The generally recognized term for the government protection afforded to intellectual property (written and
electronic) is __________.
7. A software which can be freely accessed and modified is called ___________
8. Freeware is copyrighted software that is freely available to use. (True/False)
9. _______ is a secure technique to protect data being transmitted over a network.
10. ________ are the etiquettes that are to be followed while communicating online.
B. MULTIPLE CHOICE QUESTIONS
1. Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly
ridicule a victim is termed as ________
a. Cyber bullying b. Cyber crime c. Cyber insult d. All of the above
2. Ankit made a ERP - Enterprise resource planning solution for a renowned university and registered and Copyrights for the
same. Which of the most important option; Ankit got the copyrights.
a) To get society status b) To get fame c) To get community welfare d) To secure finance protection
3. Which of the following is not an example of Social media platform?
a. Facebook b. Pinterest c. Google+ d. Social channel
4. A responsible netizen must abide by __________
a. Net etiquettes b. Communication etiquettes c. Social media etiquettes d. All of the above
5. A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by
destroying data or corrupting the system.
a. Cyber crime b. Computer virus c. Program d. Software
6. Which of the following activity is an example of leaving Active digital footprints?
a) Surfing internet b) Visiting a website c) Sending an email to a friend d) None of the above
7. You are planning to go for a vacation. You surfed the internet to get answers for following queries.
a) Places to visit b) Availability of air tickets and fares c) Best hotel deals d) All of these
Which of the above-mentioned actions might have created a digital footprint?
8. Legal term to describe the rights of a creator of original creative or artistic work is called _________.
a) Copyright b) Copyleft c) GPL d) BSD
9. Intellectual Property is legally protected through _______.
a) copyright b) patent c) registered trademark d) All of the above
10. _____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from
other brands.
a) Trademark b) Patent c) Copyright d) None of the above
11. Gaining unauthorized access to a network or computer aur digital files with malicious intentions, is called_________
a. Cracking b. Hacking c. Banging d. Phishing
12. Legal term to describe the rights of a creator of original creative or artistic work is called _____
a. Copyright b. Copyleft c. GPL d. None of these
13. OSS stands for __________
a. Open system security b. Open system source c. Open software and security d. Open source software
14. Any fraudulent business practice that extracts money e from an unsuspecting, ignorant person is called_______
a. Stealing b. Scam c. Violation of copyright d. Digital footprint
15.________ means no price is to be paid for the software.
a. Free software b. Freeware c. shareware d. Open source software
16. Any work / information that exist in digital form idea on internet or on an electronic device, is known as___ property.
a. Licence property b. digital property c. source code property d. software property
17. Discarded electrical or or electronic devices are known as____________.
a. E waste b. Software Waste c. Hardware waste d. Computer waste
18. The least restrictive open source licence is________ licence.
a. Apache Licence b. MIT licence c. GNU licence d. BSD licence
19. The original code written by programmers for software is known as______________
a. Object code b. Source code c. Python code d. Language code
20. ____________ means freedom to use the software.
a. Plagiarism b. Freeware c. Open software d. Free software
21. IAD means _________________
a. Internet advanced data b. Internet addiction disorder
c. Internet advanced digitalization d. Internet aggregate data
22. The__________ is the Digital trail of your activity on the internet.
a. Copyleft b. Digital footprint c. Digital data d. Internet property
23. The ________ are the permissions given to use a product or someone's creator by the copyright holder.
a. Source code b. Licence c. Software authority d. Digital rights
24._____________ is a licence that gives right opposite to copyright.
a. Left copy b. Digital copy c. Copyleft d. IPR
25. A software that can be freely accessed and modified is called
a. synchronous software b. package software c. open source software d. middleware
26. Which of the following is an advantage of open source software?
a. You can edit the source code to customise it b. you need to be an expert to edit code
c. you have to pay d. can sometimes with two generic for specialist purposes
27. Which of the following is a disadvantage of open source software?
a. high quality software with lots of features. b. not as customizable
c. may not have been tested as much as proprietary software so might have bugs.
d. you can added the source code to customize it
28. Which of the following is an advantage of proprietary software?
a. It is usually free b. thoroughly tested because people are paying to use it.
c. Not as customizable. d. Can sometimes be to generate for specialist purposes.
29. Which of the following is a disadvantage of proprietary software?
a. You need to be an expert to edit code. b. You have to pay for this type of software.
c. It’s licensed. d. It is launched after proper testing.
30. The generally recognized term for the government protection afforded to intellectual property written and electronic is
called _____
a. Computer security law. b. Aggregate information. c. Copyright law d. Data security standards.
31. Which of the following would be a creative work protected by copyright?
a. A list of all Indian President names b. A Portrait of your family
c. A song you wrote d. The name of your pet dog
32. Which of the following is not done by cyber criminals?
a. Unauthorised account access b. Mass Attack using trojans as botnets
c. Email spoofing and spamming d. report vulnerabilty in any system
33. What is the name of the IT law that India is having in the Indian legislature?
a. India's Technology IT Act 2000 b. India's Digital information technology DIT Act, 2000
c. India's Information Technology IT Act, 2000 d. The technology act, 2008.
34. What is meant by the term cybercrime?
a. Any crime that uses computers to jeopardize or attempt to jeoparadise in national security
b. The use of computer networks to commit financial or identity fraud
c. The theft of Digital information
d. Any crime that involves computers and networks
35. Every activity you perform on the internet is safe for how long?
a. 1 month b. 1 year c. As per my setting d. Forever
36. A _____________ is an injury or disorder of muscles, nerves, tendons, ligaments and joints.
a. Repetitive Strain injury b. Muscle injury c. Nervous breakdown d. Joint pain
37.________________ is a technology related health condition affecting eyesight.
a. Computer vision strain b. Computer vision syndrome c. Eyesight syndrome d. Vision imbalance
C. CASE STUDY BASED QUESTIONS
1. After practicals, Atharv left the computer laboratory but forgot to sign off from his email account. Later, his classmate
Revaan started using the same computer. He is now logged in as Atharv. He sends inflammatory email messages to few of his
classmates using Atharv’s email account. Revaan’s activity is an example of which of the following cyber crime?
a) Hacking b) Identity theft c) Cyber bullying d) Plagiarism
2. Rishika found a crumpled paper under her desk. She picked it up and opened it. It contained some text which was struck
off thrice. But she could still figure out easily that the struck off text was the email ID and password of Garvit, her classmate.
What is ethically correct for Rishika to do?
a) Inform Garvit so that he may change his password.
b) Give the password of Garvit’s email ID to all other classmates.
c) Use Garvit’s password to access his account.
3. Suhana is down with fever. So, she decided not to go to school tomorrow. Next day, in the evening she called up her
classmate, Shaurya and enquired about the computer class. She also requested him to explain the concept. Shaurya said,
“Mam taught us how to use tuples in python”. Further, he generously said, “Give me some time, I will email you the
material which will help you to understand tuples in python”. Shaurya quickly downloaded a 2-minute clip from the
Internet explaining the concept of tuples in python. Using video editor, he added the text “Prepared by Shaurya” in the
downloaded video clip. Then, he emailed the modified video clip to Suhana. This act of Shaurya is an example of —
a) Fair use b) Hacking c) Copyright infringement d) Cyber crime
4. After a fight with your friend, you did the following activities. Which of these activities is not an example of cyber bullying?
a) You sent an email to your friend with a message saying that “I am sorry”.
b) You sent a threatening message to your friend saying “Do not try to call or talk to me”.
c) You created an embarrassing picture of your friend and uploaded on your account on a social networking site.
5. Sourabh has to prepare a project on “Digital India Initiatives”. He decides to get information from the Internet. He
downloads three web pages (webpage 1, webpage 2,webpage 3) containing information on Digital India Initiatives. Which of
the following steps taken by Sourabh is an example of plagiarism or copyright infringement?
a) He read a paragraph on “Digital India Initiatives” from webpage 1 and rephrased it in his own words. He finally
pasted the rephrased paragraph in his project.
b) He downloaded three images of “Digital India Initiatives” from webpage 2. He made a collage for his project
using these images.
c) He downloaded “Digital India Initiative” icon from web page 3 and pasted it on the front page of his project
report.
6. Neerja is a student of Class XI. She has opted for Computer Science. Neerja prepared the project assigned to her. She
mailed it to her teacher. The snapshot of that email is shown below.
Find out which of the following email etiquettes are missing in it.
a) Subject of the mail b) Formal greeting c) Self-explanatory terms d) Identity of the sender e) Regards
7. You are planning to go on a vacation to Kashmir. You surfed the internet for the following:
i) Weather conditions ii) Availabilty of air tickets and fares iii) Places to visit iv) Best hotel deals
Which of the above mentioned acts might have left a digital footprint?
a) i and ii b) i, ii and iii c) i, ii and iv d) all of these
8. Naveen received an email warning him of closure of his bank accounts if he did not update his banking information as
soon as possible. He clicked the link in the email and entered his banking information. Next he got to know that he was
duped.
i) This is an example of __________ .
a. Online Fraud b. Identity Theft c. Phishing d. Plagarism
ii) Someone steals Naveen’s personal information to commit theft or fraud, it is called ____________
a. Online Fraud b. Identity Theft c. Phishing d. Plagarism
iii) Naveen receiving an Unsolicited commercial emails is known as __________
a. Spam b. Malware c. Virus d. worms
iv) Naveen’s Online personal account, personal website are the examples of?
a. Digital wallet b. Digital property c. Digital certificate d. Digital signature
v) Sending mean texts, posting false information about a person online, or sharing embarrassing photos or videos to
harass, threaten or humiliate a target person, is called ____________
a. Eavesdropping b. cyberbullying c. Spamming d. Phishing
9. Prathyush has to prepare a project on “Cyber Jaagrookta Diwas”.He decides to get information from the Internet. He
downloads three web pages (webpage1, webpage 2, webpage 3) containing information on the given topic.
1. He read a paragraph from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph
in his project. And he put a citation about the website he visited and its web address also.
2. He downloaded three images of from webpage 2. He made a collage for his project using these images.
3. He also downloaded an icon from web page 3 and pasted it on the front page of his project report.
(i) Step1 is an act of ________.
(a) Plagiarism (b) copyright infringement (c) Intellectual Property right (d) None of the above
(ii) Step 2 is an act of _______.
(a) plagiarism (b) copyright infringement (c) Intellectual Property right (d) Digital Footprints
(iii) Step 3 is an act of ________.
(a) Plagiarism (b) Paraphrasing (c) copyright infringement (d) Intellectual Property right
(iv) ____is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.
(a) Hyperlinks (b) Web pages (c) Browsers (d) Cookies
(v) The process of getting web pages, images and files from a web server to local computer is called
(a) FTP (b) Uploading (c) Downloading (d) Remote access
D. SHORT ANSWER QUESTIONS
1. List any two health hazards related to excessive use of Technology.
2. Priyanka is using her internet connection to book a flight ticket. This is a classic example of leaving a trail of web activities
carried by her. What do we call this type of activity? What is the risk involved by such kind of activity?
3. What do you mean by Identity theft? Explain with the help of an example.
4. What do you understand by Net Ettiquetes? Explain any two such ettiquetes.
5. According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste
per year. Only 1.5 % of the total e-waste gets recycled. Suggest some methods to manage e-waste.