CBSE Class 12 Informatics Practices Societal Impacts Worksheet

Read and download free pdf of CBSE Class 12 Informatics Practices Societal Impacts Worksheet. Students and teachers of Class 12 Informatics Practices can get free printable Worksheets for Class 12 Informatics Practices Chapter 6 Societal Impacts in PDF format prepared as per the latest syllabus and examination pattern in your schools. Class 12 students should practice questions and answers given here for Informatics Practices in Class 12 which will help them to improve your knowledge of all important chapters and its topics. Students should also download free pdf of Class 12 Informatics Practices Worksheets prepared by teachers as per the latest Informatics Practices books and syllabus issued this academic year and solve important problems with solutions on daily basis to get more score in school exams and tests

Worksheet for Class 12 Informatics Practices Chapter 6 Societal Impacts

Class 12 Informatics Practices students should refer to the following printable worksheet in Pdf for Chapter 6 Societal Impacts in Class 12. This test paper with questions and answers for Class 12 will be very useful for exams and help you to score good marks

Class 12 Informatics Practices Worksheet for Chapter 6 Societal Impacts

Societal Impacts

1. Digital Footprints They are also called digital tattoos.
These are the trails of the activities done by users working on the Internet.
Two types of digital footprint are as follows:
(i) Active digital footprints kept intentionally- like accepting cookies , giving information while creating accounts etc.
(ii) Passive digital footprints kept unknowingly when you have things about you online that you did not put on the Internet.

2. Netiquettes It is also called “Internet etiquettes”.
These are the gentle code of conduct that Internet users should follow while working on the web.
Common netiquettes are as follows:
(i) Be respectful
(ii) Don’t ask personal information
(iii) Keep mails and posts short
(iv) Obey copyright laws
Actions against netiquettes are as follows:
(i) Posting offensive comments
(ii) Posting embarrassing images
(iii) Writing in ALL CAPS

3. Data Protection It refers to the practices, safeguards and binding rules that ensure protection of sensitive and personal information.
Ways of data protection are as follows:
(i) By data encryption
(ii) Not opening phishing emails
(iii) Not sharing Email Id with all.
(iv) Being careful about using Wi-Fi connections.

4. Intellectual Property Rights (IPR) Intellectual property refers to creations of the intellect, inventions or software , literary and artistic works , symbols, names , images used in commerce, etc.
Intellectual property rights protect the rights of the creators of intellectual property.

5. Digital Property Rights include data, Internet accounts and other rights in the digital world, including contractual rights and intellectual property rights.

6. Plagiarism The act of copying someone else’s work and publishing or selling it in one’s own name for financial or other benefits is called plagiarism. Example copying other’s software , audio , video , books etc. and publishing as one’s own creation. Ways to avoid plagiarism are as follows:
(i) Use your own words and ideas.
(ii) Always provide reference or give credit to the source.
(iii) CITE the name of the web site , a URL or the name of authors and acknowledge them if you have used their work .

7. Proprietary Softwares MS-Windows, MS- Office Softwares that can be used by buying a license.
They cannot be copied, modified and redistributed.

8. Free Softwares Softwares available for use free of cost, e.g. Adobe Reader.
They can be copied and redistributed.

9. Free and Open Source Software (FOSS)
These are open source softwares that are necessarily free.
Example : Python, Mozilla firefox

10. Cyber Crime The crimes that are committed using electronic means like computer , network etc. These include phishing , bullying , spamming etc.

11. Cyber law also known as cyber crime law, is legislation focused on the acceptable behavioral use of technology including computer hardware software, the Interent and networks.

12. Phishing The fraudulent act of trying to gather personal information of others by authentic looking mails , messages or phone calls.

13. Spamming The flooding of mailbox by un- authentic emails from unknown sources , mainly for advertisement purposes .

14. Hacking It is the process of gaining un-authorised access to a computing device or a group of computer systems for some illicit purpose.

15. Cyber bullying It is the attack upon an individual or group through the use of electronic means such as instant messaging , social media , email etc.

16. Cyber stalking is a form of cyber crime that takes place online when a criminal uses technology to harass or threaten a person or an organisation.

17. IT Act The Information Technology Act 2000 or ITA -2000 is an act of the Indian parliament notified on 17th October 2000. It is the primary law in India dealing with cyber crime and electronic commerce.

18. e-Waste stands for Electronic Waste refers to dead and worn out electronic devices like computers , cell phones , Monitors etc. e-Waste hazards on environment are as follows:
(i) Air pollution
(ii) Soil pollution
(iii) Pollution of groundwater
(iv) Acidification of soil.
e-Waste disposal techniques are as follows:
(i) Give e-Waste to certifieded e-Waste recycler.
(ii) Sell off outdated technology
(iii) Donate your outdated technology
(iv) Safe guard both environment and your sensitive information
Health hazards due to overuse of technology are as follows:
(i) Repetitive strain injury
(ii) Vision problems
(iii) Radiation
(iv) Sleeping disorder.

 

OBJECTIVE TYPE QUESTIONS

Question. A copyright is automatically granted to authors or creators of content. (True/False)
Answer. 
True

Question. Freeware is copyrighted software that is freely available to use.(True/False)
Answer. True

Question. _______ is a secure technique to protect data being transmitted over a network.
Answer. Encryption

Question. ________ are the etiquettes that are to be followed while communicating online.
Answer. Netiquettes

 

MULTIPLE CHOICE QUESTIONS

Question. Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as __________
a. Cyber bullying
b. Cyber crime
c. Cyber insult
d. All of the above
Answer. A

 

Question. A fraudulent process that extracts money from an ignorant person is called
a. Spamming
b. Phishing
c. Bullying
d. None of these
Answer. B

Question. In FOSS, source code is hidden from
a. All users
b. Purchaser
c. Only the vendor
d. In FOSS source code is not hidden.
Answer. D

Question. Which among the following are good preventive measures against health hazards of technology use?
a. Periodic walks between long usage of devices
b. Using screen guards
c. No overuse of technology
d. All of the above
Answer. D

Question. Which of the following are medium of cyber trolling?
a. Facebook
b. Twitter
c. You tube video comments
d. All of these
Answer. D

Question. Sneha found that her picture posted in a social networking site has been merged with an unknown person and published. What should she do?
a. Ignore the instance
b. Report it to the cyber crime cell
c. Try to delete the posts
d. Enjoy the instance.
Answer. B

Question. Any information created by us that exists in digital form is called
a. Digital footprint
b. Cyber print
c. Internet print
d. Web finger print
Answer. A

Question. Which among the following is not a possible activity of a virus?
a. Deleting data files
b. Sending bulk mails
c. Deleting system files
d. None of these
Answer. B

Question. Mr. Raghavendra found that after posting some images in social media , some people were writing negative messages. This is an instance of
a. Phishing
b. Trolling
c. Hacking
d. Spamming
Answer. B

Question. Using someone’s Twitter handle to post something will be termed as
a. Fraud
b. Identity theft
c. Online stealing
d. Phishing
Answer. B

Question. Which of the following are not ways of data protection?
a. Using password
b. Using User IDs
c. Using encryption techniques.
d. None of these
Answer. D

Question. Jack is a good programmer and wants to contribute to the features of one of the softwares , that he uses. What kind of software he can contribute to?
a. Proprietary software
b. Free software
c. Open source software
d. Shareware
Answer. C

Question. Which of the following are health disorders caused by overuse of technology?
a. DNA damage
b. Lung cancer
c. Damage to heart liver and spleen
d. All of the above
Answer. D

Question. Read the statements given below and identify the right option about cyber crime.
Statement A Cyber crime involves the use of computer and network in attacking computers and networks as well.
Statement B Cyber bullying is an act of cyber law.
a. Statement A is correct.
b. Statement B is correct.
c. Statement A is correct but Statement B is incorrect.
d. Statement B is correct but Statement A is incorrect.
Answer. C

Question. The term Intellectual property rights cover
a. Trademark
b. Copyright
c. Patents
d. All of these
Answer. D

Question. Anil never writes a subject line in his mails . This is an instance of :
a. Spamming
b. Phishing
c. Non obeying of E-mail etiquettes
d. Trolling
Answer. C

Question. A ___________ is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.
a. Cyber crime
b. Computer virus
c. Program
d. Software
Answer. B

Question. Which of the following activity is an example of leaving Active digital footprints?
a. Surfing internet
b. Visiting a website
c. Sending an email to a friend
d. None of the above
Answer. C

Question. You are planning to go for a vacation. You surfed the internet to get answers for following queries.
a. Places to visit
b. Availability of air tickets and fares
c. Best hotel deals
d. All of these
Answer. D

Question. Legal term to describe the rights of a creator of original creative or artistic work is called……..
a. Copyright
b. Copyleft
c. GPL
d. BSD
Answer. A

Question. Intellectual Property is legally protected through ___
a. copyright
b. patent
c. registered trademark
d. All of the above
Answer. D

Question. _____________ includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands.
a. Trademark
b. Patent
c. Copyright
d. None of the above
Answer. A

Question. Gaining unauthorised access to a network or computer aur digital files with malicious intentions, is called_________
a. Cracking
b. Hacking
c. Banging
d. Phishing
Answer. B

Question. Legal term to describe the rights of a creator of original creative or artistic work is called _____
a. Copyright
b. Copyleft
c. GPL
d. None of these
Answer. A

Question. OSS stands for
a. Open system security
b. Open system source
c. Open software and security
d. Open source software
Answer. D

Question. A software that can be freely accessed and modified is called
a. synchronous software
b. package software
c. open source software
d. middleware.
Answer. C


CASE STUDY BASED QUESTIONS

Question. Prathyush has to prepare a project on “Cyber Jaagrookta Diwas”.He decides to get information from the Internet. He downloads three web pages (webpage1, webpage 2, webpage 3) containing information on the given topic.
1. He read a paragraph from webpage 1 and rephrased it in his own words. He finally pasted the rephrased paragraph in his project. And he put a citation about the website he visited and its web address also.
2. He downloaded three images of from webpage 2. He made a collage for his project using these images.
3. He also downloaded an icon from web page 3 and pasted it on the front page of his project report.

Question. Step1 is an act of……………
a. Plagiarism
b. copyright infringement
c. Intellectual Property right
d. None of the above
Answer. D

Question. Step 2 is an act of _______.
a. plagiarism
b. copyright infringement
c. Intellectual Property right
d. Digital Footprints
Answer. A

Question. Step 3 is an act of ________.
a. Plagiarism
b. Paraphrasing
c. copyright infringement
d. Intellectual Property right
Answer. C

Question. ______is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing a website.
a. Hyperlinks
b. Web pages
c. Browsers
d. Cookies
Answer. D

Question. The process of getting web pages, images and files from a web server to local computer is called
a. FTP
b. Uploading
c. Downloading
d. Remote access
Answer. C


SHORT ANSWER QUESTIONS

Question. List any two health hazards related to excessive use of Technology
Answer. The continuous use of devices like smartphones, computer desktop, laptops, head phones etc cause a lot of health hazards if not addressed. These are:
A. Impact on bones and joints: wrong posture or long hours of sitting in an uncomfortable position can cause muscle or bone injury.
B. Impact on hearing: using headphones or earphones for a prolonged time and on high volume can cause hearing problems and in severe cases hearing impairments.
C. Impact on eyes: This is the most common form of health hazard as prolonged hours of screen time can lead to extreme strain in the eyes.
D. Sleep problem: Bright light from computer devices block a hormone called melatonin which helps us sleep. Thus we can experience sleep disorders leading to short sleep cycles.

Question. Priyanka is using her internet connection to book a flight ticket. This is a classic example of leaving a trail of web activities carried by her. What do we call this type of activity? What is the risk involved by such kind of activity?
Answer.  call this type of activity as Digital Footprints
Risk involved : It includes websites we visit emails we send, and any information we submit online, etc., along with the computer’s IP address, location, and other device specific details.Such data could be used for targeted advertisement or could also be misused or exploited.

Question. What We do you mean by Identity theft? Explain with the help of an example.
Answer.  Identity theft is the crime of obtaining the personal or financial information of another person for the sole purpose of assuming that person's name or identity to make transactions or use it to post inappropriate remarks , comments etc.
Example:
Alex likes to do his homework late at night. He uses the Internet a lot and also sends useful data through email to many of his friends. One Day he forgot to sign out from his email account. In the morning, his twin brother, Flex started using the computer. He used Flex’s email account to send inappropriate messages to his contacts

Question. What do you understand by Net Ettiquetes? Explain any two such ettiquetes.
Answer. Net Ettiquets refers to the proper manners and behaviour we need to exhibit while being online.
These include :
1. No copyright violation: we should not use copyrighted materials without the permission of the creator or owner. We should give proper credit to owners/creators of open source content when using them.
2. Avoid cyber bullying: Avoid any insulting, degradingor intimidating online behaviour like repeated posting of rumours, giving threats online,posting the victim’s personal information, or comments aimed to publicly ridicule a victim.

Question. According to a survey, one of the major asian country generates approximately about 2 million tonnes of electronic waste per year. Only 1.5 % of the total e-waste gets recycled.
Suggest some methods to manage e-waste .
Answer. Buy environmentally friendly electronics
Donate used electronics to social programs
Reuse , refurbish electronics
Recycling e-waste

 

More Worksheets for Class 12 Informatics Practices
CBSE Class 12 Informatics Practices Commonly Used Libraries Worksheet
CBSE Class 12 Informatics Practices Computer Networking Worksheet
CBSE Class 12 Informatics Practices Computer Xml Extensible Markup Language Worksheet
CBSE Class 12 Informatics Practices Concept Of Inheritance Worksheet
CBSE Class 12 Informatics Practices Database Connectivity To MySQL Worksheet
CBSE Class 12 Informatics Practices Database Fundamentals MySQL Revision Tour Worksheet
CBSE Class 12 Informatics Practices Database Transactions Worksheet
CBSE Class 12 Informatics Practices File Handling Worksheet
CBSE Class 12 Informatics Practices Html Basic Html Elements Worksheet
CBSE Class 12 Informatics Practices Html Lists Tables And Forms Worksheet
CBSE Class 12 Informatics Practices Introducing Classes And Objects Worksheet
CBSE Class 12 Informatics Practices It Applications Worksheet
CBSE Class 12 Informatics Practices Java Application Worksheet
CBSE Class 12 Informatics Practices Java Gui Programming Revision Worksheet
CBSE Class 12 Informatics Practices Java Gui Programming Worksheet
CBSE Class 12 Informatics Practices More On Sql Grouping Records And Table Joins Worksheet
CBSE Class 12 Informatics Practices MySQL Worksheet
CBSE Class 12 Informatics Practices Networking Worksheet
CBSE Class 12 Informatics Practices Open Source Concepts Worksheet
CBSE Class 12 Informatics Practices Sure Shot Questions Worksheet
CBSE Class 12 Informatics Practices Sure Shot Questions Worksheet Set A
CBSE Class 12 Informatics Practices Table And Integrity Constraints Worksheet
CBSE Class 12 Informatics Practices Web Application Development Worksheet

Worksheet for CBSE Informatics Practices Class 12 Chapter 6 Societal Impacts

We hope students liked the above worksheet for Chapter 6 Societal Impacts designed as per the latest syllabus for Class 12 Informatics Practices released by CBSE. Students of Class 12 should download in Pdf format and practice the questions and solutions given in the above worksheet for Class 12 Informatics Practices on a daily basis. All the latest worksheets with answers have been developed for Informatics Practices by referring to the most important and regularly asked topics that the students should learn and practice to get better scores in their class tests and examinations. Expert teachers of studiestoday have referred to the NCERT book for Class 12 Informatics Practices to develop the Informatics Practices Class 12 worksheet. After solving the questions given in the worksheet which have been developed as per the latest course books also refer to the NCERT solutions for Class 12 Informatics Practices designed by our teachers. We have also provided a lot of MCQ questions for Class 12 Informatics Practices in the worksheet so that you can solve questions relating to all topics given in each chapter.

Where can I download latest CBSE Printable worksheets for Class 12 Informatics Practices Chapter 6 Societal Impacts

You can download the CBSE Printable worksheets for Class 12 Informatics Practices Chapter 6 Societal Impacts for latest session from StudiesToday.com

Is there any charge for the Printable worksheets for Class 12 Informatics Practices Chapter 6 Societal Impacts

There is no charge for the Printable worksheets for Class 12 CBSE Informatics Practices Chapter 6 Societal Impacts you can download everything free

Are there any websites that offer free test sheets for Class 12 Informatics Practices Chapter 6 Societal Impacts

Yes, studiestoday.com provides all latest NCERT Chapter 6 Societal Impacts Class 12 Informatics Practices test sheets with answers based on the latest books for the current academic session

What topics are covered in CBSE Class 12 Informatics Practices Chapter 6 Societal Impacts worksheets?

CBSE Class 12 Informatics Practices Chapter 6 Societal Impacts worksheets cover all topics as per the latest syllabus for current academic year.

How can I use worksheets to improve my Class 12 Informatics Practices scores?

Regular practice with Class 12 Informatics Practices worksheets can help you understand all concepts better, you can identify weak areas, and improve your speed and accuracy.