Page 306 - Informatics_Practices_Fliipbook_Class12
P. 306

2.  Murugan has created a logo for his firm that manufactures electrical equipment. He got it registered with CGPDTM. His
              rival has used the same logo with some minor differences for his new firm. Can Murugan sue his friend for trademark
              infringement?
              a.  Yes
              b.  No
              c.  Can't say
              d.  He can sue only if both companies manufacture electrical equipment

           3.  Which of the following will NOT be considered plagiarism?
              a.  Submitting someone else's work as your own
              b.  Paraphrasing the essence of the technical contribution while giving credit to the original author
              c.  Copying media images from other websites to your websites.
              d.  Composing a piece of music that borrows heavily from another composition.
           4.  Which of the following statements is not True about Open Data?
              a.  Anyone can access it at any time               b. Freely available to download
              c.  Promotes transparency between citizens and government  d. The data can never be redistributed
           5.  Which of the following is the correct expansion of EULA?
              a.  End-User License Agreement                     b. Extra-Use License Agreement
              c.  End-User License of Apache                     d. Extra-User License of Apache

           6.  Which of the following is False about a Proprietary licence?
              a.  Users will be able to use the software, but they will not be able to modify it
              b.  Also known as a closed source licence
              c.  Cannot access the source code
              d.  Allows the user to distribute the modified version of the software
           7.  Which of the following acts is NOT considered a cybercrime?
              a.  Sending spam emails to uninterested recipients   b. Defaming someone using the Internet
              c.  Stealing a notebook from the computer lab      d. Stealing someone's personal information through phishing

           8.  Which of the following is not the aim of e-waste management?
              a.  Reduce               b. Refuse              c. Recycle             d. Reuse

           9.  Which of the following methods can be used for e-waste disposal?
              a.  Incineration         b. Throwing in rivers   c. Incarnation        d. Breaking into pieces
          10.  Which of the following tools can be used for visually impaired students in the school?
              a.  QWERTY keyboard      b. Gmail               c. Standard scanner    d. Google Assistant
        B.  State whether the following statements are True or False:
           1.  A trademark can be obtained only by a business organization.                             _________
           2.  A software license states the rights of the developer.                                   _________
           3.  Source code is available for software that has an open-source license.                   _________
           4.  Cybercrime is an unlawful act when the computer is used as a tool but not a target.      _________
           5.  The websites that use HTTP are safer than those that use HTTPS.                          _________
           6.  One should agree to accept cookies for all websites.                                     _________
           7.  Girls in our society are less  encouraged to take computer science as a subject.         _________
           8.  Cookies are stored by a website content for long-run purposes.                           _________
           9.  Patent is granted to the inventor for a fixed period.                                    _________
          10.  Telegram is a free chat software with no restrictions on the media size to be exchanged.   _________
        C.  Fill in the blanks.
           1.  A ____________ is a malware that appears desirable and useful but harms the system.
           2.  A cyberattack in which a machine or network resource is rendered unavailable either temporarily or permanently to its
              intended users is called ____________.

          292  Touchpad Informatics Practices-XII
   301   302   303   304   305   306   307   308   309   310   311