Page 302 - Informatics_Practices_Fliipbook_Class12
P. 302

3.  Which of the following is not true about digital footprints?
              a.  A trail of personal data that one leaves behind while using the Internet
              b.  The companies can collect your browsing data without your knowledge or approval.
              c.  The information that you leave willingly is known as an active digital footprint
              d.  These are always stored on your device.
           4.  Using the _____________ button, the users can give their approval to the content posted on Facebook.
              a.  Post                 b. Like                c. Tag                 d. Accept
           5.  What is the maximum number of characters that an X post can have?
              a.  100                  b. 10000               c. 1000                d. 200
           6.  Which of the following is True about WhatsApp?
              a.  It does not allow video calls
              b.  It allows forming of groups of up to 1024 members
              c.  The admins may add a member but they cannot remove any member from a group.
              d.  It does not have an in-built end-to-end encryption mechanism
           7.  Which of the following is not considered good social media etiquette?
              a.  Responding to messages.                     b. Respecting the privacy of all users.
              c.  Texting in capital letters                  d. Tagging a friend after his or her approval
           8.  Which of the following cyber attack refers to unauthorized access to private information?
              a.  Interruption         b. Fabrication         c. Modification        d. Interception
           9.  Jonas has received an email from an unknown source that he has won a car in a lucky draw. The email also states that he
              should provide them with his bank details to check his identity. Which type of cyber threat is Jonas facing?
              a.  Cyber Bullying       b. Hacking             c. Phishing            d. Eavesdropping
          10.  This is unwanted junk mail sent by companies for advertisement purposes. What is this?
              a.  Spam                 b. Adware              c. Spyware             d. Ad-ons
          11.  Which of the following is NOT a malware?
              a.  Virus                b. Worm                c. Antivirus           d. Trojan Horse
          12.  Which of the following is an example of a boot sector virus?
              a.  Romeo and Juliet virus    b. Michelangelo virus   c. Melissa Virus   d. Code Red
          13.  Which of the following malware appears desirable and useful but actually harms the system?
              a.  Virus                b. Worm                c. Trojan Horse        d. Adware
          14.  Shrikanth is not able to access his sensitive and private data on his online database. He received a mail threatening to
              publish the data unless he pays 1 billion dollars in bitcoin. Which type of malware attack is Rishit facing?
              a.  Ransomware           b. Adware              c. Spyware             d. Trojan

          15.  A firewall is typically a ________________.
              a.  Hardware             b. Software            c. Combination of a and b  d. Neither a nor b

        B.  State whether the following statements are True or False:
           1.  The users can post their comments on videos uploaded on YouTube.                         _________
           2.  The information you leave willingly on the Internet is a passive digital footprint.      _________
           3.  The people who follow you on X will be able to see your post in their feeds.             _________
           4.  It is not possible to create private accounts on X.                                      _________
           5.  We should not accept friend requests from unknown people without verifying their profiles.   _________
           6.  Secretly listening to the conversation of others without their knowledge is an example of eavesdropping.   _________
           7.  The term hacker is always used to refer to unethical hackers.                            _________
           8.  A worm is a malicious program that cannot replicate itself.                              _________
           9.  Ransomware may be distributed through phishing emails.                                   _________


          288  Touchpad Informatics Practices-XII
   297   298   299   300   301   302   303   304   305   306   307