
SOCIETAL IMPACT(2021-22)
Authored by Shashvatraj Chauhan
Computers
12th Grade
Used 70+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A standard security protocol that establishes encrypted links between a web server and a browser is called ………….
(i) Online safety technology
(ii) SDT technology
(iii) Web encryption technology
(iv) Secure Sockets Layer technology
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Using someone else’s twitter handle to post something will be termed as:
(i) Fraud
(ii) Identity theft
(iii) Online streaming
(iv) Violation
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Intellectual Property Rights protect the use of information and ideas that are of:
(i) Ethical values
(ii) Commercial values
(iii) Both (i) & (ii)
(iv) None of these
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Credit card fraud may include:
(i) Stealing of credit card
(ii) Unauthorized and illegal use of credit card.
(iii) Stealing information
(iii) Stealing information
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The term "Intellectual Property Rights" covers:
(i) Copyrights
(ii) Trademarks
(iii) Patents
(iv) All of the above
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following is a/an open-source software?
(i) Microsoft Windows
(ii) Adobe Photoshop
(iii) MySQL
(iv) MS PowerPoint
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
“Rice Bucket Challenge” is an example of:
(i) Crowd Sourcing
(ii) Online Campaigns
(iii) Smart Mobs
(iv) None of these
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?