JavaScript isn't enabled in your browser, so this file can't be opened. Enable and reload.
Plus Two Computer Science
Chapter 12 : ICT and Society
Sign in to Google
to save your progress.
Learn more
* Indicates required question
Student Name
*
Your answer
School name
*
Your answer
1. ______ is the application of ICT for delivering Government services to citizens
*
1 point
e-Governance
e-Business
e-Learning
e-Banking
2. Which is not an infrastructure of e-Governance ?
*
1 point
State Data Centre
Kerala State Wide Area Network (KSWAN)
Electronic Payment System (EPS)
Common Service Centres (CSC)
3.The interaction between the government and the employees is called
*
1 point
Government to Government (G2G)
Government to Business (G2B)
Government to Employees (G2E)
Government to Citizens (G2C)
4. ____ is a system of financial exchange between buyers and sellers in an online environment
*
1 point
e-Business
Electronic Payment System (EPS)
e-Banking
e-Governance
5. ___ is an example of Common Service Centres.
*
1 point
internet cafe
amazon.com
Education channels
Akshaya centres
6.________ protects patents to inventions,trademarks, industrial designs and geographical indications
*
1 point
Copyright
Industrial property
Infringement
None of these
7. _______is a virtual environment created by computer systems connected to the Internet
*
1 point
Web Server
Intellectual Property Right
Cyber Crimes
Cyber space
8.Unauthorised use of intellectual property rights is called
*
1 point
Copyright
Infringement
Industrial property
Geographical indications
9. When someone uses another person's name, credit card number, etc. without their permission is called
*
1 point
Identity theft
Harassment
Impersonation and cheating
Violation of privacy
10. Which is Cyber crimes against property ?
*
1 point
Website defacement
Attacks against e-governance websites
Cyber terrorism
Credit card fraud
11.Cyber terrorism is a_______ type of cyber crime .
*
1 point
Cyber crimes against government
Cyber crimes against individuals
Cyber crimes against property
None of these
12. Criminal activity using computer, mobile phone and Internet is termed as __________.
*
1 point
Cyber space
Cyber ethics
Cyber Crimes
Infringement
13. Signs used on goods that have a specific geographical origin is _____
*
1 point
Patents
Trademark
Industrial designs
Geographical indications
14. _________ is the excessive enthusiasm for acquiring knowledge
*
1 point
Infomania
Cyber Forensics
Cyber Crimes
Infringement
15. The year in which IT Act came into existence in India is_________.
*
1 point
2008
2005
2000
2003
16. The use of electronic media and ICT in education is called
1 point
e-Business
e-Learning
Online chat
e-Text
Clear selection
17. ____is a backbone of the State Information Infrastructure (SII)
1 point
Common Service Centres (CSC)
State Data Centre
Kerala State Wide Area Network (KSWAN)
None of these
Clear selection
18. What are the benefits of e-Governance?
1 point
strengthens the democracy
saves time and money
leads to automation of government services
All of these
Clear selection
19.What is the disadvantages of e-Business ?
1 point
overcomes geographical limitations
e-Business reduces the operational cost
customers don't have this 'touch and feel'
minimises travel time and cost
Clear selection
20 Aadhaar is a _____ digit individual identification number
1 point
12
10
16
8
Clear selection
Type your valuable Suggestion about this Quiz
Your answer
After Selecting answer of all question,press "SUBMIT" button and press "View Score" Button to know your Score and correct answers
Submit
Clear form
Never submit passwords through Google Forms.
This content is neither created nor endorsed by Google.
Report Abuse
-
Terms of Service
-
Privacy Policy
Forms