Edzy
AI TutorResourcesToolsCompareBuy
SearchDownload AppLogin
Edzy

Edzy for Classes 6-12

Edzy is a personal AI tutor for CBSE and State Board students, with curriculum-aligned guidance, practice, revision, and study plans that adapt to each learner.

  • Email: always@edzy.ai
  • Phone: +91 96256 68472
  • WhatsApp: +91 96256 68472
  • Address: Sector 63, Gurgaon, Haryana

Follow Edzy

Browse by Class

  • CBSE Class 6
  • CBSE Class 7
  • CBSE Class 8
  • CBSE Class 9
  • CBSE Class 10
  • CBSE Class 11
  • CBSE Class 12
Explore the CBSE resource hub

Explore Edzy

  • Study Resources
  • Free Study Tools
  • Best Apps for Board Exams
  • Edzy vs ChatGPT
  • About Us
  • Why We Built Edzy
  • Blog
  • CBSE AI Tutor

Support & Legal

  • Help & FAQs
  • Accessibility
  • Privacy Policy
  • Terms & Conditions
  • Refund Policy
  • Cookie Policy
  • Site Directory

© 2026 Edzy. All rights reserved.

Curriculum-aligned learning paths for students in Classes 6-12.

CBSE
Class 11
Computer Science
Computer Science
Societal Impact

Question Bank

Practice Hub

Question Bank: Societal Impact

This chapter focuses on the influence of digital technology on society and our daily lives, highlighting both benefits and challenges.

Structured practice
Question Practice

Practice chapter questions in a cleaner, exam-ready flow

Start with curated question sets, move into full module views when needed, and keep discovering related practice without losing your place in the chapter.

Question Bank - Societal Impact

View all (104)
Q1.

What is a primary benefit of digital technologies in communication?

Single Answer MCQ
Q-00068132
View explanation
Q2.

Which of the following describes an active digital footprint?

Single Answer MCQ
Q-00068133
View explanation
Q3.

Why is it important to be aware of your digital footprint?

Single Answer MCQ
Q-00068134
View explanation
Q4.

What can be a consequence of having a large digital footprint?

Single Answer MCQ
Q-00068135
View explanation
Q5.

What device commonly contributes to our digital footprints?

Single Answer MCQ
Q-00068136
View explanation
Q6.

What is the main difference between active and passive digital footprints?

Single Answer MCQ
Q-00068137
View explanation
Q7.

How can digital technologies create a more productive work environment?

Single Answer MCQ
Q-00068138
View explanation
Q8.

What role does high-speed Internet play in digital technology usage?

Single Answer MCQ
Q-00068139
View explanation
Q9.

Which one of the following is a concern related to digital technologies?

Single Answer MCQ
Q-00068140
View explanation
Q10.

What does the term 'digital footprint' refer to?

Single Answer MCQ
Q-00068141
View explanation
Q11.

How might companies use digital footprints?

Single Answer MCQ
Q-00068142
View explanation
Q12.

Why might a digital footprint remain even after attempting to delete it?

Single Answer MCQ
Q-00068143
View explanation
Q13.

Which practice can help ensure a productive digital environment?

Single Answer MCQ
Q-00068144
View explanation
Q14.

What term is used to describe the trail of data we leave behind while using the Internet?

Single Answer MCQ
Q-00068162
View explanation
Q15.

Which of the following best defines a netizen?

Single Answer MCQ
Q-00068163
View explanation
Q16.

What type of digital footprint includes data we intentionally submit online?

Single Answer MCQ
Q-00068164
View explanation
Q17.

What is a key responsibility of a good netizen?

Single Answer MCQ
Q-00068165
View explanation
Q18.

What type of bullying involves repeated harmful online behavior?

Single Answer MCQ
Q-00068166
View explanation
Q19.

Which of the following is NOT a net etiquette?

Single Answer MCQ
Q-00068167
View explanation
Q20.

What is essential to do before sharing information online?

Single Answer MCQ
Q-00068168
View explanation
Q21.

Which of the following rights should a good netizen respect?

Single Answer MCQ
Q-00068169
View explanation
Q22.

What should you do if you encounter a troll online?

Single Answer MCQ
Q-00068170
View explanation
Q23.

How can individuals create a positive digital footprint?

Single Answer MCQ
Q-00068171
View explanation
Q24.

Which platform feature can help protect personal data while online?

Single Answer MCQ
Q-00068172
View explanation
Q25.

What is an ethical reason to share information online?

Single Answer MCQ
Q-00068173
View explanation
Q26.

Why is it important to respect diversity in online forums?

Single Answer MCQ
Q-00068174
View explanation
Q27.

What is a common misconception about online behavior?

Single Answer MCQ
Q-00068175
View explanation
Q28.

What is a responsible action if you witness online abuse?

Single Answer MCQ
Q-00068176
View explanation
Q29.

What is a digital footprint?

Single Answer MCQ
Q-00068177
View explanation
Q30.

Which of the following is an example of an active digital footprint?

Single Answer MCQ
Q-00068178
View explanation
Q31.

What is a passive digital footprint?

Single Answer MCQ
Q-00068179
View explanation
Q32.

Why is it important to be aware of your digital footprint?

Single Answer MCQ
Q-00068180
View explanation
Q33.

Which of the following best describes a characteristic of digital footprints?

Single Answer MCQ
Q-00068181
View explanation
Q34.

How can digital footprints be used for targeted advertising?

Single Answer MCQ
Q-00068182
View explanation
Q35.

Which action increases your digital footprint the most?

Single Answer MCQ
Q-00068183
View explanation
Q36.

What is one key measure to protect your digital footprint?

Single Answer MCQ
Q-00068184
View explanation
Q37.

Which type of digital footprint is more difficult to manage?

Single Answer MCQ
Q-00068185
View explanation
Q38.

What is an example of how digital footprints can impact employment?

Single Answer MCQ
Q-00068186
View explanation
Q39.

Which aspect of digital footprints can lead to privacy violations?

Single Answer MCQ
Q-00068187
View explanation
Q40.

Why is incognito mode in browsers not a complete solution for digital privacy?

Single Answer MCQ
Q-00068188
View explanation
Q41.

What should you consider before sharing content online?

Single Answer MCQ
Q-00068189
View explanation
Q42.

Which type of data is likely to remain even after deleting online accounts?

Single Answer MCQ
Q-00068190
View explanation
Q43.

What is one ethical dilemma associated with digital footprints?

Single Answer MCQ
Q-00068191
View explanation
Q44.

What defines ransomware in the context of cyber crime?

Single Answer MCQ
Q-00068192
View explanation
Q45.

Which of the following is a common method to distribute ransomware?

Single Answer MCQ
Q-00068193
View explanation
Q46.

What is an effective strategy to prevent ransomware attacks?

Single Answer MCQ
Q-00068194
View explanation
Q47.

A victim of cyber crime experiences unauthorized access to their personal information. What type of cyber crime is this?

Single Answer MCQ
Q-00068195
View explanation
Q48.

Which of the following is NOT a recommended practice to combat cyber crime?

Single Answer MCQ
Q-00068196
View explanation
Q49.

How does phishing differ from other types of cyber crime?

Single Answer MCQ
Q-00068197
View explanation
Q50.

What role does an antivirus software play in cyber crime prevention?

Single Answer MCQ
Q-00068198
View explanation
Q51.

Which of the following could be considered a warning sign of cyber bullying?

Single Answer MCQ
Q-00068199
View explanation
Q52.

What is the primary focus of data protection in the digital age?

Single Answer MCQ
Q-00068200
View explanation
Q53.

What is often the goal of a DDoS attack?

Single Answer MCQ
Q-00068201
View explanation
Q54.

Which of the following is considered sensitive data?

Single Answer MCQ
Q-00068202
View explanation
Q55.

Which act provides legal support against cyber crimes in India?

Single Answer MCQ
Q-00068203
View explanation
Q56.

What is an active digital footprint?

Single Answer MCQ
Q-00068204
View explanation
Q57.

In what scenario would someone likely encounter phishing?

Single Answer MCQ
Q-00068205
View explanation
Q58.

Which method is NOT commonly used to protect sensitive data?

Single Answer MCQ
Q-00068206
View explanation
Q59.

What is a common strategy to identify whether a URL is secure?

Single Answer MCQ
Q-00068207
View explanation
Q60.

Why is it important to implement data protection policies?

Single Answer MCQ
Q-00068208
View explanation
Q61.

Why should strong passwords be used for web logins?

Single Answer MCQ
Q-00068209
View explanation
Q62.

What can be used to judge a user's online behavior based on their digital footprint?

Single Answer MCQ
Q-00068210
View explanation
Q63.

How does one of the following NOT help in mitigating cyber crimes?

Single Answer MCQ
Q-00068211
View explanation
Q64.

Which of the following is a common method to enhance data privacy?

Single Answer MCQ
Q-00068212
View explanation
Q65.

Which of the following is a potential consequence of leaking sensitive personal information online?

Single Answer MCQ
Q-00068213
View explanation
Q66.

What is the role of encryption in data protection?

Single Answer MCQ
Q-00068214
View explanation
Q67.

What should users be cautious about when they upload sensitive files online?

Single Answer MCQ
Q-00068215
View explanation
Q68.

Which of the following best describes passive digital footprints?

Single Answer MCQ
Q-00068216
View explanation
Q69.

What type of data is typically protected under Intellectual Property Rights (IPR)?

Single Answer MCQ
Q-00068217
View explanation
Q70.

Which of the following is NOT a component of a data protection policy?

Single Answer MCQ
Q-00068218
View explanation
Q71.

Which of the following describes the implementation of data protection measures?

Single Answer MCQ
Q-00068219
View explanation
Q72.

What is a potential risk of not managing digital footprints?

Single Answer MCQ
Q-00068220
View explanation
Q73.

Which measure is most effective in preventing unauthorized access to data?

Single Answer MCQ
Q-00068221
View explanation
Q74.

Which of the following options does NOT contribute to data protection?

Single Answer MCQ
Q-00068222
View explanation
Q75.

What is a common health issue associated with prolonged screen time?

Single Answer MCQ
Q-00068237
View explanation
Q76.

Which term refers to the safe arrangement of workspaces to reduce health risks?

Single Answer MCQ
Q-00068238
View explanation
Q77.

What is a common psychological effect of excessive Internet use?

Single Answer MCQ
Q-00068239
View explanation
Q78.

Which of the following can help reduce eye strain from screens?

Single Answer MCQ
Q-00068240
View explanation
Q79.

What should be the angle of the knees when sitting for prolonged periods?

Single Answer MCQ
Q-00068241
View explanation
Q80.

What is the recommended distance between the user's eyes and the computer screen?

Single Answer MCQ
Q-00068242
View explanation
Q81.

Using improper posture while using digital devices can lead to which condition?

Single Answer MCQ
Q-00068243
View explanation
Q82.

What device can help support lower back health while sitting?

Single Answer MCQ
Q-00068244
View explanation
Q83.

Which of the following is NOT an effect of excessive gaming?

Single Answer MCQ
Q-00068245
View explanation
Q84.

What is a key method to prevent addiction to digital technologies?

Single Answer MCQ
Q-00068246
View explanation
Q85.

How can lighting affect the comfort of digital device usage?

Single Answer MCQ
Q-00068247
View explanation
Q86.

What is the psychological impact of excessive screen time on children?

Single Answer MCQ
Q-00068248
View explanation
Q87.

Maintaining proper wrist positioning while typing helps prevent which issue?

Single Answer MCQ
Q-00068249
View explanation
Q88.

What is the primary reason for experiencing fatigue from prolonged screen use?

Single Answer MCQ
Q-00068250
View explanation
Q89.

The term used for feeling anxious when away from digital devices is known as what?

Single Answer MCQ
Q-00068251
View explanation
Q90.

What is the primary purpose of the Indian Information Technology Act, 2000?

Single Answer MCQ
Q-00068266
View explanation
Q91.

What does the Cyber Appellate Tribunal do?

Single Answer MCQ
Q-00068267
View explanation
Q92.

Which of the following is a component of the IT Act concerning electronic governance?

Single Answer MCQ
Q-00068269
View explanation
Q93.

Under the IT Act, which activity is directly penalized?

Single Answer MCQ
Q-00068270
View explanation
Q94.

Which section of the IT Act deals with the regulation of digital signatures?

Single Answer MCQ
Q-00068271
View explanation
Q95.

What is a significant challenge addressed by the IT Act?

Single Answer MCQ
Q-00068272
View explanation
Q96.

What distinguishes a digital signature from a handwritten signature?

Single Answer MCQ
Q-00068273
View explanation
Q97.

Which of the following is a valid concern addressed by the IT Act?

Single Answer MCQ
Q-00068274
View explanation
Q98.

Which of the following penalties can be imposed under the IT Act?

Single Answer MCQ
Q-00068275
View explanation
Q99.

What role do Cyber Cells in police stations serve?

Single Answer MCQ
Q-00068276
View explanation
Q100.

What aspect does Section 66 of the IT Act address?

Single Answer MCQ
Q-00068277
View explanation
Q101.

Which of the following actions requires consent under the IT Act?

Single Answer MCQ
Q-00068278
View explanation
Q102.

What should an online transaction ideally occur on?

Single Answer MCQ
Q-00068279
View explanation
Q103.

How frequently should a user change their wireless network password?

Single Answer MCQ
Q-00068280
View explanation
Q104.

What type of technology is essential for digital signatures?

Single Answer MCQ
Q-00068281
View explanation
Learn Better On The App
Free learning flow

Learn Without Limits

Access NCERT content for free with a cleaner, faster way to revise every day.

Chapter summaries
Revision tools

Faster access to practice, revision, and daily study flow.

Edzy mobile app preview