Sixth Grade Stars Final Assesmant

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Tuc14016
T
Tuc14016
Community Contributor
Quizzes Created: 1 | Total Attempts: 81
Questions: 29 | Attempts: 81

SettingsSettingsSettings
Sixth Grade Stars Final Assesmant - Quiz

This is the Final assessment for the program.


Questions and Answers
  • 1. 

    You want to find out about a lawn mower repair. Which browser search result most likely has this information?

    • A.

      Lawn Goat (let your hungry goats mow your grass)

    • B.

      Lawn Mower Castle (the biggest online catalog for new lawn mowers)

    • C.

      Yard Maniacs (full repair service for broken lawn mowers)

    • D.

      Concrete Lawn (replace your grass with cement and put your lawn mower away forever)

    Correct Answer
    C. Yard Maniacs (full repair service for broken lawn mowers)
    Explanation
    The browser search result that most likely has information about lawn mower repair is "Yard Maniacs (full repair service for broken lawn mowers)". This is because the description specifically mentions a full repair service for broken lawn mowers, indicating that they have the expertise and resources to repair lawn mowers. The other options, such as "Lawn Goat" and "Lawn Mower Castle", do not mention repair services, while "Concrete Lawn" suggests an alternative to grass and lawn mowers.

    Rate this question:

  • 2. 

    Your work group is using the internet to share documents. A member tells you she has uploaded a document. What does that mean she did to the groups document?

    • A.

      Changed it

    • B.

      Posted it

    • C.

      Removed it

    • D.

      Destroyed it

    Correct Answer
    B. Posted it
    Explanation
    The member "posted" the document, which means that she uploaded it to the internet for the group to access and view.

    Rate this question:

  • 3. 

    How might more use of digital cameras be a bad thing?

    • A.

      Less Crime

    • B.

      Less cost to produce pictures

    • C.

      Less Privacy

    • D.

      Less File Sharing between individuals

    Correct Answer
    C. Less Privacy
    Explanation
    More use of digital cameras can be a bad thing because it leads to less privacy. With the increasing use of digital cameras, it becomes easier for people to capture and share images without the knowledge or consent of others. This can result in a violation of personal privacy, as individuals may find themselves being photographed or recorded without their consent in various public and private settings. This lack of privacy can lead to discomfort, intrusion, and potential misuse of personal information.

    Rate this question:

  • 4. 

    Which of these would be a hard password for someone to guess?

    • A.

      A made-up word

    • B.

      Your first name

    • C.

      A single letter repeated

    • D.

      Your phone number

    Correct Answer
    A. A made-up word
    Explanation
    A made-up word would be a hard password for someone to guess because it is not a commonly used word and does not have any personal association with the individual. It is unique and unpredictable, making it difficult for others to guess or crack through brute force methods.

    Rate this question:

  • 5. 

    What do you call a software program made to harm other software?

    • A.

      A Firewall

    • B.

      A Virus

    • C.

      A Hook

    • D.

      A Unix

    Correct Answer
    B. A Virus
    Explanation
    A virus is a software program specifically designed to harm other software. It is typically created with malicious intent and can cause damage to computer systems by corrupting or deleting files, stealing personal information, or disrupting normal system operations. Viruses can spread from one computer to another, often through infected files or email attachments, and can be difficult to detect and remove without the use of antivirus software.

    Rate this question:

  • 6. 

    What kind of website is MOST OFTEN  used as an internet journal of your thoughts or interests?

    • A.

      Mirror

    • B.

      Blog

    • C.

      Directory

    • D.

      Portal

    Correct Answer
    B. Blog
    Explanation
    A blog is the most commonly used website as an internet journal of thoughts or interests. A blog allows individuals to share their thoughts, opinions, and interests with a wider audience. It provides a platform for personal expression and can cover a wide range of topics such as travel, fashion, food, or even personal experiences. Blogs often include regular updates and allow readers to engage through comments and discussions.

    Rate this question:

  • 7. 

    When is it always legal to make copies of computer software?

    • A.

      If you have the permission from the company that owns it.

    • B.

      If you have a computer with a network connection.

    • C.

      If you are only going to use it yourself and not resell it.

    • D.

      If you are only going to use it for school projects.

    Correct Answer
    A. If you have the permission from the company that owns it.
    Explanation
    Making copies of computer software is only legal if you have permission from the company that owns it. This means that you have obtained explicit consent to duplicate the software. Having a computer with a network connection, using it for personal use without reselling, or using it for school projects do not guarantee the legality of making copies. The key factor is obtaining permission from the software company, as they hold the rights to their intellectual property.

    Rate this question:

  • 8. 

    Suppose you are writing a report for school. Which of these is OK?

    • A.

      Paste together paragraphs from several different websites to make your report.

    • B.

      Copy a website you like and hand it in as your report.

    • C.

      Search websites for a complete report to save as your own.

    • D.

      Cite websites in your report that agree with your ideas.

    Correct Answer
    D. Cite websites in your report that agree with your ideas.
    Explanation
    Citing websites in your report that agree with your ideas is the correct option. This means you are using the information from those websites to support your own thoughts and arguments. It is important to properly cite your sources to give credit to the original authors and to avoid plagiarism. By doing this, you are showing that you have done research and are using credible sources to back up your claims.

    Rate this question:

  • 9. 

    When would you use the Save command instead of Save As....?

    • A.

      When you want to save the file with a new name.

    • B.

      When you want to create a second copy of the file somewhere else.

    • C.

      When you want to overwrite the existing copy of the file

    • D.

      When you're not sure if you want to keep the changes you have made.

    Correct Answer
    C. When you want to overwrite the existing copy of the file
    Explanation
    When you want to overwrite the existing copy of the file, you would use the Save command instead of Save As. This means that you want to save the changes made to the file and replace the previous version with the updated one. Using Save As would create a new file with a different name, while Save updates the existing file.

    Rate this question:

  • 10. 

    What is an icon?

    • A.

      A file ending

    • B.

      A picture

    • C.

      A music player

    • D.

      A browser

    Correct Answer
    B. A picture
    Explanation
    An icon is a small graphical representation that is used to represent a file, program, or function on a computer system. Icons are typically small images or symbols that are visually intuitive and represent a specific action or object. They are commonly used on computer desktops, software interfaces, and mobile devices to provide a visual representation of an application or feature. Icons are designed to be easily recognizable and help users navigate and interact with digital systems more efficiently.

    Rate this question:

  • 11. 

    What does it mean if a document has copyright protection?

    • A.

      It is free of viruses.

    • B.

      It is a crime to copy it without permission.

    • C.

      It is safe to download it to your computer.

    • D.

      It is a read-only file computers cannot copy.

    Correct Answer
    B. It is a crime to copy it without permission.
    Explanation
    If a document has copyright protection, it means that copying it without permission is considered a crime. This indicates that the document is protected by legal rights, and anyone who copies or reproduces it without authorization can be held legally accountable. This protection ensures that the original creator or owner of the document has exclusive rights over its distribution, reproduction, and use, preventing others from using or profiting from their work without proper authorization.

    Rate this question:

  • 12. 

    Bill created a file on a school computer. His home computer can't open the file. What might be the problem?

    • A.

      His home computer doesn't use the same type of monitor.

    • B.

      His home computer doesn't use the same program.

    • C.

      His home computer doesn't use the same type of margin settings.

    • D.

      His home computer doesn't use the same fonts.

    Correct Answer
    B. His home computer doesn't use the same program.
    Explanation
    The problem might be that Bill's home computer doesn't use the same program as the school computer. Different programs have different file formats and compatibility issues can arise when trying to open files created in one program with a different program.

    Rate this question:

  • 13. 

    Which of these would be most unsafe to tell other people in a chat-room conversation?

    • A.

      What you got as a souvenir from a trip.

    • B.

      That you are not feeling well.

    • C.

      What your home phone number is.

    • D.

      That you have to take a break.

    Correct Answer
    C. What your home pHone number is.
    Explanation
    Sharing personal information such as your home phone number in a chat-room conversation can be highly unsafe. This information can be used by others for malicious purposes like identity theft, harassment, or unauthorized access to your personal accounts. It is important to prioritize online safety and avoid sharing sensitive information with strangers in order to protect your privacy and security.

    Rate this question:

  • 14. 

    Putting your writing online is called publishing. Which Statement is TRUE about information that is published online?

    • A.

      People must publish using their real names.

    • B.

      People can't find out what you published if you go back and delete it.

    • C.

      People are able to make copies of information that they see online.

    • D.

      People must prove what they write is true.

    Correct Answer
    C. People are able to make copies of information that they see online.
    Explanation
    When information is published online, it becomes accessible to anyone with internet access. As a result, people have the ability to make copies of the information they come across online. This means that once something is published online, it can be easily replicated and shared by others.

    Rate this question:

  • 15. 

    Which file ending is used for pictures?

    • A.

      .txt

    • B.

      .html

    • C.

      .doc

    • D.

      .jpg

    Correct Answer
    D. .jpg
    Explanation
    The file ending .jpg is used for pictures because it is a common file format for saving and displaying images. It is a compressed format that allows for high-quality images with relatively small file sizes. Other file endings such as .txt, .html, and .doc are used for text documents or webpages, while .jpg specifically indicates that the file contains a picture.

    Rate this question:

  • 16. 

    Which one of these is an e-mail address?

    • A.
    • B.

      C:\Sunshine\examples.html

    • C.

      Example_network.exe

    • D.

      Http://www.example.com

    Correct Answer
    A. [email protected]
    Explanation
    The correct answer is [email protected] because it follows the standard format for an email address, which consists of a username (sunshine) followed by the @ symbol and the domain name (example.net).

    Rate this question:

  • 17. 

    If you wanted to create a search in the Library database to find all books about ogham, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    A. Subject Search
    Explanation
    ogham is an medieval form of writing.

    Rate this question:

  • 18. 

    If you wanted to create a search in the Library database to find all books by Jerry Spinnelli, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    B. Author Search
    Explanation
    To find all books by Jerry Spinnelli in the Library database, you would use an Author Search. This type of search allows you to specifically search for books written by a particular author. By inputting "Jerry Spinnelli" as the search criteria, the database will retrieve all books written by him, making it easier to locate and access his works.

    Rate this question:

  • 19. 

    If you wanted to create a search in the Library database to find all books from 1941, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    D. Date Published Search
    Explanation
    To find all books from 1941 in the Library database, you would use a "Date Published Search". This type of search allows you to specify a specific date or range of dates to filter the results and retrieve only the books published in 1941. By using this search option, you can easily narrow down the search results and find the desired books from the specified year.

    Rate this question:

  • 20. 

    If you wanted to create a search in the Library database to find all books about penguins, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    A. Subject Search
    Explanation
    To find all books about penguins in the Library database, you would use a Subject Search. This type of search allows you to specifically search for books based on their subject matter, in this case, penguins. By using a Subject Search, you can narrow down the results to only include books that are relevant to the topic of penguins, making it easier to find the information you are looking for.

    Rate this question:

  • 21. 

    If you wanted to create a search in the Library database to find the book Double Dutch, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    C. Title Search
    Explanation
    To find the book "Double Dutch" in the Library database, you would use a Title Search. This search type allows you to specifically search for books by their titles, making it the most appropriate option for locating a book with a known title like "Double Dutch". Subject Search would be used to find books related to a specific topic, Author Search to find books written by a particular author, and Date Published Search to find books published within a certain timeframe.

    Rate this question:

  • 22. 

    If you wanted to create a search in the Library database to find all books by Kate Banks, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    B. Author Search
    Explanation
    To find all books by Kate Banks in the Library database, you would use an Author Search. This search allows you to specifically search for books written by a particular author. By entering "Kate Banks" as the search criteria, the database will retrieve all books authored by her, making it easier to find her works in the Library's collection.

    Rate this question:

  • 23. 

    If you wanted to create a search in the Library database to find all books about Michael Jordan, what type of search would you put it in?

    • A.

      Subject Search

    • B.

      Author Search

    • C.

      Title Search

    • D.

      Date Published Search

    Correct Answer
    A. Subject Search
    Explanation
    To find all books about Michael Jordan in the Library database, you would use a Subject Search. This type of search allows you to search for materials based on their subject or topic. By selecting the subject "Michael Jordan," you can retrieve all books that are specifically about him, regardless of the author, title, or date of publication.

    Rate this question:

  • 24. 

    You are looking for information on Christopher Columbus and you enter his name in a Google search. Pretending that the answers below are links, click on the one that is probably the safest place to find information.

    • A.

      FIND OUT ABOUT CHRISTOPHER COLUMBUS ONLINE! (Click here to verify your email address and we will send you links to Christopher Columbus sites!)

    • B.

      CHRISTOPHER COLUMBUS ONLINE AT THE UNIVERSITY OF TEXAS (use these professor-recommended links to explore the world of Christopher Columbus)

    • C.

      BUY STUDENT RESEARCH PAPERS ON CHRISTOPHER COLUMBUS (Buy A- and B- level student research papers on Christopher Columbus)

    • D.

      CHRISTOPHER COLUMBUS DOWNLOADS: YOUR FIRST ONE IS FREE! (enter your contact information to learn how to Download Christopher Columbus fact pages! your First one is free!)

    Correct Answer
    B. CHRISTOpHER COLUMBUS ONLINE AT THE UNIVERSITY OF TEXAS (use these professor-recommended links to explore the world of ChristopHer Columbus)
    Explanation
    The safest place to find information on Christopher Columbus would be the "CHRISTOPHER COLUMBUS ONLINE AT THE UNIVERSITY OF TEXAS" link. This is because it is mentioned that these are professor-recommended links, indicating that the information provided is likely to be reliable and accurate.

    Rate this question:

  • 25. 

    Look at the browser below. Suppose you go to this web page by mistake. What would you click to go back to the previous page?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    A. A
    Explanation
    To go back to the previous page, you would click on the "A" button, which is typically represented by an arrow pointing to the left. This button is commonly used as the "back" or "previous" button in web browsers, allowing users to navigate to the previously visited page.

    Rate this question:

  • 26. 

    Which button would you click below to make the highlighted list bulleted?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    D. D
    Explanation
    To make the highlighted list bulleted, you would click button D.

    Rate this question:

  • 27. 

    What button would you push to make this list into a pie chart?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    C. C
    Explanation
    To make the list into a pie chart, you would need to use button C. This is because button C is most likely the option that corresponds to creating a pie chart. The other buttons, A and B, may have different functions such as creating a bar chart or a line graph. Button D is not mentioned in the question, so it is not clear what function it serves.

    Rate this question:

  • 28. 

    What would you click to change the font size of the highlighted text to 25?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    D. D
    Explanation
    To change the font size of the highlighted text to 25, you would click on option D.

    Rate this question:

  • 29. 

    What button would you click to make the highlighted text bold?

    • A.

      A

    • B.

      B

    • C.

      C

    • D.

      D

    Correct Answer
    A. A
    Explanation
    To make the highlighted text bold, you would click on button A.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 10, 2010
    Quiz Created by
    Tuc14016
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.