6th Grade Technology Pre-assessment Quiz

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mrsgraysms
M
Mrsgraysms
Community Contributor
Quizzes Created: 1 | Total Attempts: 538
Questions: 30 | Attempts: 538

SettingsSettingsSettings
6th Grade Technology Pre-assessment Quiz - Quiz

This is an assessment on technology terms that we will be discussing throughout this school year. Do your best!


Questions and Answers
  • 1. 

    A set of rules applied by the owner/manager of a network, website or large computer system that restrict the ways in which the network site or system may be used is a (n)

    • A.

      Internet agreement

    • B.

      Acceptable use policy

    • C.

      Usable contract

    • D.

      Computer law

    Correct Answer
    B. Acceptable use policy
    Explanation
    An acceptable use policy refers to a set of rules implemented by the owner or manager of a network, website, or large computer system. This policy outlines the acceptable ways in which the network, site, or system can be utilized. It serves as a guideline for users, specifying what activities are permitted and what actions are prohibited. By having an acceptable use policy in place, the owner/manager can ensure that the network, site, or system is being used responsibly and in accordance with their intended purpose.

    Rate this question:

  • 2. 

    Which of the following is an example of an input device?

    • A.

      Monitor

    • B.

      Printer

    • C.

      Keyboard

    • D.

      Headphones

    Correct Answer
    C. Keyboard
    Explanation
    A keyboard is an example of an input device because it allows users to input data or commands into a computer system. It consists of a set of keys, each representing a different character or function. When a key is pressed, it sends a signal to the computer, which interprets it and performs the corresponding action. Keyboards are commonly used for typing text, entering commands, and navigating through software applications. They are essential for user interaction with computers and are one of the primary ways to input information into a system.

    Rate this question:

  • 3. 

    Word-wrap allows you to type text that continuously flows to the next line without having to press this:

    • A.

      Enter/Return Key

    • B.

      Backspace Key

    • C.

      Space Bar

    • D.

      Tab Key

    Correct Answer
    A. Enter/Return Key
    Explanation
    Word-wrap allows text to automatically wrap to the next line when it reaches the end of a line, without the need to manually press the Enter/Return key. This feature is particularly useful when typing long paragraphs or sentences, as it ensures that the text remains visually organized and easy to read. Pressing the Enter/Return key is necessary only when intentionally starting a new paragraph or creating line breaks within the text.

    Rate this question:

  • 4. 

    A computer virus is:

    • A.

      A germ that gets into your computer and makes it crash

    • B.

      A program written to disrupt computer operations

    • C.

      A worm that crawls inside your processor

    • D.

      An infection from dirty keyboards

    Correct Answer
    B. A program written to disrupt computer operations
    Explanation
    A computer virus is a program written to disrupt computer operations. Unlike a germ or a worm, it is not a physical entity that can physically enter a computer or crawl inside a processor. Instead, it is a malicious software code that is designed to replicate itself and spread from one computer to another, causing various types of damage such as data loss, system crashes, and unauthorized access. Its main purpose is to disrupt the normal functioning of a computer system and potentially steal or manipulate sensitive information.

    Rate this question:

  • 5. 

    A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis is referred to as what?

    • A.

      E-mail

    • B.

      Internet diary

    • C.

      Blog

    • D.

      Webinar

    Correct Answer
    C. Blog
    Explanation
    A personal website or web page on which an individual records opinions, links to other sites, etc. on a regular basis is referred to as a blog.

    Rate this question:

  • 6. 

    The activity of defrauding an online account holder of financial information by posing as a legitimate company is known as?

    • A.

      Fishing

    • B.

      Spawning

    • C.

      Spamming

    • D.

      Phishing

    Correct Answer
    D. Phishing
    Explanation
    Phishing is the correct answer because it refers to the activity of defrauding an online account holder by posing as a legitimate company. It involves sending fraudulent emails or messages that appear to be from a trusted source, tricking the recipient into providing sensitive information such as passwords, credit card details, or social security numbers. This type of scam is commonly used to gain unauthorized access to personal or financial information for malicious purposes.

    Rate this question:

  • 7. 

    Which of the following information is safe to share in a public chatroom or blog?

    • A.

      Your screen name

    • B.

      Your name and address

    • C.

      Your first name and where you go to school

    • D.

      Your first name and age

    Correct Answer
    A. Your screen name
    Explanation
    Sharing your screen name in a public chatroom or blog is safe because it does not reveal your personal information such as your real name, address, school, or age. A screen name is a chosen username that you use to identify yourself online, and it does not provide any direct personal details. By sharing only your screen name, you can maintain your privacy and protect yourself from potential risks associated with sharing personal information online.

    Rate this question:

  • 8. 

    What is the correct term for the text on a Web page that takes you to another Web page when you click it?

    • A.

      Hyperlink

    • B.

      Domain

    • C.

      HTML

    • D.

      URL

    Correct Answer
    A. Hyperlink
    Explanation
    A hyperlink is the correct term for the text on a web page that takes you to another web page when you click it. Hyperlinks are used to connect different web pages together and allow users to navigate through websites by clicking on the linked text. They are an essential feature of the internet and enable easy access to various resources and information on the web.

    Rate this question:

  • 9. 

    Software that allows parents, teachers, and others to block access to certain materials on the internet is called:

    • A.

      Firewall

    • B.

      AOL

    • C.

      CPU

    • D.

      Filtering software

    Correct Answer
    D. Filtering software
    Explanation
    Filtering software is the correct answer because it refers to software that enables parents, teachers, and others to restrict or block access to specific content on the internet. This software allows users to filter out inappropriate or unwanted material, ensuring a safer online environment for children and controlling access to certain websites or types of content. It is commonly used to prevent access to explicit or harmful content and to enforce internet usage policies.

    Rate this question:

  • 10. 

    What is LAN?

    • A.

      Lanscape Area News

    • B.

      Local Area Network

    • C.

      License Area Network

    • D.

      Live Area Network

    Correct Answer
    B. Local Area Network
    Explanation
    A Local Area Network (LAN) is a network that connects computers and devices within a limited area, such as a home, office, or building. It allows for the sharing of resources, such as files and printers, and enables communication between connected devices. LANs are typically faster and more secure than wide area networks (WANs) and are commonly used in homes and small businesses for local data sharing and internet access.

    Rate this question:

  • 11. 

    In the e-mail address: [email protected], what is the domain name?

    • A.

      @

    • B.

      Gundrum

    • C.

      Mistikids

    • D.

      Com

    Correct Answer
    C. Mistikids
    Explanation
    The domain name in the given e-mail address is "mistikids.com". The domain name is the part of an e-mail address that follows the "@" symbol and identifies the website or organization associated with the address. In this case, "mistikids.com" is the domain name.

    Rate this question:

  • 12. 

    Google, Ask, MSN are all examples of:

    • A.

      Electronic Magazines

    • B.

      Boolean Research Websites

    • C.

      Research Websites

    • D.

      Search Engines

    Correct Answer
    D. Search Engines
    Explanation
    Google, Ask, and MSN are all examples of search engines. Search engines are online tools that allow users to search for information on the internet by entering keywords or phrases. These search engines crawl the web, index the content, and provide relevant results to the users based on their search queries. Unlike electronic magazines or research websites, search engines are specifically designed to help users find information from a vast amount of web pages available on the internet.

    Rate this question:

  • 13. 

    Symbols such as :) (smile),  :( (frown),  ; / (undecided), and ;) (wink) used to express feelings in an email or on social media are called:

    • A.

      Netiquette

    • B.

      Emoticons

    • C.

      Pictures

    • D.

      Smiles

    Correct Answer
    B. Emoticons
    Explanation
    Emoticons are symbols used to convey emotions in written communication. They are commonly used in emails and on social media platforms to add tone and express feelings that may be difficult to convey through text alone. Emoticons such as :) for a smile, :( for a frown, ;) for a wink, and ; / for undecided are examples of these symbols. They help to enhance the meaning and emotional context of the message being communicated.

    Rate this question:

  • 14. 

    The exclusive legal right, given to an originator or an assignee to print, publish, perform, film, or record literary, artistic, or musical material, and to authorize others to do the same is called?

    • A.

      Legal issued

    • B.

      Law copied

    • C.

      Copyright

    • D.

      Legalright

    Correct Answer
    C. Copyright
    Explanation
    Copyright is the exclusive legal right granted to the originator or assignee of a literary, artistic, or musical work to print, publish, perform, film, or record the material. This right allows the creator to control how their work is used and to authorize others to use it. It protects the originality and expression of the work, preventing others from copying or reproducing it without permission.

    Rate this question:

  • 15. 

    What is a database?

    • A.

      It is a large collection of numbers.

    • B.

      It is a large, organized collection of shells.

    • C.

      It is a large, organized collection of information.

    • D.

      It is a large collection of computer parts.

    Correct Answer
    C. It is a large, organized collection of information.
    Explanation
    The correct answer is "It is a large, organized collection of information." This is because a database is a structured collection of data that is organized and stored in a way that allows for efficient retrieval and manipulation. It is not just a collection of numbers or computer parts, but rather a system that stores and manages information in a structured manner.

    Rate this question:

  • 16. 

    What Microsoft program is used for creating spreadsheets?

    Correct Answer
    Excel, excel, xl, XL
    Explanation
    Excel is a Microsoft program that is commonly used for creating spreadsheets. It allows users to organize data, perform calculations, and create charts and graphs. With its user-friendly interface and powerful features, Excel has become the go-to program for individuals and businesses alike when it comes to managing and analyzing numerical data. The variations of "excel" and "xl" in the answer options are different ways of referring to the program, all of which are correct.

    Rate this question:

  • 17. 

    Name a common web browser.

    Correct Answer
    Mozilla Firefox, Google Chrome, Internet Explorer, safari,mozilla firefox, google chrome, internet explorer
    Explanation
    The correct answer is a list of common web browsers, including Mozilla Firefox, Google Chrome, Internet Explorer, and Safari. These browsers are widely used by internet users to access and browse websites.

    Rate this question:

  • 18. 

    Name an output device.

    Correct Answer
    speakers, headphones, monitor, printer, speaker, headphone
    Explanation
    The question asks for an output device, which refers to a device that receives information from a computer or other electronic device and presents or displays the data. The given answer options include speakers, headphones, monitor, and printer, all of which are examples of output devices. These devices receive signals from a computer and produce sound (speakers, headphones) or display visual information (monitor, printer).

    Rate this question:

  • 19. 

    What does RAM stand for?

    Correct Answer
    Random Access Memory, random, access memory
    Explanation
    The term RAM stands for Random Access Memory. It is a type of computer memory that allows data to be accessed randomly, meaning any byte of memory can be accessed without touching the preceding bytes. This makes RAM a fast and temporary storage for data that the computer is actively using. The terms "random" and "access memory" in the answer are additional descriptions of RAM, emphasizing its ability to access data in a non-sequential manner.

    Rate this question:

  • 20. 

    The part of the computer that controls the flow of information is the:

    • A.

      CPU or Processor

    • B.

      Keyboard

    • C.

      Disc Drive

    • D.

      Cables

    Correct Answer
    A. CPU or Processor
    Explanation
    The CPU or Processor is responsible for controlling the flow of information in a computer. It is often referred to as the "brain" of the computer as it performs all the necessary calculations and executes instructions. The CPU receives input from various sources, processes it, and sends output to the appropriate components. It manages tasks such as fetching instructions from memory, decoding them, and executing them. Therefore, the CPU or Processor is the correct answer as it controls the flow of information within the computer.

    Rate this question:

  • 21. 

    What does GB stand for?

    Correct Answer
    gigabyte, gigabite, gigabytes, gigabites, giga byte, giga bite, giga bites, giga bytes
    Explanation
    GB stands for gigabyte, which is a unit of digital information storage. It is commonly used to measure the amount of data in computer storage and transmission. The term can be spelled as gigabyte or gigabite, and it can be used in both singular and plural forms, such as gigabytes or gigabites. The variations giga byte, giga bite, giga bites, and giga bytes are also acceptable spellings for GB.

    Rate this question:

  • 22. 

    A universal serial bus (USB) flash drive is a small, portable device that plugs into a computer's USB port and acts as memory or a storage device.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A USB flash drive is indeed a small, portable device that can be plugged into a computer's USB port. It is designed to act as a storage device or memory, allowing users to store and transfer data easily.

    Rate this question:

  • 23. 

    What is wireless internet called?

    • A.

      Si-fi

    • B.

      Cu-fi

    • C.

      El-fi

    • D.

      Wi-fi

    Correct Answer
    D. Wi-fi
    Explanation
    Wi-Fi is the correct answer because it is the commonly used term for wireless internet. It stands for "wireless fidelity" and refers to a technology that allows devices to connect to the internet without the need for physical cables. Wi-Fi is widely available in homes, offices, and public spaces, enabling users to access the internet wirelessly on their smartphones, laptops, and other devices.

    Rate this question:

  • 24. 

    Which company developed Internet Explorer?

    Correct Answer
    Windows
    Microsoft
    windows
    microsoft
    micro soft
    Explanation
    The correct answer is Microsoft. Microsoft developed Internet Explorer, which was the default web browser for the Windows operating system.

    Rate this question:

  • 25. 

    What is the most common OS used today?

    • A.

      Windows

    • B.

      Linux

    • C.

      Commodore

    • D.

      Mac OS X

    Correct Answer
    A. Windows
    Explanation
    Windows is the most common operating system used today because it is widely used by individuals and businesses around the world. It offers a user-friendly interface, compatibility with a wide range of software and hardware, and a large number of available applications. Additionally, Windows has a strong market presence and is constantly updated and supported by Microsoft, making it a popular choice for many users.

    Rate this question:

  • 26. 

    A hard Drive is used to...

    • A.

      Execute applications

    • B.

      Store data

    • C.

      Output sound

    • D.

      Output video

    Correct Answer
    B. Store data
    Explanation
    A hard drive is a storage device used to store data. It is a non-volatile memory device that stores and retrieves digital information. Unlike RAM, which is used for temporary storage, a hard drive provides long-term storage for files, documents, software, and other data. It allows users to save and access their data even when the computer is turned off. Therefore, the correct answer is "store data".

    Rate this question:

  • 27. 

    Which of the following is unlikely to be a web address?

    • A.

      Http://booksellersrus.com/index.html

    • B.

      Http://www.iwantoneofthose.com

    • C.

      Hzvw;/lookatmylovelywebsite.www

    • D.

      Http://www.lastminute.com

    • E.

      Http://www.visitkent.com

    Correct Answer
    C. Hzvw;/lookatmylovelywebsite.www
    Explanation
    The web address "hzvw;/lookatmylovelywebsite.www" is unlikely to be a valid web address because it does not follow the typical format of a web address. Web addresses usually start with "http://" or "https://", followed by the domain name (e.g., "www.example.com"). The given address contains random characters and does not have a valid domain name, making it unlikely to be a valid web address.

    Rate this question:

  • 28. 

    To maximise your protection against computer viruses, what should you do?

    • A.

      Check that your anti-virus software automatically checks for updates

    • B.

      Delete suspicious email attachments

    • C.

      Ensure that your anti-virus software regularly scans your computer

    • D.

      All of these

    • E.

      Ensure you have a firewall

    Correct Answer
    D. All of these
    Explanation
    To maximize your protection against computer viruses, it is important to perform multiple actions. First, you should check that your anti-virus software automatically checks for updates. This ensures that your software is up to date with the latest virus definitions and can effectively detect and remove any new threats. Second, you should delete suspicious email attachments as they can contain viruses or malware. Third, it is crucial to ensure that your anti-virus software regularly scans your computer to detect and eliminate any existing viruses. Lastly, having a firewall adds an extra layer of protection by monitoring and controlling incoming and outgoing network traffic. Therefore, all of these actions together maximize your protection against computer viruses.

    Rate this question:

  • 29. 

    What does 'www' stand for?

    • A.

      What Where When

    • B.

      World Wide Web

    • C.

      World Wide Words

    Correct Answer
    B. World Wide Web
    Explanation
    The acronym 'www' stands for World Wide Web. It is a system of interconnected documents and resources, accessed through the internet, that are identified by URLs and can be viewed using web browsers. The World Wide Web revolutionized the way information is shared and accessed globally, allowing users to navigate between different websites and access a vast amount of information and services.

    Rate this question:

  • 30. 

    Which of these do you need to surf the web?

    • A.

      An internet connection

    • B.

      A web browser

    • C.

      An internet Service Provider (ISP)

    • D.

      All of these

    Correct Answer
    D. All of these
    Explanation
    To surf the web, all of these are needed. An internet connection is required to connect to the internet and access websites. A web browser is necessary to navigate and view web pages. An internet service provider (ISP) is essential as they provide the connection to the internet. Therefore, to successfully surf the web, all of these components are necessary.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.