
Identity Theft
Authored by Victoria Flynn
Business
9th - 12th Grade
CCSS covered
Used 17+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
39 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When another’s personal information is used without their permission.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An intentional effort to deceive another individual for personal gain
Tags
CCSS.RI.11-12.4
CCSS.RI.9-10.4
CCSS.RL.11-12.4
CCSS.RL.8.4
CCSS.RL.9-10.4
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Matt wants to guard his personal information. Which personal information is least likely to be used by scammers?
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which is NOT a positive credit card behavior?
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
A scam in which an email is sent from someone posing as your bank or other legitimate business asking for personal information.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When a thief watches a person punch in a credit card number, debit card pin, or listens in on private conversations to get personal information.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software or a hardware device that filters information coming in to your computer.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?