Search Header Logo

Personal Data 2

Authored by Dan Hodgson

Computers

5th - 11th Grade

Used 7+ times

Personal Data 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the correct definition of the word cookie?

Sending fake emails that look like they are from reputable companies

A law that controls how your personal information is used by organisations, businesses or the government

A small text file created by a website that is stored in the user's computer either temporarily or permanently.

A dishonest scheme; a fraud.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the correct definition of the word phishing?

Sending fake emails that look like they are from reputable companies

A law that controls how your personal information is used by organisations, businesses or the government

A small text file created by a website that is stored in the user's computer either temporarily or permanently.

A dishonest scheme; a fraud.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the correct definition of the word scam?

Sending fake emails that look like they are from reputable companies

A law that controls how your personal information is used by organisations, businesses or the government

A small text file created by a website that is stored in the user's computer either temporarily or permanently.

A dishonest scheme; a fraud.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the correct definition of Data Protection Act?

Sending fake emails that look like they are from reputable companies

A law that controls how your personal information is used by organisations, businesses or the government

A small text file created by a website that is stored in the user's computer either temporarily or permanently.

A dishonest scheme; a fraud.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do companies keep personal data about you?

To sell it

For advertising

To track where you are

So they know you're routines

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Types of scam: How does the fake social media advert work?

A tempting offer or deal pops up on your screen when you’re scrolling through your social media feed – but the too-good-to-be-true ad is exactly that and leaves you out of pocket

You click on the link contained in the email and you’ll be taken to a fake website where you run the risk of giving away your financial details.

Fraudsters call you on the telephone, impersonating someone from your bank, police, a utility or service provider.

Your inbox pings with a text message that appears to be from your bank, a major company or local authority warning you of fraud – and asking you to take urgent action.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Types of scam: How does phishing work?

A tempting offer or deal pops up on your screen when you’re scrolling through your social media feed

You click on the link contained in the email and you’ll be taken to a fake website where you run the risk of giving away your financial details.

Fraudsters call you on the telephone, impersonating someone from your bank, police, a utility or service provider.

Your inbox pings with a text message that appears to be from your bank, a major company or local authority warning you of fraud – and asking you to take urgent action.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?