
Useen Comprehension: Invisible Thieves
Authored by Hanan Meswak
English
4th Grade
CCSS covered
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the text, what do many spam e-mails try to do?
get your money
use your credit carduse your credit card
pretend to be you
protect your information
Tags
CCSS.RI.4.2
CCSS.RL.5.2
CCSS.RI.3.2
CCSS.RI.5.2
CCSS.RL.4.2
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the author list at the end of the text?
different types of phishing scams
suggestions for protecting yourself against fraud
different kinds of fraud complaints
the different amounts of money stolen in scams
Tags
CCSS.RI.3.5
CCSS.RI.4.5
CCSS.RI.5.5
CCSS.RI.2.5
CCSS.RI.6.5
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It's possible for your identity to be stolen at any age.
What evidence from the text supports this conclusion?
“They want your name, credit card numbers, and Social Security number. That information can be more valuable than your money!”
“Many spam, or junk, e-mails try to get your money. They are from people who are "phishing" for your personal information.”
“Sounds like a great deal. In fact, it sounds too good to be true. And it is. It's a scam. A scam is meant to trick people.”
“Devon, 18, from San Diego, California, told Extra that his identity was stolen when he was just a kid!”
Tags
CCSS.RI.4.2
CCSS.RL.5.2
CCSS.RI.5.2
CCSS.RL.4.1
CCSS.RL.5.1
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Based on the text, what can you conclude?
If your identity is stolen, it can negatively impact your life for many years.
Everyone who asks for your email wants to steal your identity.
There is no way to prevent your identity from being stolen.
If your identity is stolen, it is easy to recover it.
Tags
CCSS.RL.4.1
CCSS.RL.5.1
CCSS.RI.4.1
CCSS.RI.5.1
CCSS.RI.6.1
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the text mostly about?
a famous thief and how he hid from police
tricks to steal your personal information
different kinds of emails you can receive
how to pay for something by credit card
Tags
CCSS.RI.4.2
CCSS.RL.5.2
CCSS.RI.3.2
CCSS.RL.4.2
CCSS.RL.3.2
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Read this sentence from the text.
I can’t transfer my money out of the country because of local laws.
As used in the sentence, what does the word "transfer" most nearly mean?
earn
borrow
spend
move
Tags
CCSS.RI.3.4
CCSS.RI.4.4
CCSS.RI.5.4
CCSS.RL.3.4
CCSS.RL.4.4
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the word or phrase that best completes the sentence.
People who have your personal information can steal from you, ________ don’t give your personal information to strangers!
while
after
unless
so
Tags
CCSS.RI.3.5
CCSS.RI.4.5
CCSS.RI.5.5
CCSS.RI.4.3
CCSS.RI.5.3
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?