Search Header Logo

Useen Comprehension: Invisible Thieves

Authored by Hanan Meswak

English

4th Grade

CCSS covered

Used 4+ times

Useen Comprehension: Invisible Thieves
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the text, what do many spam e-mails try to do?

get your money

use your credit carduse your credit card

pretend to be you

protect your information

Tags

CCSS.RI.4.2

CCSS.RL.5.2

CCSS.RI.3.2

CCSS.RI.5.2

CCSS.RL.4.2

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the author list at the end of the text?

different types of phishing scams

suggestions for protecting yourself against fraud

different kinds of fraud complaints

the different amounts of money stolen in scams

Tags

CCSS.RI.3.5

CCSS.RI.4.5

CCSS.RI.5.5

CCSS.RI.2.5

CCSS.RI.6.5

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It's possible for your identity to be stolen at any age.

What evidence from the text supports this conclusion?

“They want your name, credit card numbers, and Social Security number. That information can be more valuable than your money!”

“Many spam, or junk, e-mails try to get your money. They are from people who are "phishing" for your personal information.”

“Sounds like a great deal. In fact, it sounds too good to be true. And it is. It's a scam. A scam is meant to trick people.”

“Devon, 18, from San Diego, California, told Extra that his identity was stolen when he was just a kid!”

Tags

CCSS.RI.4.2

CCSS.RL.5.2

CCSS.RI.5.2

CCSS.RL.4.1

CCSS.RL.5.1

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Based on the text, what can you conclude?

If your identity is stolen, it can negatively impact your life for many years.

Everyone who asks for your email wants to steal your identity.

There is no way to prevent your identity from being stolen.

If your identity is stolen, it is easy to recover it.

Tags

CCSS.RL.4.1

CCSS.RL.5.1

CCSS.RI.4.1

CCSS.RI.5.1

CCSS.RI.6.1

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt


What is the text mostly about?

a famous thief and how he hid from police

tricks to steal your personal information

different kinds of emails you can receive

how to pay for something by credit card

Tags

CCSS.RI.4.2

CCSS.RL.5.2

CCSS.RI.3.2

CCSS.RL.4.2

CCSS.RL.3.2

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read this sentence from the text.

I can’t transfer my money out of the country because of local laws.

As used in the sentence, what does the word "transfer" most nearly mean?

earn

borrow

spend

move

Tags

CCSS.RI.3.4

CCSS.RI.4.4

CCSS.RI.5.4

CCSS.RL.3.4

CCSS.RL.4.4

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose the word or phrase that best completes the sentence.

People who have your personal information can steal from you, ________ don’t give your personal information to strangers!

while

after

unless

so

Tags

CCSS.RI.3.5

CCSS.RI.4.5

CCSS.RI.5.5

CCSS.RI.4.3

CCSS.RI.5.3

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?