identity theft

identity theft

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Stay Safe Online!

Stay Safe Online!

2nd Grade - University

10 Qs

Composing a Resume

Composing a Resume

11th Grade

8 Qs

English Words to Know

English Words to Know

9th - 12th Grade

10 Qs

Types of Forms

Types of Forms

9th - 12th Grade

10 Qs

11 General - Unit 9 - Lessons 11 - 12 - Identity theft

11 General - Unit 9 - Lessons 11 - 12 - Identity theft

11th Grade

8 Qs

Module 7 A Vocabulary

Module 7 A Vocabulary

8th Grade - University

10 Qs

Filling Form

Filling Form

10th Grade

10 Qs

Identity Theft Pre-Quiz/Post-Quiz

Identity Theft Pre-Quiz/Post-Quiz

11th Grade

5 Qs

identity theft

identity theft

Assessment

Quiz

English

9th - 12th Grade

Easy

CCSS
RI.11-12.8, RI.9-10.4, RL.11-12.9

+11

Standards-aligned

Created by

hoor b

Used 1+ times

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An illegal plan for making money, usually by tricking people

phishing

counterfeit

spyware

scam

Tags

CCSS.RI.11-12.8

CCSS.RI.8.7

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft primarily about

Sharing personal details with friends

Using personal details to access exclusive events

Offering personal details for public use

Pretending to be someone else to steal money

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common method used by thieves to steal personal information online?

Sending physical letters requesting personal information

Visiting individuals' homes to collect personal information

Phishing through emails pretending to be trusted sources

Asking for personal information directly on social media

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware, a method employed by criminals to access personal information, can infect a computer through various means such as downloading files or software, opening email attachments or spam mail, or clicking on pop-ups

true

false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The new software is __________ efficient than the previous version

equally

less likely

much more

increasingly

Tags

CCSS.RL.11-12.9

CCSS.RL.6.3

CCSS.RL.7.3

CCSS.RL.8.3

CCSS.RL.9-10.3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new browser window that opens quickly on a computer screen in front of what you’re working on

hacking

spam

fraud

pop-up

Tags

CCSS.RI.11-12.8

CCSS.RI.8.7

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.9-10.7