identity theft

identity theft

9th - 12th Grade

6 Qs

quiz-placeholder

Similar activities

Composing a Resume

Composing a Resume

11th Grade

8 Qs

Types of Forms

Types of Forms

9th - 12th Grade

10 Qs

Types of Evidence

Types of Evidence

6th - 12th Grade

10 Qs

Module 7 A Vocabulary

Module 7 A Vocabulary

8th Grade - University

10 Qs

How to Read Personal Letter

How to Read Personal Letter

11th Grade

10 Qs

Job Application Letter Assessment

Job Application Letter Assessment

12th Grade - University

10 Qs

Stay Safe Online!

Stay Safe Online!

2nd Grade - University

10 Qs

English Words to Know

English Words to Know

9th - 12th Grade

10 Qs

identity theft

identity theft

Assessment

Quiz

English

9th - 12th Grade

Easy

CCSS
RI.11-12.8, RI.9-10.4, RL.11-12.9

+11

Standards-aligned

Created by

hoor b

Used 1+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An illegal plan for making money, usually by tricking people

phishing

counterfeit

spyware

scam

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.8.7

CCSS.RL.9-10.7

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is identity theft primarily about

Sharing personal details with friends

Using personal details to access exclusive events

Offering personal details for public use

Pretending to be someone else to steal money

Tags

CCSS.RI.11-12.4

CCSS.RI.7.4

CCSS.RI.8.4

CCSS.RI.9-10.4

CCSS.RI.9-10.4

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common method used by thieves to steal personal information online?

Sending physical letters requesting personal information

Visiting individuals' homes to collect personal information

Phishing through emails pretending to be trusted sources

Asking for personal information directly on social media

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware, a method employed by criminals to access personal information, can infect a computer through various means such as downloading files or software, opening email attachments or spam mail, or clicking on pop-ups

true

false

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The new software is __________ efficient than the previous version

equally

less likely

much more

increasingly

Tags

CCSS.RL.11-12.9

CCSS.RL.6.3

CCSS.RL.7.3

CCSS.RL.8.3

CCSS.RL.9-10.3

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A new browser window that opens quickly on a computer screen in front of what you’re working on

hacking

spam

fraud

pop-up

Tags

CCSS.RI.11-12.8

CCSS.RI.9-10.7

CCSS.RL.11-12.8

CCSS.RL.8.7

CCSS.RL.9-10.7