No student devices needed. Know more
26 questions
a type of crime in which your private information is stolen and used for criminal activity
phishing
identity theft
private information
urgency
an attempt to trick someone, usually with the intention of stealing money or private information
internet scam
alert
cookies
shortened URL
when someone poses as an institution and sends you a personalized message asking you to provide private information
internet scam
phishing
privacy policy
terms of service
a web address that has been condensed and which could mislead a user into going into a risky website
private information
internet scam
social media
shortened URL
a person who buys products or services to use
phish
thief
consumer
producer
facts and statistics collected together to be used for different purposes
data
cookies
spam
privacy
small text files stored on a computer that keeps track of what a person does on a website
brownies
data
cookies
privacy settings
the use of information collected about you to show you certain types of advertisements
data
targeted advertising
terms of service
false documents
protection from being observed or tracked by others, including the government, the public, or selected individuals or groups
data
consumer
phishing
privacy
to choose not to participate in something
phish
set privacy
terms of service
opt out
choices a website or app provides users about what information is collected and visible to others
terms of service
cookies
privacy settings
obtaining loans
a legal document that an app or website must provide which describes what user information they collect and how they use it
privacy settings
cookies
sense of urgency
privacy policy
a legal document that an app or website must provide which describes the rules that the company and users must obey when they use the app
generic greeting
privacy settings
terms of service
opt out
a company other than the company that owns the website or app you are using
terms of service
third party
phish school
data
Which one of these is NOT something an identity thief wants to accomplish?
creating false documents
buying things with others' money
getting a driver's license with someone else's information
helping others find jobs
When you ASK yourself about your personal info, what does the A stand for?
What will be ACCUSED?
What will be ACCESSORIZED?
What will be ACCESSED?
What will be ANALYZED?
When you ASK yourself about your personal info, what does the S stand for?
What will be STRANDED?
What will be SHARED?
What will be SHREDDED?
What will be SURE?
When you ASK yourself about your personal info, what does the K stand for?
What will be KNOCKED OUT?
What will be KNOWN about me?
What will be KEEN?
What will be KNIGHTED?
One of the phishing clues is a sense of _______.
One of the phishing clues includes ______ errors.
One of the phishing clues is having a friend in ____.
One of the phishing clues is that something is too good to be ____.
One of the phishing clues includes a ____ greeting.
The A in ASK means
accessed
allegiance
andrew
across
The S in ASK means
seagull
shared
shredded
snakes
What does the K mean in ASK?
known
kangaroo
knocks
kick
Explore all questions with a free account