Quiz Summary
0 of 54 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 54 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Grammar Fill In The Blank 0%
- Grammar Fill In The Blanks 2 0%
- Listening 1 0%
- Listening 2 0%
- Pronunciation Match Words with Same Sounds 0%
- Reading 1 0%
- Reading 2 0%
- Vocabulary fill in the blank 1 0%
- Vocabulary single choice 0%
- Words in correct order 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 54
1. Question
put the words in the correct order
1. jkihigran
-
i
-
a
-
h
-
g
-
i
-
n
-
k
-
c
-
j
View Answers:
CorrectIncorrect -
-
Question 2 of 54
2. Question
put the words in the correct order
2. gsunimlgg
-
g
-
i
-
s
-
g
-
n
-
g
-
m
-
u
-
l
View Answers:
CorrectIncorrect -
-
Question 3 of 54
3. Question
put the words in the correct order
3. mtrisrero
-
r
-
e
-
m
-
r
-
i
-
r
-
o
-
t
-
s
View Answers:
CorrectIncorrect -
-
Question 4 of 54
4. Question
put the words in the correct order
4. Isivdnaam
-
i
-
m
-
a
-
a
-
d
-
v
-
n
-
l
-
s
View Answers:
CorrectIncorrect -
-
Question 5 of 54
5. Question
put the words in the correct order
5. rudaf
-
a
-
u
-
r
-
d
-
f
View Answers:
CorrectIncorrect -
-
Question 6 of 54
6. Question
put the words in the correct order
6. bbrriey
-
b
-
i
-
b
-
r
-
r
-
y
-
e
View Answers:
CorrectIncorrect -
-
Question 7 of 54
7. Question
put the words in the correct order
7. drmeur
-
r
-
e
-
m
-
r
-
u
-
d
View Answers:
CorrectIncorrect -
-
Question 8 of 54
8. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
Fortunately there were no customers in the bank when the happened.
CorrectIncorrect -
-
Question 9 of 54
9. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
The followed the actress everywhere she went.
CorrectIncorrect -
-
Question 10 of 54
10. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
They were trying to electronic goods into the country, but they were caught at customs
CorrectIncorrect -
-
Question 11 of 54
11. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
The Mayor accepted a in exchange for allowing the company to build on that land.
CorrectIncorrect -
-
Question 12 of 54
12. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
Two men my friend at knifepoint yesterday They took all her money.
CorrectIncorrect -
-
Question 13 of 54
13. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
Someone managed to into her computer and find her personal details.
CorrectIncorrect -
-
Question 14 of 54
14. Question
Complete the sentences with the correct form of a word from a or b.
-
Question:
A broke into my house while I was away and stole my laptop.
CorrectIncorrect -
-
Question 15 of 54
15. Question
choose the correct word
1. It took the jury two weeks to reach their punishment / verdict of ‘Not guilty’.
CorrectIncorrect -
Question 16 of 54
16. Question
choose the correct word
2. The victim’s husband has been charged / committed with the murder of his wife.
CorrectIncorrect -
Question 17 of 54
17. Question
choose the correct word
3. The criminal will appear in court / judge next week.
CorrectIncorrect -
Question 18 of 54
18. Question
choose the correct word
4. Police are investigating / questioning the kidnapping of a millionaire’s son n Los Angeles.
CorrectIncorrect -
Question 19 of 54
19. Question
choose the correct word
5. The judge acquitted \ sentenced the accused man because there was no evidence.
CorrectIncorrect -
Question 20 of 54
20. Question
choose the correct word
6. The jury / witnesses who had seen the burglary reported it to the police.
CorrectIncorrect -
Question 21 of 54
21. Question
choose the correct word
7. He got a €300 fine / sentence for parking illegally.
CorrectIncorrect -
Question 22 of 54
22. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
does the victim put himself in danger by downloading tiles from the internet?
CorrectIncorrect -
Question 23 of 54
23. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
is the victim tricked into replying to an email?
CorrectIncorrect -
Question 24 of 54
24. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
does the thief look through the victim’s things with his own hands?
CorrectIncorrect -
Question 25 of 54
25. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
is the victim tricked into making a phone call?
CorrectIncorrect -
Question 26 of 54
26. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
is the thief in control of the victim’s electronic device?
CorrectIncorrect -
Question 27 of 54
27. Question
Read the article and answer the questions with the paragraph letter.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.
Question:
does the thief speak to the victim personally?
CorrectIncorrect -
Question 28 of 54
28. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
Please your name and email address.
CorrectIncorrect -
-
Question 29 of 54
29. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
I have your mobile number, but I don’t have your
CorrectIncorrect -
-
Question 30 of 54
30. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
You can any of these items at our online store.
CorrectIncorrect -
-
Question 31 of 54
31. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
If you room service, please press I.
CorrectIncorrect -
-
Question 32 of 54
32. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
Remember to use a shredder when you any envelopes or letters that contain your personal information.
CorrectIncorrect -
-
Question 33 of 54
33. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
With digital TV, you hundreds of different channels.
CorrectIncorrect -
-
Question 34 of 54
34. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
The police have asked for more time to evidence.
CorrectIncorrect -
-
Question 35 of 54
35. Question
Look at the highlighted words and phrases in the text and try to work out their meaning. Then use them to complete the sentences.
___________________________________________________________________________________________________________________________
Top techniques in identity theft
Identity theft is the illegal use of somebody else’s personal information in order to obtain money or credit. Victims of identity theft can face financial and even legal problems in the future because an impostor has used their personal details to purchase something or give false information to the authorities. The best way of preventing thieves from stealing your identity is to know how they operate. Here are some of the most common identity theft techniques.
A. Phishing
You get an email that claims to be from a financial institution or other business asking for some personal information from you. It contains a link to a web page where you have to key in your bank username and password. The new page may look real but it is, in fact, a fake. Identity thieves will take all of the information you give on the page and use it to steal money from your accounts.
B. Smishing
You get a text message which seems to requite your immediate attention, tor example: ‘[Name of bank] confirms that you have bought a computer from [Name of retailer].
Call [Phone Number] if you have not made this purchase.’ When you call the number, an automated voice response system asks you to confirm your credit card details. The text message is actually from a group of identity thieves who can create and use a duplicate bank card within 30 minutes of obtaining the necessary information.
C. Vishing
This occurs when you receive a phone call on your landline from someone who seems to be trying to help you. The person claims to have detected fraudulent activity on your credit card and asks you to confirm your credit card details. The call is actually from an identity thief who wants to use your card to purchase things for himself.
D. Spoofing
Hackers break into your computer and transfer communication from a legitimate website to a fake one. For example, when you try to log into Facebook, your computer will take you to the hacker’s site, where they will steal your login information. From there, they will have access to plenty of details, such as your date of birth and the names of the members of your family Later they can use this information to steal your identity.
E. Spyware
Spyware is a type of software used on the internet to gather information about a person or organization without them consent. Identity thieves often attach it to downloadable files, such as online games. When you install the game, a hacker records all your keystrokes, including things like credit card numbers or bank account logins.
F. Digging through your dustbin
The dustbin can be a great source of personal information and in some cases, identity thieves actually go through the rubbish to see what they can find. Make sure you completely destroy your old credit cards when it is time to dispose of them. As far as official documents are concerned, you should put them all through a shredder or burn them before you throw them out.-
Question:
Tomorrow I’m going to my wardrobe and throw away all my old clothes.
CorrectIncorrect -
-
Question 36 of 54
36. Question
Complete the text with the correct active or passive form of the verb in brackets.
-
As a police officer, I was very upset when my motorbike was taken (take) from outside my house last month When I found out that over 20 motorbikes (steal) in my area in the previous six months, I promised myself that the thief would (catch) and (punish). First my colleagues and I (question) all the victims of the thefts and (visit) all the motorbike dealers in the area. Our investigations came to an end late last night when we identified the criminal… as my next-door neighbour!
He (just arrest) and at the moment he (hold) at the local police station. His case (hear) in the Magistrate’s Court next week and we al (expect) him to be found guilty. He might (give) a short prison sentence, but the best thing is that no more motorbikes (steal) in my area in the near future.
CorrectIncorrect -
-
Question 37 of 54
37. Question
Rewrite the sentences.
-
Question:
It is expected that the man will be acquitted.
The man
CorrectIncorrect -
-
Question 38 of 54
38. Question
Rewrite the sentences.
-
Question:
It is reported that kidnappers have taken the president’s wife.
Kidnappers
CorrectIncorrect -
-
Question 39 of 54
39. Question
Rewrite the sentences.
-
Question:
The terrorists are thought to be in hiding somewhere in France.
It is
CorrectIncorrect -
-
Question 40 of 54
40. Question
Rewrite the sentences.
-
Question:
The suspect is known to be dangerous.
It is
CorrectIncorrect -
-
Question 41 of 54
41. Question
Rewrite the sentences.
-
Question:
It is reported that vandals have damaged the art gallery.
Vandals .
CorrectIncorrect -
-
Question 42 of 54
42. Question
Rewrite the sentences.
-
Question:
The police are said to have arrested three men.
It is
CorrectIncorrect -
-
Question 43 of 54
43. Question
Rewrite the sentences with have something done.
-
Question:
Someone tests our burglar alarm twice a year
We twice a year.
CorrectIncorrect -
-
Question 44 of 54
44. Question
Rewrite the sentences with have something done.
-
Question:
A mechanic has repaired my car.
I .
CorrectIncorrect -
-
Question 45 of 54
45. Question
Rewrite the sentences with have something done.
-
Question:
Someone painted my brother’s house.
My brother .
CorrectIncorrect -
-
Question 46 of 54
46. Question
Rewrite the sentences with have something done.
-
Question:
Someone will clean my carpets in the spring.
I in the spring.
CorrectIncorrect -
-
Question 47 of 54
47. Question
Rewrite the sentences with have something done.
-
Question:
Some men are building a wall around my neighbour’s garden.
My neighbours around their garden.
CorrectIncorrect -
-
Question 48 of 54
48. Question
Rewrite the sentences with have something done.
-
Question:
Someone cleans Oliver’s flat once a week.
Oliver once a week.
CorrectIncorrect -
-
Question 49 of 54
49. Question
Rewrite the sentences with have something done.
-
Question:
A company is redesigning our garden.
We .
CorrectIncorrect -
-
Question 50 of 54
50. Question
choose the word with a different sound.
1. up
CorrectIncorrect -
Question 51 of 54
51. Question
choose the word with a different sound.
2. horse
CorrectIncorrect -
Question 52 of 54
52. Question
choose the word with a different sound.
3. bike
CorrectIncorrect -
Question 53 of 54
53. Question
Listen to five people talking about different crimes and write speaker 1-5 next to each sentence. There is one sentence you do not need to use.
-
A. The victim w as congratulated by local people.
B. The victim was hurt during the incident.
C. The v¡ctim was lucky because the police saw the incident.
D. The victim and other people were too surprised to react.
E. The victim recovered one of the stolen belongings.
F. The victim has experienced the same crime more than once.
CorrectIncorrect -
-
Question 54 of 54
54. Question
Listen again and choose the sentences T (true) or F (false).
-
i. Speaker 1 was walking to work when the incident happened.
ii. Speaker 2 takes precautions to avoid having things stolen.
iii. Speaker 3 was robbed because he / she \\ as not paying attention.
iv. Speaker 4 was alone when the incident happened.
v. Speaker 5 was shopping when he / she witnessed a crime.
CorrectIncorrect -