JEHooper

Jazmin Hooper

vocabulary Identity Anonymous Personal Screen name Gender Register [verb] Anonymous

Identities are unknown  Cookies   small programs that collect info about sites you visit and about your computer   Third party   someone other than you and the website owner who has access to your personal information   Privacy options   choices you make about how your info is used by a website Online scams If you are ever hacked you will know it Use unique passwords for important sites, like your bank and email. Don't believe promises from strangers. Check your email account to see if it provides a tool to filter out potential scam artists will trick you into paying them money with a credit card there should be other ways you could tell like, an example is some one worked for their boss and their boss gave them a fake check then when he/she cashed the check at the bank they would not give her the money. someone advertising an apartment or vacation rental online a potential employer or someone who is hiring you to be a mystery shopper someone who claims to be a relative or friend in need. They say they’re in a foreign hospital or jail, and they beg you not to tell the rest of the family.In a variation, scammers ask you to deposit a check for them, and then wire money back to them. The scam is that the check is fake. It will bounce, and you’ll owe your bank the money you withdrew. By law, banks must make the funds from deposited checks available within a few days, but it can take weeks to uncover a fake check. Sometimes people will ask you to wire some money and not tell the rest of the family. don't listen to them, it could be a scam.tech support scams are when people claim to be computer associated when their really not right then you would no its a scam if your ever caught up in a scam you can file a complaint with the FCC. phishing scams are when internet frauders impersonate a buisness
 * Make sure your security sore is up-to-date, tell your friends, and
 * Don’t click on links or open attachments in emails unless you know who sent them and what they are
 * Don’t treat public computers like your personal computer