Employability skills
White collar crimes
Torts
ecommerce
Computer crimes
100

 This skill involves understanding your emotions and the emotions of others to handle workplace relationships and stress.

What is emotional intelligence?

100

 This type of white-collar crime involves illegally obtaining money from someone by threatening harm or exposing sensitive information.

What is extortion?

100

This type of tort occurs when a person knowingly makes a false statement that causes harm to another’s reputation.

 What is defamation?

100

This global online payment system allows users to securely send and receive money and has become one of the most widely used payment methods in e-commerce.

 What is PayPal?

100

This type of computer crime involves unauthorized access to a computer system to obtain, alter, or destroy information.

What is hacking?

200

This term describes adapting to new changes and challenges in a job, an essential trait for any fast-paced work environment.

 What is flexibility?

200

Known as the “father of white-collar crime,” this individual conducted the first known Ponzi scheme in the 1920s.



Who is Charles Ponzi?

200

This legal term refers to the obligation to act with a standard of reasonable care to avoid causing harm to others.

What is the duty of care?

200

This term describes the practice of abandoning a shopping cart online without completing a purchase, a common issue in e-commerce.

 What is cart abandonment?

200

This type of malicious software encrypts a user’s files and demands payment for the decryption key.

 What is ransomware?

300

When seeking employment, this document is often the first impression you make, summarizing your experience and skills.

What is a resume?

300

 This type of fraud occurs when an individual or company provides false information to receive funds or favorable terms from banks.



What is bank fraud?

300

This tort involves intentionally entering someone else’s property without permission, even if no damage is done.

What is trespass?

300

 This business model in e-commerce allows retailers to sell products without holding inventory, as items are shipped directly from a third-party supplier.

 What is dropshipping?

300

This cybercrime involves using deceptive emails or websites to trick individuals into providing sensitive information like passwords or credit card numbers.



What is phishing?

400

This interview type is often used by employers to assess multiple candidates’ ability to work as a team and problem-solve in real-time.

What is a group interview?

400

 This financial scandal involved a company manipulating its earnings and financial statements, leading to its bankruptcy in 2001 and stricter regulations in corporate America.

What is the Enron scandal?

400

This type of tort occurs when a defendant’s conduct is so careless that it disregards the safety of others, often leading to injury or damage.

What is negligence?

400

This popular open-source e-commerce platform is known for its customizability and is widely used by small businesses and large corporations alike.

 What is WooCommerce?

400

Q: This type of attack occurs when a network is flooded with excessive traffic to overwhelm and disable it.



What is a Distributed Denial-of-Service (DDoS) attack?

500

 This popular professional networking platform is commonly used for job searching, networking, and connecting with industry professionals.

 What is LinkedIn?

500

 This U.S. government agency is responsible for investigating white-collar crimes like securities fraud, insider trading, and market manipulation.

What is the Securities and Exchange Commission (SEC)?

500

 This tort allows individuals to sue for severe emotional distress caused intentionally or recklessly by another’s outrageous behavior.

What is intentional infliction of emotional distress?

500

 This metric, often used to assess e-commerce performance, represents the percentage of website visitors who complete a desired action, like making a purchase.



 What is the conversion rate?

500

 This federal U.S. law, enacted in 1986, was one of the first to address computer fraud and unauthorized access to computer systems.

What is the Computer Fraud and Abuse Act (CFAA)?