1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
12

Where could identity theft access your personal information?

Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
6 0
From hacking into public websites where you pay and stuff, or put in a fake official window to lure out your private info.
77julia77 [94]3 years ago
5 0
They could best acess it threw ur settings due to the fact thats where mainly everything is stored, all the info data and passwords are located
You might be interested in
Directions and Analysis
anastassius [24]

Answer:

Sorry this is a typing test, too pysical for online help as for the words and time limit to reinforced learning, if content is the issue grab an article or paper and type that.

8 0
3 years ago
For this step, submit your work in the programming environment by
Tems11 [23]

Answer:

is there some oppsense you can choose from

7 0
3 years ago
Plz plz plz plz plz plz plz plz plz plz plz pl plz plz plz plz plz plz plz plz plz plz plz plz olz plz plz
zvonat [6]

REM PROGRAM TO DISPLAY AVERAGE OF TWO NUMBERS

CLS

INPUT “ENTER FIRST NUMBER”; A

INPUT “ENTER SECOND NUMBER”; B

INPUT “ENTER THIRD NUMBER”; C

AV = (A + B + C) / 3

PRINT “AVERAGE OF THREE NUMBERS”; AV

END

hope this helpz

6 0
3 years ago
What are several networks connected together using a router
elixir [45]

Answer:

local Area Network, Wide Local Area Network and Personal Area Network

8 0
3 years ago
FREE POINTS FIRST TO ANSWER GETS BRANLIEST!!! :)
kicyunya [14]

Answer:

THX

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • The four basic stucture of computer are input processing output and storage true or false
    15·1 answer
  • ________ are found on the motherboard and are used to attach your hard disk.
    6·1 answer
  • What is a life cycle
    15·2 answers
  • Write a program that takes the radius of a sphere (a floating-point number) as input and then outputs the sphere’s: Diameter (2
    7·1 answer
  • If you define a destructor, are you required to define an operator '=' and a copy constructor?
    9·1 answer
  • When you need to cut new external threads on a bolt, which of the following tools should you use?
    9·2 answers
  • Send me the answers<br>​
    15·1 answer
  • State the function of the <br> BIOS,​
    11·1 answer
  • Your organization has 20 employees who need an accounting software update installed. Due to a miscommunication, the purchaser on
    6·1 answer
  • you are currently logged in using the badams account. you want to view the contents of the /etc/inittab file, but you are not al
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!