1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
12

Where could identity theft access your personal information?

Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
6 0
From hacking into public websites where you pay and stuff, or put in a fake official window to lure out your private info.
77julia77 [94]3 years ago
5 0
They could best acess it threw ur settings due to the fact thats where mainly everything is stored, all the info data and passwords are located
You might be interested in
When you save something to the Desktop on a school computer, what drive letter will it save to
Natali [406]

When you save something to the Desktop on a school computer, the drive letter it will save to the C drive.

<h3>What is a C drive?</h3>

C drive is that part of the computer that contains the operating system and files of the system. The files on which we worked are saved on the C drive of the system.

This is a type of hard drive. The work we have done on the system is automatically saved on the drive. We can easily find the C drive on the computer's file explorer. It automatically saved the data, but you can save manually the data of the D drive.

Thus, the drive letter it will save to the C drive.

To learn more about C drive, refer to the link:

brainly.com/question/2619161

#SPJ1

4 0
2 years ago
Assume the variable costOfBusRental has been declared as an int and assigned the amount that it costs to rent a bus. Also assume
Basile [38]

It’s a total price divided to a number of riders involved. So costPerRider = costOfBusRental/maxBusRiders

4 0
3 years ago
Which key toggles between insert mode and overtype mode?
andrew-mc [135]
The keyboard key that toggles between insert mode and overtype mode is the INSERT key.
7 0
3 years ago
Binary Number Cards
Sedaia [141]

Answer:

13: 1101

5: 0101

10: 1010

2: 0010

Explanation:

The binary system, on the other hand, is a base-2 number system. That means it only uses two numbers: 0 and 1. When you add one to one, you move the 1 one spot to the left into the twos place and put a 0 in the ones place

what is done with the dice is to have an example of how binary numbers are made until 15

5 0
3 years ago
What’s is arc lightning
Naya [18.7K]
It’s a lamp that produces light by a electric arc
8 0
3 years ago
Other questions:
  • what is the largest possible number of internal nodes in a redblack tree with black height k? what is the smallest possiblenumbe
    11·1 answer
  • Most graphics software uses a process called pixel _________ to create new pixels by averaging the colors of nearby pixels.â
    6·1 answer
  • Software that interprets commands from the keyboard and mouse is also known as the
    8·1 answer
  • You have deployed your Ethernet cable near a generator, whose heat is effecting the cable in a way that its energy is lost. If s
    11·1 answer
  • When you are given a set of tables and asked to create a database to store their data, the first step is to ________?
    8·1 answer
  • Given that arrayIntValues [MAX_ROWS][MAX_COLUMNS] is a 2 dimensional array of positive integers, write a C++ function howManyEve
    11·1 answer
  • A computer (mainframe, server, or workstation) that has an operating system enabling _____________ to access it at the same time
    11·1 answer
  • The definition of network is:
    10·1 answer
  • To cope with the uncertainty about how their pages will be viewed, many web page designers opt to use _________ units, which are
    13·1 answer
  • You are planning to depart on a flight from area 2 to area 4 in 12 hours. What weather is forecast to occur along your route?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!