1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
borishaifa [10]
3 years ago
12

Where could identity theft access your personal information?

Computers and Technology
2 answers:
riadik2000 [5.3K]3 years ago
6 0
From hacking into public websites where you pay and stuff, or put in a fake official window to lure out your private info.
77julia77 [94]3 years ago
5 0
They could best acess it threw ur settings due to the fact thats where mainly everything is stored, all the info data and passwords are located
You might be interested in
List three social implications of the wider range of piracy​
liraira [26]

Answer:

Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.

7 0
3 years ago
Name two components required for wireless networking<br>(answer fastly)​
Luden [163]

Explanation:

User Devices. Users of wireless LANs operate a multitude of devices, such as PCs, laptops, and PDAs. ...

Radio NICs. A major part of a wireless LAN includes a radio NIC that operates within the computer device and provides wireless connectivity.

or routers, repeaters, and access points

5 0
2 years ago
WILL GIVE BRAINLIEST!!!!!!!
denpristay [2]

Answer:

A drill is one of the most important tools a dentist can have. They run on pneumatic systems which gives the drill power and precision.

Explanation:

So, false

3 0
2 years ago
Read 2 more answers
You enter information by keying it into the??​
Greeley [361]

Answer:

password and username

Explanation:

3 0
2 years ago
Read 2 more answers
The node of a doubly linked list contains _____.
meriva

Answer:

Hi!

The correct answer is one data field and two links fields.

Explanation:

The node of a doubly-linked list contains one data field, and two links fields that references to the next node on the list and another one link field that references to the previous node in the sequence of nodes).

3 0
3 years ago
Other questions:
  • Comparing tools made of stone, iron, and bronze: place them in the correct order from least to most durable
    14·1 answer
  • Which of the following branches of government is NOT involved in Discretionary Fiscal Policy?
    8·1 answer
  • Which is a circuit board located behind an LCD screen on a laptop?
    7·1 answer
  • Consider the following code: // Merge mailing list m2 into m1 void merge (MailingList m1, MailingList m2) { for (int i = 0; i &l
    12·1 answer
  • What happens to a data table when the formulas or variables used to create it are changed?
    9·2 answers
  • Does anyone know a good reason WHY to change your username.
    5·1 answer
  • A term to describe articles that can be displayed in their entirety,as opposed to abstract and references only
    11·1 answer
  • How much would it cost to get the screen replaced on a Moto G7?
    10·1 answer
  • Which of these are examples of an access control system? Check all that apply.
    7·1 answer
  • 2. what are the advantages of breaking up a single logical message into a number of fixed-sized packets and then sending each on
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!