1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
9

Where could an identity theft access your personal information

Computers and Technology
2 answers:
Nikolay [14]3 years ago
5 0
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
kompoz [17]3 years ago
3 0
A way that an identity theft can access your personal information would be from: From stored password data on your cell phone. And sometimes while on public wifi
Hope this helps!
<3
You might be interested in
Which directory in the FHS stores programs and configuration information that can only be executed and modified by the root user
dlinn [17]

Answer: /sbin

Explanation:

In Linux, FHS describes the directory content and the way in which Operating System files are displayed to the user.

/sbin is a directory that contains executable programs. s/bin is the short form of system binaries. System binaries require root rights to perform specific tasks. /sbin contains binaries that are crucial to boot the system and also to recover and restore the system. /bin directory also contains the commands to boot the system but the main difference between both is that /sbin programs can only be executed by the root user. Examples are fdisk, fsck, root,halt, init, grub, ifconfig.

4 0
3 years ago
What should students hope to get out of classroom discussions? Check all that apply.
Dafna11 [192]

Answer:

The answer is A,C,E,F

Explanation:

3 0
3 years ago
Read 2 more answers
Which of the following is not a benefit of normalization?
mixer [17]

Answer:

The answer is option (4) Maximize redundancy as normalization minimizes redundancy of data.

Explanation:

Normalization of databases leads to minimization of data redundancy in databases. It doesn't maximize data redundancy. Data redundancy leads to wastage of resources. Normalization of databases minimizes insertion anomolies. Normalization of databases minimizes deletion anomolies. Normalization of databases minimizes updation anomolies.  So , the answer to the question is option (4) maximize redundancy.

8 0
3 years ago
Please discuss what you consider to be some of the biggest challenges your company will face when working from the Linux command
Nastasia [14]

Answer:

Command remembering issues.

Explanation:

The biggest challenge my company will face when working on Linux is remembering issues of the commands. The commands in Linux are a bit difficult to remember as they are complicated bit but practice can solve this issue. "Practice makes a man perfect" this well known saying suggests that practice can make perfect and this well known saying also works with Linux the more practice the employees do the more perfect they get.

3 0
3 years ago
Since the 1960s, there have been five major generations, or cycles, of computing. Which represents those generations in order?
sergiy2304 [10]

Answer:a) Mainframes, miniframes, PCs, desktop Internet computing, mobile computing

Explanation: The hierarchy of the computers or computing are in the generation is:-

  • Mainframe:-designed for the execution of huge data processing , storage and execution.
  • Miniframe:-has similar functioning as the mainframe but on smaller scale and version.
  • Personal computer(PC):-It is designed for the individual purpose and according the need of the user.
  • Mobile computing:-computing that can be done on the mobile phone similar to the computing on the personal computer
  • Internet computing:-the computing of the mobile and computer system with the facility of the internet connectivity.

7 0
4 years ago
Other questions:
  • How many spaces is equal to one tab on a keyboard? When I compose emails, the tab button doesn't indent for me, so how many time
    7·1 answer
  • What laptops can you get for 2500$ and should mostly using Microsoft applications.
    14·2 answers
  • A company has recently learned of a person trying to obtain personal information of employees illegally. According to which act
    15·2 answers
  • Although “dog.jpg” and “dog.JPG” and “Dog.jpg” and “DOG.JPG” all appear to be the same file, they are not considered the same wh
    6·1 answer
  • Instructions:Select the correct answer from each drop-down menu. What type of font color should Kim select if she chooses a dark
    10·2 answers
  • Given the business rule "an employee may have many degrees," discuss its effect on attributes, entities, and relationships. (Hin
    10·1 answer
  • Suppose you are developing a data visualization application DataViz which calls some functions from a statistics library class S
    5·1 answer
  • What are the concerns surrounding 5G cellular networks?​
    6·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • To make changes to how UAC operates, you must be logged in as administrator true or false
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!