1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Angelina_Jolie [31]
3 years ago
9

Where could an identity theft access your personal information

Computers and Technology
2 answers:
Nikolay [14]3 years ago
5 0
Hello!

The identity theif could establish a new identity for ciminal purposes using YOUR identity and personal information, and the theif could aquire money or goods from it.

*PLAGIARISM FREE*
kompoz [17]3 years ago
3 0
A way that an identity theft can access your personal information would be from: From stored password data on your cell phone. And sometimes while on public wifi
Hope this helps!
<3
You might be interested in
Unnecessary duplication of data in a database is referred to as:.
harina [27]

Answer:

Data Redundancy

Explanation:

It is a data organization issue that allows the unnecessary duplication of data within your Microsoft Access database.

Hope this helps ^v^

3 0
3 years ago
Select the correct text in the passage.
sergejj [24]

Answer:

2. Scientists use seismometers to measure the earthquake activity that occurs beneath a volcano. They then predict the eruption of that volcano.

Explanation:

The options are:

1. Before a volcano erupts, earthquake activity beneath the volcano decreases.2. Scientists use seismometers to measure the earthquake activity that occurs beneath a volcano. They then predict the eruption of that volcano.3. When a volcano erupts, the amount of carbon dioxide and sulfur dioxide emitted decreases. 4.Scientists measure the amount of these gases to determine the amount of magma present in the volcanic reservoir.

The answer is certainly 2. as seismometers are being used to find out the details of the earthquake activities which occur inside a volcano. And with this information, the volcanologists then predict the eruption of that particular volcano. Hence, the 2nd option does not have any factual errors, and all the others have factual errors.

5 0
3 years ago
ead the spreadsheet formula below, then answer the question. =SUM(C6:C9) What does the : symbol in the formula do? arranges the
melamori03 [73]
Selects all the cells in the range c6 to c9
3 0
3 years ago
Which item is not part of a college application?
Tasya [4]
A. Letter of reference from people who have worked with you in the past.
4 0
3 years ago
Read 2 more answers
Which type of installation should be used when you want to keep the program and data files that already exist on an earlier vers
34kurt
I would use a custom installation.
5 0
3 years ago
Other questions:
  • This question involves the creation of user names for an online system. A user name is created based on a user’s first and last
    13·1 answer
  • What can I do with this? Lol
    15·1 answer
  • Which part of the Word application window should the user go to for the following activities?
    14·1 answer
  • There are some network modeling tools that can ________ the existing network.
    12·2 answers
  • Write a function that converts a string into an int. Assume the int is between 10 and 99. Do not use the atoi() or the stoi() fu
    6·1 answer
  • Davingould1115...................answer 3​
    11·1 answer
  • Which is the most correct option regarding subnet masks?
    10·1 answer
  • Guys, if I'm going back to 505 and it's a 7-hour flight or a 45-minute drive how do I get to 505?
    12·1 answer
  • Debbie can use the feature in the email to copy her manager on the email without her colleague knowing she did so
    13·1 answer
  • The term ____ refers to the use of a single unifying device that handles media, internet, entertainment, and telephone needs.Dig
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!