1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
13

Where could an identity theft access your personal information?

Computers and Technology
2 answers:
noname [10]3 years ago
8 0
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
rjkz [21]3 years ago
4 0
<h2>Answer:</h2>

Identity thieves look for credit card bills, bank statements, medical bills and insurance, and old financial forms such as old tax forms.

<h2>Explanation:</h2>

The most usual and common way is when an individual commits a crime under another person's name.  Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund

You might be interested in
Suggest why people might not want the government to carry out Internet surveillance?​
Vadim26 [7]
Suggest why people might not want the government to carry out Internet surveillance?
To see your history all that p o r n ya watch
Pls mark me brainliest;p
3 0
3 years ago
Read 2 more answers
. In Laissez-faire Styleof Group Leadership, Members of the group are not given help inactivity plans by the leader only when it
Trava [24]

Answer:

The statement is false.

Explanation:

In Laissez-faire Style of group leadership, the members of the group are given all the responsibilities by the leader or the manager. The members of the group take all the decisions and control the working of the group. The manager provides with some guidance or support only when it is asked by the group members.

4 0
3 years ago
What happens if you have Param 1 in your ad, but there is no corresponding value at the keyword level?
nika2105 [10]
Without it, you at will no severe
4 0
4 years ago
Read 2 more answers
What are the charactaristic of computer with virus​
NISA [10]

Explanation:

One of the main characteristics of computer viruses is related to the fact that they are programs created by hackers that attack the code of a computer, infecting files on the computer's hard drive or its source code. Once the virus has been copied onto the computer, it can contaminate other computers that come into contact with the machine.

5 0
3 years ago
Read 2 more answers
Something is wrong with the logic in the program above. For which values of time will the greeting "Good Morning!" be displayed?
Klio2033 [76]

Answer:

There is logic problem in condition of elseif statement that is (time<20).

Explanation:

elseif(time<20) will be true for time<10 that means program will never greet good morning as to make logic correct either change condition from <em>elseif(time<20)</em> to <em>elseif(time<20&& time>=10)</em>. Or change the order of condition like check first for <em>elseif(time<10) </em>

solution 1

if (time < 6) { greeting = "It is too early!"; }

else if (time < 20 && time>=10) { greeting = "Good Day!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

solution 2

if (time < 6) { greeting = "It is too early!"; }

else if (time < 10) { greeting = "Good Morning!"; }

else if (time < 20 ) { greeting = "Good Day!"; }

else { greeting = "Good Evening!"; }

console.log(greeting);

7 0
3 years ago
Other questions:
  • Describe the three functions of all programming languages and list at least two specific examples of each. The examples can be f
    15·2 answers
  • Which computer port transmits audio and video without the need for compression?
    6·1 answer
  • Which term refers to actions that you would typically perform on a computer to revive it if it functions in an unexpected manner
    15·2 answers
  • Which of the following is an example of a direct payment subsidy?
    12·1 answer
  • / List the seven basic internal components found in a computer tower.
    5·2 answers
  • You can set a ________, which is automatically displayed in a field unless the user enters something different.
    14·1 answer
  • ____ is the only automated disk-to-disk tool that allows you to copy data to a slightly smaller target drive than the original s
    5·1 answer
  • Create a new Java project/class called ChangeUp. Create an empty int array of size 6. Create a method called populateArray that
    11·1 answer
  • For a business that is properly using a social media information system, the system can
    13·1 answer
  • The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Pape
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!