1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
13

Where could an identity theft access your personal information?

Computers and Technology
2 answers:
noname [10]3 years ago
8 0
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
rjkz [21]3 years ago
4 0
<h2>Answer:</h2>

Identity thieves look for credit card bills, bank statements, medical bills and insurance, and old financial forms such as old tax forms.

<h2>Explanation:</h2>

The most usual and common way is when an individual commits a crime under another person's name.  Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund

You might be interested in
Which of the following is not a true statement? a. Data flow diagrams and flowcharts are difficult to prepare and revise using s
Nimfa-mama [501]

Answer:

a. Data flow diagrams and flowcharts are difficult to prepare and revise using software packages.

Explanation:

A data flow diagram is a graphical description of the source and destination of data that shows how data flow within an organization.

Documentation tools are used extensively in the systems development process.

Data flow diagrams and flowcharts are the two most frequently used systems development documentation tools. Also, documentation tools save an organization both time and money.

7 0
3 years ago
Which of the following best describes the protocols used on the Internet?
ASHA 777 [7]

Answer:

C: The protocols of the Internet are open and used by all devices connected to the network

Explanation:  Hope this helps.  

There are billions of devices connected to the Internet, and hundreds of different kinds of devices: laptops, tablets, phones, refrigerators, handheld credit card readers, and so on. Protocols (standards) ensure that the variety of devices interact with each other smoothly.  There are a lot of protocols! The Internet was designed with several layers of abstraction that sort the protocols according to what part of the process they support.

4 0
3 years ago
Which of the following is a part of a DML statement? a. CREATE b. ALTER c. DROP d. SELECT. SE_LECT
Margaret [11]

d. SELECT

"SELECT" is a part of a DML statement.

What is DML?

DML, or Data Manipulation Language, is a subset of database operations used to insert, delete, and update data. A DML is frequently a sublanguage of a larger language, such as SQL; DML includes some of the language's operators. Because some users can perform both read and write selection, selecting read-only data is closely related to and sometimes considered a component of a DML.

Structured Query Language, or SQL, is a popular data manipulation language that is used to retrieve and manipulate data in a relational database. SQL allows you to perform database operations as well as create databases. SQL performs the required tasks by using specific commands such as Create, Drop, Insert, and so on.

To know more about DML, visit: brainly.com/question/25757965

#SPJ4

8 0
1 year ago
In addition to librarians, what other type of worker would you expect to find employed in a school or library
diamong [38]
In a school or library you can find a managor or boss

3 0
4 years ago
Read 2 more answers
I NEED HELP PLEASE!! I just wanted to upgrade my i3 processor to an i7. I bought new hardware (motherboard, fan, etc) and now th
Dafna11 [192]

Answer:

Your processor might be incompatible with motherboard

Explanation:

One major thing to keep in mind while upgrading a PC hardware is comparability among hardware. If you are using incompatible hardware it can cause issues like this. There are websites available to let you check the compatibility of different components.

As you mentioned you upgraded your cpu and motherboard. Does your motherboard has the correct version of chipset to run new cpu. Do notice if there are any beep sounds when you power up your PC. If you don't hear beeps than your motherboard might be dead.

6 0
4 years ago
Other questions:
  • Write a unit test for addInventory(). Call redSweater.addInventory() with parameter sweaterShipment. Print the shown error if th
    9·2 answers
  • When programming, the word "execute" means which of these?
    13·1 answer
  • Who usually signs a collection letter?
    15·2 answers
  • What is the focus of developers interested in the Internet of things?
    11·2 answers
  • ____________ is a series of numbers that identifies a particular computer. They may or may not be a reliable way to link you to
    14·1 answer
  • Which of the following modes of replication requires a very low latency network connection and ensures data remains in synch wit
    13·1 answer
  • Spreadsheet software can be used to do all the following except _____.
    5·2 answers
  • What are the ten application areas of computer?​
    10·1 answer
  • Anyone help me please​
    6·2 answers
  • Click to review the online content. Then answer the question(s) below, using complete sentences. Scroll down to view additional
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!