1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Natali [406]
3 years ago
13

Where could an identity theft access your personal information?

Computers and Technology
2 answers:
noname [10]3 years ago
8 0
Hey there!

Here is your answer:

<u><em>The proper answer to your question is "through websites".</em></u>

Reason:

<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>

Therefore the answer is using unsafe websites.

If you need anymore help feel free to ask me!

Hope this helps!

~Nonportrit
rjkz [21]3 years ago
4 0
<h2>Answer:</h2>

Identity thieves look for credit card bills, bank statements, medical bills and insurance, and old financial forms such as old tax forms.

<h2>Explanation:</h2>

The most usual and common way is when an individual commits a crime under another person's name.  Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. An identity thief can file a tax refund in your name and get your refund

You might be interested in
The architecture that the large paper company Mohawk adopted enables the company to scale technology services up and down instan
arlik [135]

Answer: (C) Service-oriented

Explanation:

 The service-oriented architecture is the one of the type of software design which provide various types of service and application over the network by using different type of communication protocols.

  • The service oriented architecture is basically based on the distributed computing on the different types of platform.

 This architecture design is mainly based upon the reply and request service from client to the server and vice versa. The service oriented architecture works on the basic principle is that the technology and the products should be independent.

Therefore, Option (C) is correct.

6 0
3 years ago
Controlled intersections use some form of which of the following:
Genrish500 [490]
A.all of the above it is correct 
7 0
3 years ago
WILL GIVE BRAINLIEST!!!!!!!
pishuonlain [190]

Answer:

False

Explanation:

Central Louisiana Regional Port is the small river port (not in a top 100 ports), while New Orleans Port is  $100 million a year reveniew huge port, 7th busiest in US.

3 0
3 years ago
Discuss why diffrent user interface require the use of diffrent type of input device<br>​
Bas_tet [7]

Discuss why different user interfaces require the use of different types of input device. Page 15. What is Secondary Storage? List 3 Storage Mediums: What is ...

mark me brain list

7 0
3 years ago
which of the following statements about servers is correct A. servers are computers on a network that share their resources with
givi [52]
A server can have many definitions, but in this particular case, the answer is A.  
7 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is an example of a logic bug?
    8·1 answer
  • What should a career plan include?
    7·1 answer
  • Explain what all sensory receptors have in common.
    14·1 answer
  • What's the 16-bit hexadecimal representation of the signed decimal integer, -331? Answeers?
    14·1 answer
  • When preparing a document flowchart, the names of organizational departments or job functions should appear in theA) column head
    6·1 answer
  • Write a java program that prompts the user to input the elapsed time for an event in hours, minutes, and seconds. The program th
    13·1 answer
  • What will you see on the next line after the following lines of code?
    12·1 answer
  • Could u give me brief summary of New Years
    14·2 answers
  • How to execute python code in command prompt *window*?
    5·1 answer
  • China's cultural diversity, China is composed of 56 ethnic groups.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!