1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
15

How can you avoid becoming a victim of identity theft?

Computers and Technology
2 answers:
8_murik_8 [283]3 years ago
7 0

Avoid using easily available information, such as your mother's maiden name, your birth date, the last four digits of your social security number, your phone number, etc. Carry only the minimum amount of identifying information and number of credit cards that you need.

Anna007 [38]3 years ago
6 0
1. change your pw every month. 
2. dont give out your pw.


I hope this helps and have a wonderful day!!

<3
You might be interested in
Choose the risks from the options below to presenting yourself differently online than offline?
pantera1 [17]
The answers are A and D.
6 0
3 years ago
Which of the Arts, A/V Technology, and Communication career cluster pathways are involved with producing a product for an audien
PIT_PIT [208]

I believe the pathways are Audio/Visual Technology and Film, Journalism and Broadcasting and Printing Technology .


5 0
3 years ago
Read 2 more answers
Which comparison operator is valid for greater than or equal to?<br><br> &gt;<br> &gt;=<br> =&gt;
lys-0071 [83]
The second one, it should be the one that is opening left with a line underneath, the images are unclear but that’s the most likely correct answer !
3 0
3 years ago
_______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
postnew [5]

Answer: Computers as target

Explanation:

Whenever an authorized  access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.

8 0
3 years ago
1 paint 2 anahaw leaf 3 shellac 4 varnish 5 metal sheets 6 paint 7 G.I. pipe 8 enamel paint 9 bamboo 10 fillers
Aleksandr-060686 [28]

?????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????

8 0
2 years ago
Other questions:
  • Adam would like to reduce the size of an image that he inserted into a document. He selects the image and chooses the Crop optio
    11·2 answers
  • How can I use the internet/social media to protect my identity?
    14·1 answer
  • How is a computer component, such as a network card, commonly marked for identification?
    12·1 answer
  • Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessar
    6·1 answer
  • What is the name of the amount of space between the content of a document and the edge of the page
    13·1 answer
  • Graphic design includes typefaces, page layouts, corporate logos, and product packaging. Which modern graphic designer is best k
    14·2 answers
  • Effective display designs must provide all the necessary data in the proper sequence to carry out the task. Identify a recent pe
    12·1 answer
  • The set of rules for how computers talk to one another
    6·1 answer
  • நெறி என்னும் சொல்லின் பொருள்___ *​
    14·1 answer
  • What does this function do in the code?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!