1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
15

How can you avoid becoming a victim of identity theft?

Computers and Technology
2 answers:
8_murik_8 [283]3 years ago
7 0

Avoid using easily available information, such as your mother's maiden name, your birth date, the last four digits of your social security number, your phone number, etc. Carry only the minimum amount of identifying information and number of credit cards that you need.

Anna007 [38]3 years ago
6 0
1. change your pw every month. 
2. dont give out your pw.


I hope this helps and have a wonderful day!!

<3
You might be interested in
When the narrator of "EPIC 2015" describes the year 2015 as the "worst of
denpristay [2]

Answer:

A. computers will be replaced by new technology

3 0
3 years ago
Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses
iris [78.8K]

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

4 0
3 years ago
Question 1
Ivanshal [37]

Answer:

Q1. B

Q2. D

Explanation:

3 0
2 years ago
Read 2 more answers
Q-3 A technician is setting up a computer lab. Computers on the same subnet need to communicate with each
Tasya [4]

Answer:

the answer would be B proxy server

4 0
4 years ago
Number of byte required to store illumination
Rina8888 [55]
If we are talking about light that’s an whole different subject
5 0
3 years ago
Other questions:
  • Which of the following information sources was not directly affected by the Telecommunications Act of 1996?
    12·1 answer
  • How long does a bankruptcy affect your financial reputation
    13·1 answer
  • What is one method that can be used to open the Microsoft Word application?
    8·1 answer
  • This problem has been solved!
    8·1 answer
  • I need help. I wanna help a friend by giving him my powerpoint but I dont want him to steal my work. Is their anyway to restrict
    8·1 answer
  • The Yuba College Library would like a program to calculate patron fines for overdue books. Fines are determined as follows: Pape
    15·1 answer
  • You looked at the methods used to determine database requirements. Now, research and find a database requirements template. Choo
    9·1 answer
  • Which is the full form of COPA​
    13·2 answers
  • What does a blinking yelow light mean on a phillips sonicare toothbrush
    9·1 answer
  • Mention and explain various alignment options​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!