1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
hodyreva [135]
3 years ago
15

How can you avoid becoming a victim of identity theft?

Computers and Technology
2 answers:
8_murik_8 [283]3 years ago
7 0

Avoid using easily available information, such as your mother's maiden name, your birth date, the last four digits of your social security number, your phone number, etc. Carry only the minimum amount of identifying information and number of credit cards that you need.

Anna007 [38]3 years ago
6 0
1. change your pw every month. 
2. dont give out your pw.


I hope this helps and have a wonderful day!!

<3
You might be interested in
Daniel makes changes to a workbook named “Results.” He saves the file as “New Results” but did not realize that a worksheet name
elena55 [62]
All he would need to do is go into the sheet and change the name again. This will change the HTML so the computer will not be confused. The name should make sense, but he completely different from the original name :)
7 0
4 years ago
We canconnect  two or more computer together using cables true or false​
jekas [21]

This is true for most modern computers

8 0
3 years ago
This operating system was used by individual computers and required users to type commands.
In-s [12.5K]

Answer:

MS-DOS is your answer

Explanation:

6 0
3 years ago
A final class can't be extended.TrueFalse
PIT_PIT [208]

Answer:

True

Explanation:

A final class is something like sealed one and no one can inherit that further.

it is useful to lock our code or functionality from others

4 0
3 years ago
Match each of the following terms to its function:_________
Crazy boy [7]

Answer:

I = B

II = E

III = A

IV = D

V = C

7 0
3 years ago
Other questions:
  • Ryan is looking at investment opportunities as a cloud service provider. He wants to invest in a deployment-based cloud model th
    11·2 answers
  • Hunter took his sick puppy to Jade to get medication. Jade is
    14·2 answers
  • When you purchase software in a box, reading the ________ is important to know if the software will function properly?
    13·1 answer
  • I stole you pokemon cards :o
    6·2 answers
  • (3 points) Write a program to process two large chunks of data (e.g., a large 3D array and an array of self-defined structures w
    11·2 answers
  • What will be the output after the following code is executed? def pass_it(x, y): z = y**x return(z) num1 = 3 num2 = 4 answer = p
    7·1 answer
  • Please tell me the answer
    5·1 answer
  • What is the difference between private inheritance and composition?
    11·1 answer
  • What is the HCF of smallest prime number and the smallest composite number?​
    12·1 answer
  • You're doing desktop support and the company policy is that you can only help with company equipment. A user walks in:
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!