1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kirill [66]
3 years ago
9

If you've been a victim of identity theft, what should you do after contacting the company that reported the suspicious charge a

nd issuing a credit fraud report?
Computers and Technology
1 answer:
Fittoniya [83]3 years ago
7 0
You would want to contact the police and file a police report
You might be interested in
What is the name of a robot astronaut created by NASA
dsp73

<span>
The name of the robot astronaut created by NASA is Robonaut 2.</span>

<span /><span>This robot has arm, legs, a head and a torso. It even has fingers so that it is able to use the same tools that is used by human astronauts. </span>

<span> Hope this helps. :)</span>

4 0
3 years ago
Read 2 more answers
What does Intel mean in this phrase(collect all intel).
aksik [14]
<span>It's short for "intelligence". The phrase means 'collect all information'.</span>
6 0
3 years ago
Read 2 more answers
Which of the following is the most abstract?
marysya [2.9K]

D. The word "food" is the most abstract because it is the least specific and does not specify what food it is exactly.

Hope this helps!! :)

4 0
3 years ago
Read 2 more answers
Complete the sentence to identify disadvantages of top-down programming design. Choose all that apply. Top-down programming desi
pav-90 [236]

so is it all about codes and codes and codes and codes and codes lol

4 0
3 years ago
To increase security on your company's internal network, the administrator has disabled as many ports as possible. Now, however,
tia_tia [17]

Answer: 443

Explanation:

Port 443 will need to be enabled for secure transactions to go through because it is the default port for HTTPS which is the transfer protocol for secure communication.

This way your credit card transactions will be encrypted to ensure protection from those who would seek to steal your data and your money.  

8 0
3 years ago
Other questions:
  • For C++ (please make sure it runs properly)
    14·1 answer
  • Name some of the file extensions for images and provide more information about one or two of them.
    12·1 answer
  • Advancement in technology is making peripherals...
    5·2 answers
  • An automated search feature used by search engines to find results that match your search terms is called a spider or ?
    5·1 answer
  • The amount of data produced worldwide is increasing by ___% each year.
    5·1 answer
  • ________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the
    15·1 answer
  • What is java Encapsulation?​
    6·1 answer
  • An important goal of biosecurity training is to: Prevent laboratory accidents that could expose personnel to hazardous agents. P
    13·1 answer
  • Activity Sheet 2<br>A.Illustrate how to create the object below using draw and modify commands.​
    15·1 answer
  • Class Main {
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!