1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
insens350 [35]
3 years ago
12

What type of attacker is most likely to use information you have posted about yourself on a social networking site?

Social Studies
2 answers:
bogdanovich [222]3 years ago
6 0

Answer:

The correct answer to this question: What type of attacker is most likely to use information you have posted about yourself on a social networking site, would be: an identity thief.

Explanation:

Identity theft has become a really big problem today, given the constant connection that people have through the Internet. Since most of our information, personal, and otherwise, are now stored in servers, computers, social media, they are easy prey for specialized hackers whose only purpose is to steal that information in order to use it for various reasons. Just like they can steal such vital information as financial records, banking records, identity numbers, they can also steal things that are posted on social media, like photos, contacts, and others things. These people who dedicate to that activity are called identity thieves.

Trava [24]3 years ago
5 0

a cyber-attacker or a person who attacks someone online

You might be interested in
. Three primary, broadest categories of living things.
Harlamova29_29 [7]
Domain - Archea, Eubacteria, Eukaryote.
Kingdom - Plantae, Animalia, Fungi, Protists, Eubacteria (Monera), Archaebacteria.
Phylum.
Class.
Order.
Family.
Genus.
Species - smallest classification.
Archaea: very ancient prokaryotic microbes.
Eubacteria: More advanced prokaryotic microbes.
Eukaryota: All life forms with eukaryotic cells including plants and animals.
5 0
2 years ago
The governments of Norway, Sweden, the Netherlands, and the United Kingdom are all examples of __________.
worty [1.4K]
They are all constitutional Monarchies!

A constitutional monarchy is a country that has a monarch, that is a queen  or a king (such as Queen Elisabeth in the United Kingdom) but which at the same time has a constitution which is the supreme law of the land. In such countries typically the monarch only has a representative function.
5 0
2 years ago
Read 2 more answers
Which of the following statements about the women's suffrage movement is most accurate?
Margaret [11]
The statement that is the most accurate about the women's suffrage movement is that m<span>any different strategies were used over several decades to accomplish women's suffrage. </span>
6 0
2 years ago
Who did the Spanish enslave to use to take gold and silver from the mines of Mexico and Peru?
Bingel [31]

Answer:

The Asiento, the official contract for trading in slaves in the vast Spanish territories was a major engine of the Atlantic slave trade. When Spain first enslaved Native Americans on Hispaniola, and then replaced them with captive Africans, it established unfree labor as the basis for colonial mass-production.

HOPE THIS HELPED!!!!!!!!!!!!!!! XDDDDDDDDDDDD

5 0
3 years ago
Read 2 more answers
Which motivation theory might explain one’s need for financial security?
drek231 [11]
The correct option is HUMANISTIC THEORY OF MOTIVATION.
This theory is based on the fact that humans have basic needs, which must be met. The basic physiological needs of man include food, water, shelter and clothing. One needs money to secure all these needs. Thus financial security is one of the component of humanistic theory of motivation.<span />
7 0
3 years ago
Other questions:
  • Which theorist(s) would agree with the idea that we automatically feel startled by a sound before we label it as a threat? canno
    9·1 answer
  • The level of government right below the state is what that has jurisdiction over a single population center is what
    10·1 answer
  • In the initial milgram study, the experimenter asked participants to shock someone else whenever that person made a mistake on a
    13·1 answer
  • According to the bill hammack the engineerguy light travels down a fiber optic cable by a process known as
    14·1 answer
  • The fact that many assaults are committed by people wearing disguises—and that these disguised assaults are often the most vicio
    10·1 answer
  • Who was Virginia Dare?
    5·2 answers
  • Elements that make up a civilization
    12·2 answers
  • Which statement best reflects a motivation for European exploration and colonization of North America? "We must escape the sprea
    14·1 answer
  • 5 propuestas para el gobierno escolar​
    7·1 answer
  • True or false the independent assessment (ila) process is designed to strengthen program support and cost-effectively enhance su
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!