1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
2 years ago
9

Where could an identity theft access your personal information?

Computers and Technology
2 answers:
Naily [24]2 years ago
8 0
They can hack into you email or your phone number thats all they need to find where you live how old you are and etc hope this helps

Marta_Voda [28]2 years ago
8 0

Answer:

Both A and B is the correct answer.

Explanation:

You might be interested in
You are assigned by your teacher to perform the assembly of all the parts of the computer in preparation for the hands on activi
Alexus [3.1K]

Answer:

answer it yourself or ask your teacker

Explanation:

7 0
2 years ago
In your own words, explain the FNAF timeline
tatiyna

Answer:

see shawty problem is, I havent had that phase yet, my cousin would be able to answer this tho

3 0
3 years ago
One of the main responsibilities employers have under OSHA is to:
poizon [28]
What dose osha means please
7 0
3 years ago
Read 2 more answers
What does NVRAM stand for
Julli [10]
Non-Volatile Random Access Memory
7 0
3 years ago
Read 2 more answers
Is discord down right now?
Eva8 [605]

Answer:

yes it is

Explanation:

To do this, visit discord.com and login to the web version. Once logged in using the right credentials launch the app on your PC, discord should work properly now. Ensure the system is up to date. As a last resort, uninstall and reinstall the app again.

3 0
3 years ago
Other questions:
  • Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
    15·1 answer
  • Who is president is US
    5·1 answer
  • Helena purchased a security software package to protect her new laptop against threats such as spyware and computer viruses. she
    14·1 answer
  • Imagine your friend wants to apply
    5·1 answer
  • The interaction between information technology and organizations is influenced___________.A) solely by the decision making of mi
    12·1 answer
  • Define an I/O port. Which functions are performed by it?
    10·1 answer
  • When you gather primary or secondary data, what part of the market information management process are you participating in?
    8·1 answer
  • Use your editor to open the cc_data.js file and study the data stored in the staff object to become familiar with its contents a
    6·1 answer
  • What is an automatic update and when should you use it
    10·1 answer
  • WILL GIVE BRAINLIEST!! NO LINKS!!!
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!