1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
malfutka [58]
3 years ago
9

Where could an identity theft access your personal information?

Computers and Technology
2 answers:
Naily [24]3 years ago
8 0
They can hack into you email or your phone number thats all they need to find where you live how old you are and etc hope this helps

Marta_Voda [28]3 years ago
8 0

Answer:

Both A and B is the correct answer.

Explanation:

You might be interested in
Survey data are collected by using all of these methods EXCEPT
castortr0y [4]

Answer:

Survey data are collected by using all of these methods except Field Research.

Explanation:

In field research data has been gathered from different experiments, qualitative analysis and observations of any event.

On the other hand, survey data can be collected from Following:

<u>structured interview</u><u>:</u>

where data can be gathered by interviews and analyzed it on quantitative basis.

<u>Face to face questionnaires:</u>

Data has been collected by asking questions directly from users in the form of interview.

<u>self-administered questionnaires</u>

In this research, questionnaire has been designed to asked question related to some topic without conducting interview.

8 0
4 years ago
(Game Design) Game Freak, the creators of Pokemon, are an example of a(n):
bixtya [17]
D. Indie developer. Independent video game development, or indie game development, is the video game development process of creating indie games; these are video games, commonly created by individual or small teams of video game developers and usually without significant financial support of a video game publisher or other outside source.
7 0
3 years ago
What tool checks the spelling of each word against the programs internal dictonary?
Darina [25.2K]
Answer: Spell checker tool
5 0
4 years ago
Programmers refer to programs that contain meaningful names as ____. AnswerThe answer is: Programmers refer to programs that con
andreyandreev [35.5K]
Self documenting, we also make comments.
3 0
3 years ago
HAS ANYONE SEEN THIS FROM BRAINLY BEFORE
FromTheMoon [43]

Answer:

yes that's what happened to me!

Explanation:

4 0
3 years ago
Read 2 more answers
Other questions:
  • I'll pay 50 dollars to anyone who can do this leave your snap after answering doing it and ill cash app it
    13·1 answer
  • Many of the special staff teams require leadership training, which is offered to staff with more than 1 year of service at Camp
    15·1 answer
  • Write an application named EnterUppercaseLetters that asks the user to type an uppercase letter from the keyboard. If the charac
    5·1 answer
  • What is a computer briage coures​
    15·1 answer
  • Which button could Pamela press in the Microsoft Word spell checker to make the word “colour” instantly change to “color” whenev
    11·1 answer
  • Use the word bank to identify each description.
    6·1 answer
  • The scientific process is most similar to what
    10·1 answer
  • Escribe un ejemplo de:• Software de aplicación. • Software de diagnóstico. • Software de sistema. ayudenme plis, me toca entrega
    10·1 answer
  • Question 1 (1 point)
    9·1 answer
  • I NEED HELP, DO ASAP <br> Why do you have to adjust toys for different ages?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!