1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
BartSMP [9]
3 years ago
7

How did a hacker get my phone number? I commented on his lnstagrm and then he called me. Please help someone.

Computers and Technology
1 answer:
barxatty [35]3 years ago
3 0

Although blocking them might help, check to see if you have your phone number public if you do remove it, you may want to get your phone number changed.

Hope I could help you!

Ben :)

You might be interested in
what is created when the movement of light is blocked by an object and cannot pass through the other side?
larisa86 [58]
A shadow is created.
7 0
3 years ago
Read 2 more answers
Connection-oriented protocols protect against dropped data by forming connections and using what type of constant stream?
nataly862011 [7]

Answer:

A real constany

Explanation:

5 0
3 years ago
A compound boolean expression created with the ___ operator is true only if all its connected expressions are true.
kiruha [24]
The answer to this is OR..I think..Hope i helped
4 0
3 years ago
C++ Question: what is in the blanks?
Igoryamba

You didn't specify what the program should output, so there are many possibilities that result in a working program. It *looks* like this was intended:

int x = 24;

int y;

y = x-12;

cout<<y<<endl;

and it will display 12.

8 0
3 years ago
Nearly all personal computers are capable of serving as network servers.
Mashutka [201]
True
yes computers are capable of serving network servers.
6 0
3 years ago
Read 2 more answers
Other questions:
  • 2. Add a _______ to manually force text from one page to the next page. A. footer B. page break C. blank page D. header
    11·2 answers
  • What is the acronym that helps you remember the order of math operations?
    9·2 answers
  • (Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds
    12·1 answer
  • Yolanda first breaks down the whole game she needs to program into modules. She then breaks these modules into smaller modules u
    11·1 answer
  • The rules on the Internet for how messages are addressed and passed on are called ____ .
    15·1 answer
  • Different between desktop application and web application ?​
    9·1 answer
  • Why are default parameters useful? *This is JavaScript*
    7·1 answer
  • Computer network reduces the cost. explain the statement with example.​
    8·1 answer
  • What does a companys code of ethics cover
    8·1 answer
  • Answer the following 8-mark question in your book.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!