Hey there!
Here is your answer:
<u><em>The proper answer to your question is "through websites".</em></u>
Reason:
<u><em>There are many ways identity thefts make there attacks but the most common ways is using unsafe websites. These websites most likely sell cheap products that require you to give all of your personal information in order to buy the product. </em></u>
Therefore the answer is using unsafe websites.
If you need anymore help feel free to ask me!
Hope this helps!
~Nonportrit
Answer:
It can improve the quality of human life because it can be used as a learning and education media, the mass communication media in promoting and campaigning practical and important issues, such as the health and social area. It provides wider knowledge and can help in gaining and accessing information.
<em>That</em><em>'</em><em>s</em><em> </em><em>my</em><em> </em><em>answer</em>
Answer: Option B. System logs
Explanation:
A system log contains records of events that are logged by the operating system components. These events are often predetermined by the operating system itself and they indicates how the system processes and drivers were loaded. System log files may contain information about device changes, device drivers, system changes, events, operations and more.
INPUT ADALAH KOMPONEN PIRANTI KERAS YANG MEMUNGKINKAN USER ATAU PENGGUNA MEMASUKKAN DATE KE DALAM KOMPUTER ATAU BISA JUGA DISEBUT SEBAGAI OUTPUT ADALAH DATA YANG TELAH DIPROSES MENJADI BENTUK YANG DAPAT DIGUNAKAN!
Answer:
that's true after some period of time it's necessary