1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
13

Where could an identity thief access your personal information?

Computers and Technology
1 answer:
aleksklad [387]3 years ago
7 0
Identity theft happens when one's personal information has been stolen or are being used for criminal purposes. There are many ways how an identity thief can steal or access your personal information and this can be through shoulder surfing like accessing your personal information in your accounts and stealing your personal items with your personal information in it. 
You might be interested in
All the processing-of work-done on a computer is performed by the what?
Nat2105 [25]
It's computed by the processor
6 0
3 years ago
A medical assistant at a local hospital is exploring the Start Menu of his/her computer and various Windows programs/application
Ratling [72]
<span>Five questions that people are most likely to ask about the application are as follows:1. What is the use and function of this application?. 2. Who is this application for? 3. How much does this application cost?. 4. Where can the application been used? and 5. Why should I use this application? </span>
7 0
3 years ago
Which of the following is not hardware?
Pachacha [2.7K]

Answer:

A

Explanation:

I think it would be A because i have never heard of a virus scanner

6 0
3 years ago
One of the most<br> common uses of spreadsheet programs are
Bas_tet [7]
Common uses for spreadsheet documents be
-Organizing bills and money
-Groups of people and events
-Family plannings for weeks
-Grocery Lists.

I hope this helps!
8 0
2 years ago
Read 2 more answers
A user has connected an external monitor to a laptop vga port. what is the next step the user should take?
svetoff [14.1K]

The next step that the user should take after connecting an external monitor to a laptop VGA port is to take advantage of the FN key by using it, together with the multi-purpose key in which is helpful in sending video for an external display.

3 0
2 years ago
Other questions:
  • What can a folder on a computer contain?
    13·2 answers
  • Shawn wants to work on a presentation. He pushes the power buttons for the computer and the monitor, but the computer fails to s
    10·1 answer
  • ____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other
    9·1 answer
  • Jenny wants to create a résumé after a two-years gap. What should she consider?
    11·2 answers
  • The Receiver recognizes the sounds the Sender is making and transforms them into words and ideas in his own mind. What is this
    5·1 answer
  • Respond to the following in a paragraph of no less than 125 words. Describe the steps to active listening.
    7·2 answers
  • Write code to take a String input from the user, then print the first and last letters of the string on one line. Sample run: En
    10·1 answer
  • What are the types of technology that is use in education and what are their usages​
    8·1 answer
  • Cuando fue creada la aplicación Adobe Photoshop (creada, no lanzada)
    8·1 answer
  • चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!