1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
agasfer [191]
3 years ago
13

Where could an identity thief access your personal information?

Computers and Technology
1 answer:
aleksklad [387]3 years ago
7 0
Identity theft happens when one's personal information has been stolen or are being used for criminal purposes. There are many ways how an identity thief can steal or access your personal information and this can be through shoulder surfing like accessing your personal information in your accounts and stealing your personal items with your personal information in it. 
You might be interested in
Why is it more secure to require a user to press ctrl+alt+delete to log on rather than displaying the windows welcome screen?
Levart [38]
Let's say for example you have a toddler, or a pet. Let's say a cat. If the ctrl+alt+delete wasn't there. It would go straight to entering the password. Now let's say your child or pet likes to press the keys for a while. If they manage to press enter and enter the incorrect password. Eventually it will lock up your computer.
5 0
3 years ago
The function of while loop is
Alona [7]

Answer:

B repeat a chunk of code until the condition is true im 88% sure

4 0
2 years ago
You have to display or connect to network shares on remote computers. Which command-line utility will you use to accomplish the
Xelga [282]

Answer:

net use X: \\SERVER\Share

Explanation:

1. Connect securely to the remote computer or ensure you have access to it on the network

2. then follow the step below:

Where X: is the drive letter you wish to map the share to, and \\SERVER\Share is the UNC path to the share. This should make the share visible in My Computer and the command line as well like all other shares mapped through the GUI.

In order to later disconnect the share, you would use

net use X: /delete

8 0
3 years ago
Explain 3 ways you can be an upstander when seeing cyberbullying.
Bess [88]

Answer:

Assuming an upstander is someone that opposes cyberbullying:

(1) Call them out

(2) Report the behavior to proper moderation authority

(3) Tell the person to block messages from the cyberbully

I don't really know what else you want from this.

Cheers.

3 0
3 years ago
Read 2 more answers
Which of the descriptions listed below best describes the step in the reverse engineering process called functional analysis? A)
Zepler [3.9K]
If multiple choice then d and a if not then the best one would be a!


hope this helps!!
5 0
2 years ago
Other questions:
  • If you were to create a new app for a smartphone or tablet that does not already exist, what would you create?
    10·1 answer
  • One common method of converting symbols into binary digits for computer processing is called ASCII​ (American Standard Code of I
    5·1 answer
  • 2.3.4 CodeHS HTML Word Definitions
    10·1 answer
  • Where is information stored in the computer?​
    9·1 answer
  • Can you move it like this? I can shake it like that
    6·1 answer
  • Select the four bad password ideas.
    13·2 answers
  • Jerry purchased 25 dozens of eggs. He used 6 eggs to bake 1 cake. How
    14·1 answer
  • What is the console.log function for?​
    13·1 answer
  • Help me. thank you very much
    14·1 answer
  • Patricia Works in a coffee shop and manages the inventory of items.for each item she needs to recover the quantity in stock and
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!