1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
9

When someone uses your personal information to pose as you this is

Computers and Technology
1 answer:
Alborosie3 years ago
7 0

Answer: identity theft

Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.

You might be interested in
What uses HTML hypertext links that users can click to access different locations or information?
zalisa [80]

Answer:

a button

Explanation:

I am not too familiar with HTML terminology (self-taught), but button (classes?) use hypertext links to access different locations on a website.

I'm pretty sure the syntax is something like <button = *stuff*>

4 0
3 years ago
The blue section of the following Venn diagram could represent which of the following Boolean statements?
Rzqust [24]

Answer:

Last option: <em>Not </em>statement

Explanation:

Anything outside the borders of the circles are considered the <em>not</em> Boolean statement since the circles represent <em>or</em> and the overlap represents <em>and</em>.

Hope this helps :)

3 0
3 years ago
When trying to solve a problem, Bret uses a logical, step-by-step formula called ________.
Alexxx [7]

Answer:

B) An Algorithm

Explanation:

An algorithm is defined as the step-by-step solution to a given problem that follows a logical sequence and which is also finite. In mathematics and computer science, the first step in solving a given problem is writing out the algorithm which will include steps for calculations, decisions, data processing, input/output etc. There are scientific ways of representing algorithms through the use of flowcharts, pseudocodes, data flow diagrams etc.

5 0
3 years ago
An alternate method to open the word count dialog is to click _______ on the status bar at the bottom of the word window
kondor19780726 [428]

An alternate method to open the word count dialog is to right click the blue portion on the status bar at the bottom of the word window.  The status Bar will roll down showing different functions including WORD COUNT. Click WORD COUNT and it will show up on the bottom left with the count of words you have written.

7 0
4 years ago
this isnt a question but i am looking for anything willing to help me with my work. i have 50 missing assignments just in one cl
Zarrin [17]

Answer:

just find it

Explanation:

ambot lng kay wa mn gd nako to gi gunitan nya wa pd ko nimo gipa bantay nya biskan pag pabantayon ko nimo ilabay jd nakog saba

4 0
4 years ago
Other questions:
  • What feature did the 32X add to the Sega Genesis?
    13·1 answer
  • Which ofthe following is the most correct statement about the interestsection of the indirect plan for persuasion?
    8·1 answer
  • The Mohs scale is used to express which mineral property?
    15·1 answer
  • Which is the most correct option regarding subnet masks?
    10·1 answer
  • Classify computer software and write short note about it ?​
    6·1 answer
  • Which of the following sentences from the section "The Limits To Free Enterprise With A Mixed Economy" BEST develops a central i
    10·1 answer
  • Who is your favorite<br><br> A. Jacksepticeye<br><br> B. SSSniperwolf<br><br> C. Markiplier
    11·2 answers
  • Label the parts of the plated salad.
    9·1 answer
  • True/False: Functions are ideal for use in menu-drive programs. When a user selects a menu item, the program can call an appropr
    13·1 answer
  • What are three major events in computer science history?
    11·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!