1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Dmitriy789 [7]
3 years ago
9

When someone uses your personal information to pose as you this is

Computers and Technology
1 answer:
Alborosie3 years ago
7 0

Answer: identity theft

Explanation: identity theft is when somebody poses as you, not to be confused with identity fraud, which is when somebody takes your personal information (such as a credit card) to do things in your name.

You might be interested in
you have just received a new hdd so you connect it to your computer. the disk manager software recognizes the disk but when you
crimeas [40]

The most likely problem is the disk is not low-level formatted. Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions.

Windows' Disk Management system software gives you the ability to carry out sophisticated storage functions. Hard disk software is used on hard disk drives to complete a variety of tasks, such as file system checks and error checking, backups, defragmentation, data recovery, and partitioning.

Initializing a new drive can be used to set up a new drive.

See Expand a basic volume to extend a volume into space that isn't already occupied by a volume on the same drive.

Utility software called disk management tools is used to manage data on disk by carrying out various operations on it. Additionally, they carry out tasks like managing drives, formatting disks, checking disks, and partitioning devices.

To know more about Disk Management click here:

brainly.com/question/2742036

#SPJ4

8 0
2 years ago
Read 2 more answers
Windows doesn't have a network profile for this device printer
Arte-miy333 [17]
It's common problem if you connect new devices to the laptop with fresh Windows. There are two ways how to solve your problem:
1. You can use hardware troubleshooter to define the problem. You should type "Troubleshooting" in search. Then click on "Hardware and Devices" and start troubleshooting. 

2. You can solve it by yourself by uninstalling existing drivers. Go to "Device Manager" and search for "USB Drivers". Expand it and select "Uninstall". Then go to manufacturer's website and download the latest stable driver for your device.


3 0
3 years ago
Which term is used to describe a network security device or host software that filters communications, usually network traffic,
tensa zangetsu [6.8K]

This term could apply to a router.

4 0
3 years ago
You have to cut a wood stick into pieces. The most affordable company, The Analog Cutting Machinery, Inc. (ACM), charges money a
RoseWind [281]
Hi! I don’t know what any of this means but I just wanted to tell you that I hope you have an amazing day and god/allah/etc bless you :)
3 0
3 years ago
Why is making a prototype so important in the design process
marta [7]
Making a prototype is a great example of double checking. A prototype is the first made, which means it'll be tested. If a prototype was untested when complete, then it would be exceptionally harder to determine that everything is in working condition. No matter how skilled someone is.

In fact, skilled workers would prefer to test their prototypes to make sure it works. That way they'd stay on top.
6 0
4 years ago
Other questions:
  • Your computer is crashing on a regular basis. Which of the following is an operation available to the user that should help rese
    6·2 answers
  • Does any one have 2 reasons it would be a good idea to have a glow in the dark TV.
    5·1 answer
  • In the context of web and network privacy, an acceptable use policy is _____.
    15·1 answer
  • The document theme does not determine the appearance of the styles. true or false
    13·2 answers
  • What justification can you give for normalizing a database if the database will be updated only by the people who can be trusted
    11·1 answer
  • Students who respond promptly to e-mails are following which netiquette rule?
    13·2 answers
  • Someone say crackhead
    15·2 answers
  • How can you use the Address Book to address an email message? Use the drop-down menus to complete the sentences. 1. Type an emai
    6·2 answers
  • I need help building a computer what are some good parts?
    9·1 answer
  • Write a complete program that asks the user to input the height and radius of a cone (both of type double) and calls two individ
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!