1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SSSSS [86.1K]
3 years ago
8

What steps can you take to secure your private information?.

Computers and Technology
1 answer:
pogonyaev3 years ago
6 0

Answer:

Below:

Explanation:

1. Practice mail security. Use a public mailbox rather than your home mailbox to send bill payments and other mail containing sensitive information. Pick your mail up promptly and ask the post office to hold it while you’re away.

2. Guard your Social Security number. Don’t carry your Social Security card, military ID, Medicare, or other cards that have your Social Security number on them unless you are going somewhere where you will need them. Only provide your Social Security number when there is a legitimate need to do so.

3. Lock and shred. Keep your billing and banking statements and other personal records locked up and shred them when no longer needed.

4. Stop prescreened credit and insurance mailings. Call toll-free 1-888-567-8688 to get off mailing lists for credit and insurance offers. Your Social Security number will be required. This keeps thieves from intercepting and accepting the offers in your name and doesn’t affect your eligibility for credit or insurance.

5. Keep private information to yourself. Never respond to phone calls or emails asking to confirm your Social Security number or account numbers. Don’t leave PIN numbers, passwords or other personal information around for others to see.

6. Be safe online. Use anti-virus and anti-spyware software and a firewall on your computer and keep them updated. When you provide financial or other sensitive information online, the address should change from “http” to “https” or “shttp.” A symbol such as a lock that closes may also indicate that the transmission is secure.

7. Look at your bills and bank statements promptly. If you find any charges or debits that you never made, contact the bank or company immediately.

Hope it helps.......

It's Muska...  

You might be interested in
5255555555555+55555555555555/1111*99442
Marina CMI [18]

Answer:

(502763134343429265 /101)

Explanation:

7 0
4 years ago
Read 2 more answers
Electronic files created on a computer using programs such as word software are considered to be
nika2105 [10]

From the Page Layout tab, click Margins. Select Custom Margins... from the drop-down menu. Selecting Custom Margins...

The Page Setup dialog box will appear.

Adjust the values for each margin, then click OK. The Page Setup dialog box.

The margins of the document will be changed

6 0
4 years ago
When superiors providedirections to their subordinates regarding what to do, thisis
cluponka [151]

Answer:

Downward

Explanation:

<u>Downward communication</u>

When instructions/orders given from Superiors to Subordinates.The instruction can be via mail,oral or handbooks it can be of any form. Examples are shareholders instructing management,teacher ordering students to bring notebooks etc.  

<u>Upward communication</u>

When Information is sent bottom level to the upper levels in an organization.The information includes reports,judgments, estimations, propositions, complaints, appeals, etc  

<u>Lateral communication/Horizontal communication</u>

When same hierarchical levels shares idea or information with each other for coordinating, fulfilling a common purpose or goal.It doesn't involve sharing information with up or down levels in organization.

<u></u>

<u></u>

5 0
3 years ago
What is the definition of a command computer?
Westkost [7]
In computing, a command<span> is a directive to a </span>computer<span> program acting as an interpreter of some kind, in order to perform a specific task. i hope this helps

</span>
6 0
3 years ago
The first version of Windows to have automatic updates from the Internet was _____.
kipiarov [429]

Answer:

Windows 95

<em>Hope this helps ^-^</em>

<em>-Isa</em>

7 0
3 years ago
Other questions:
  • Type the correct answer in the box. Spell the word correctly.
    14·2 answers
  • Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006.Given a variable modelYear write a statem
    5·1 answer
  • I am having trouble with logic gates(AND NOR,etc)
    8·2 answers
  • Mobile ethnography can be especially useful for documenting public behavior, such as waking up in the morning or administrating
    9·1 answer
  • (a) Write a SCHEME function (make-change n den) which outputs a list of change specifications. Namely, a call (make-change 11 (l
    8·1 answer
  • When looking to attract a local audience, why it is important to optimise your website and content for mobile users?
    12·1 answer
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • What file system allows you to continue to add files to a CD or DVD disc after the initial burn, as long as there is room on the
    14·1 answer
  • Suppose a friend asks you for advice on RSS feeds. What would be a reason you would suggest using RSS feeds?
    12·1 answer
  • Cookie Snooping
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!