1answer.
Меню
Ask question
Login
Signup
Ask question
Menu
All categories
English
Mathematics
Social Studies
Business
History
Health
Geography
Biology
Physics
Chemistry
Computers and Technology
Arts
World Languages
Spanish
French
German
Advanced Placement (AP)
SAT
Medicine
Law
Engineering
grandymaker
[24]
3 years ago
9
What is a way to Procter your social security number and other sensitive information from identity theft
Computers and Technology
Answer
Comment
Send
1
answer:
Morgarella
[4.7K]
3 years ago
5
0
Hey mate
by being smart about it and not telling anybody and if u find it no the inter net call the police
Send
You might be interested in
¿Cuál es el objetivo principal de los servicios?
sleet_krkn [62]
Ayudar a las personas que los contratan
8
0
3 years ago
6) RAM, 5 main memory<br>which storage conbe used<br>as permanent storage<br>Rom<br>a) R<br>)
Iteru [2.4K]
Answer:
not interested lol
Explanation:
duh
8
0
3 years ago
Read 2 more answers
Java: Literal representing the true value ? In java, what is the literal that represents a true value ?
Tema [17]
1 is what represents a true value and 0 is a negative value
4
0
3 years ago
You would like to create a graph that shows how much of your total investments are in stocks, savings, and mutual funds. You sho
sdas [7]
The answer is D. line graph
4
0
3 years ago
Read 2 more answers
_____ consists of the instructions that direct the operation of the computer system and enable users to perform specific tasks,
kaheart [24]
Answer:
Software
Explanation:
6
0
3 years ago
Other questions:
Thomas Hill claims that a fruitful way to think about the badness of destroying the environment is
15
·
1 answer
When doing a complex presentation, which of the following would be the best tool to begin designing your presentation?
11
·
2 answers
A light or optical microscope most commonly used is called a(n) _____. bright-field microscope dark-field microscope electron mi
8
·
2 answers
This type of software works with end users, application software, and computer hardware to handle the majority of technical deta
12
·
1 answer
Sequential codes may be used to represent complex items or events involving two or more pieces of related data.
7
·
1 answer
When Creating a FPS game what basic rules would you add?
12
·
1 answer
What does the revolver do computer science
9
·
1 answer
Fill in the blanks
7
·
1 answer
A human subject’s photographs show two catchlights in each eye that are unwanted by the photographer. What is the most likely ca
12
·
1 answer
From the time users first visit a new website, or view a new media piece, how much time will they spend on the site before they
10
·
1 answer
×
Add answer
Send
×
Login
E-mail
Password
Remember me
Login
Not registered?
Fast signup
×
Signup
Your nickname
E-mail
Password
Signup
close
Login
Signup
Ask question!