___________ is the fraudulent use of someone's personal information to carry out transactions.

Fill in the blank(s) with the appropriate word(s).

Identity theft

Computer Science & Information Technology

You might also like to view...

The best font size for reading is ________ points

A) 12-14 B) 9-11 C) 8-10 D) 10-12

Computer Science & Information Technology

Objects in a form that display data or perform actions are called ________

Fill in the blank(s) with correct word

Computer Science & Information Technology