1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
n200080 [17]
2 years ago
12

How do you shut down a remote server through JavaScript having only the IP address?

Computers and Technology
1 answer:
Maksim231197 [3]2 years ago
7 0

Replace the 192.168.1.100 with the IP address you want to shutdown. You have to have administrative rights on the machine you want to shut down.

or Click on the "Add" button and type in your victim's IP adress . Click OK and choose what you want to do to thier computer (Do the normal Shutdown, Restart, Logoff)

You might be interested in
The _____ feature will allow users to view nonprinting formatting marks to aid in editing a document. View Alignment Show/Hide I
Annette [7]

The __Show/Hide Insert___ feature will allow users to view non printing formatting marks to aid in editing a document.

The answer is D. Show/Hide Insert

Let me know if this is correct

5 0
3 years ago
HELP ASAP PLZ PLZ PLZTegan is playing a computer game on her smartphone and the battery is getting low. When she goes to charge
frozen [14]

Answer:

3rd choice

Explanation:

6 0
2 years ago
HELPPPPPPPP
Reika [66]
The answer is visual hierarchy :)
4 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
To restore a document to the default theme for the template on which the document is based, click the themes button, and then cl
PtichkaEL [24]
Depends on the program you are using

4 0
3 years ago
Other questions:
  • ​You work at a call center of a large bank where you answer credit card services related questions from customers. Lately, you h
    14·1 answer
  • To write 10 lines of code on paper:
    10·1 answer
  • You have just driven to the Hewlett-Packard site in Corvallis to field-interview a programmer. You sit down in a conference room
    6·1 answer
  • Universal Containers has a sales team focused on renewals. They will use many of the same Opportunity fields as other teams, but
    13·1 answer
  • The association between a UCS and a CS can be extended to include more stimuli (more stimuli related to the CS can elicit the CR
    7·1 answer
  • Write a program that asks the user to enter a number of seconds and then printsthe same amount of time in days, hours, minutes,
    11·1 answer
  • To create a pull quote, how should a user format the text?
    6·2 answers
  • What is a type of transition used for music in Earsketch
    11·1 answer
  • Opinion on sandshrew​
    13·1 answer
  • Explain where the “heart” of the station is and what can be found there? I will mark brainlyest! This is for the ISS (Internatio
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!