1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Phoenix [80]
3 years ago
15

How do you get past a firewall ?

Computers and Technology
1 answer:
DaniilM [7]3 years ago
3 0
Use a Web-based Proxy. ...
Use a VPN. ...
Use Remote Access to Your Own PC. ...
Kill the Blocking Service. ...
Use Mobile Data as a Stopgap. ...
What if You're Using a Phone? ...
Sneaky Like a Boss.
You might be interested in
Write a program to test your functions as follows: Obtain a random number seed from the command line of your program using comma
Iteru [2.4K]

Answer:

Please find the code attached.

Explanation:

Please find the attached code in pictures.

7 0
4 years ago
Most GUIs provide all of the following except _____.
erma4kov [3.2K]

Hello there! Your answer would be A.

GUIs are Graphical user interfaces. Command prompts are unique to Windows operators, so your best option would be A since the question covers most GUIs.

Hope this helps, have a great day!

7 0
3 years ago
A technician needs to be prepared to launch programs even when utility windows or the Windows desktop cannot load. What is the p
ololo11 [35]

Answer:

Msinfo32.exe, cmd

Explanation:

The msinfo.exe is a tool that gathers information concerning your computer system and displays a comprehensive view of your system components, hardware, and software environment, that can later be use to diagnose computer issues.

Command Prompt is an interpreter application for command line which is available in nearly all Windows operating systems. It is utilized for executing entered commands.

6 0
3 years ago
To reduce the number of used digital outputs of the microcontroller, the display board is connected to the main board through th
Luda [366]

Answer:

The program in Python is as follows:

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

num = input("Decimal: ")

BCDValue = ""

valid = True

for i in range(len(num)):

   if num[i].isdigit():

       if(int(num[i])>= 0 and int(num[i])<8):

           BCDValue += BCD[i]+" "

       else:

           valid = False

           break;

   else:

       valid = False

       break;

if(valid):

   print(BCDValue)

else:

   print("Invalid")

Explanation:

This initializes the BCD corresponding value of the decimal number to a list

BCD = ["0001","0010","0011","0100","0101","0110","0111"]

This gets input for a decimal number

num = input("Decimal: ")

This initializes the required output (i.e. BCD value)  to an empty string

BCDValue = ""

This initializes valid input to True (Boolean)

valid = True

This iterates through the input string

for i in range(len(num)):

This checks if each character of the string is a number

   if num[i].isdigit():

If yes, it checks if the number ranges from 0 to 7 (inclusive)

       if(int(num[i])>= 0 and int(num[i])<8):

If yes, the corresponding BCD value is calculated

           BCDValue += BCD[i]+" "

       else:

If otherwise, then the input string is invalid and the loop is exited

<em>            valid = False</em>

<em>            break;</em>

If otherwise, then the input string is invalid and the loop is exited

<em>    else:</em>

<em>        valid = False</em>

<em>        break;</em>

If valid is True, then the BCD value is printed

<em>if(valid):</em>

<em>    print(BCDValue)</em>

If otherwise, it prints Invalid

<em>else:</em>

<em>    print("Invalid")</em>

7 0
3 years ago
A subject or object's ability to use, manipulate, modify, or affect another subject or object is known as ___________.
IRINA_888 [86]

Answer:

The correct answer to the following question will be "Access".

Explanation:

  • Registered users have legal access to a network, while hackers may access a system illegally. The capacity is controlled by access controls. Access is defined as the right of a subject or object to use, manipulate, modify, or influence another subject or object.
  • Access control was the selective limitation of access to a location or other property while the mechanism is represented by access management. Access act may mean use, entry, or use. Permission is called authorization to access a resource.

Therefore, Access is the right answer.

5 0
3 years ago
Other questions:
  • An excel file called “student_gpa” is opened. What does the funnel next to “GPA” indicate
    5·1 answer
  • HELP PLEASE
    7·2 answers
  • IN MICROSOFT EXCEL YOU CAN UES FOMULA TO DIVIDE OR MULTIPLY WHAT IS THE CORRECT FORMULA TO CALCULATE 4*6
    14·1 answer
  • Explain the function of the Ribbon in Microsoft Word.
    15·1 answer
  • Write an expression using membership operators that prints "Special number" if special_num is one of the special numbers stored
    12·1 answer
  • What is the function of a breadcrumb trail website
    7·1 answer
  • I need a utube name for a gaming channel....PLEASE HELP...BRAINLIEST
    5·1 answer
  • Is the flow of power reversible in a leadscrew?
    11·1 answer
  • How to reload ingenuity when a pulsating blue thing is there
    11·1 answer
  • Which of the following best describes the impact of Creative Commons?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!