1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
jek_recluse [69]
3 years ago
13

does anyone know how you would "hack" a school computer to go on other sites? answer fast its for a project

Computers and Technology
1 answer:
MrRissso [65]3 years ago
5 0

Answer:

go to settings, push screen time, and you get the hang of it after.

Explanation:

You might be interested in
The technique of ________ uses three columns that allows the entrepreneur to weigh both the advantages and the disadvantages of
Mekhanik [1.2K]
Force-field analysis
5 0
3 years ago
The Campus Housing Service helps students find apartments. Owners of apartments fill in information forms about the rental units
Alexxx [7]

Answer:

Check the explanation

Explanation:

LI system and software engineering concepts, the use cases are widely used Use case is a collection of eve. or actions steps, it mainly defining the interactions between a system and a role for achieving a specific goal.

Here the actor can he external system or a human being:

For identifying the use case, the below steps needs to he followed

• Identify the actors involved in the system.

  • In our task the actors are the student and the owners  

• Identify the actor's goals

  • Goals are the activities performed

• Identify the use case candidates

The persons who are all actively involved in the use case

• Identify the use case starting points

• Identifying the use case ending points

• rind the scope and the unit of interactions in the use case  

Identifying the steps in Housing system:

• Several implementation steps are provided in the task that needs to he identified in this particular stage

• The housing system is helping the stuck,. for finding the con. apartments which is meeting their requirements

Check the below diagram.

6 0
4 years ago
What device is designed specifically to reduce broadcast traffic that passes over a network and to choose the best path for movi
mezya [45]

Answer:

Router        

Explanation:

  • A router is a network device that forwards data packets between networks. Its a network layer hardware device. For example a DSL router that connects to the Internet through an internet service provider.
  • Router is connects at least 2 networks (can be two LANs) and the ISP.
  • Router is used to transfer data from one network to another if both networks use same protocols.
  • It receives data in packets form and forwards the data to another router using a routing table. These data packets can be sent between devices or from devices to the internet.
  • The routing table is used to choose the optimal path for forwarding the packets between the source and destination hosts. Routing table configure the best route a packet can take to reach its destination using routing protocols. A Routing Protocol defines how routers connect with each other and share information that makes them choose routes on a computer network between source and destination. Routing tables can be configured statically (routes are fed manually) or dynamically (routes are updated based on information obtained  from other routers).
  • Router makes sure that the data packets reach right destination instead of being lost within the network and it also strengthen signals before transmitting them.
  • Routers reduce broadcast traffic. They form boundaries between broadcast domains and separate a network into multiple broadcast domains.
  • Router do not broadcast traffic and eliminates the packet when it detects a broadcast address. Routers also stop broadcast messages and don't route a broadcast message between broadcast domains.
6 0
3 years ago
Joe, an end-user, reports that the Windows PC he is using automatically locks when he leaves his desk and walks to a printer to
ivann1987 [24]

Answer:

A. Domain-level group policies

Explanation:

Because domain-level polices are automatically implement all users that are login on the PC and PC is connect to the domain. From domain polices you can set what user can open and what can not open, Joe Windows PC he is using automatically locks also through domain policy, Administrator set the time when any end-user leave their PC automatically after the time set administrator screen saver run and asked password of that user to return back in the windows.

6 0
3 years ago
How has social media influenced the marketing and PR activities of companies? Explain in what ways companies, individuals, and N
Lesechka [4]
Social Media has infuenced marketing for many years because the fact hat they can advertise on socal easily because people spend so much time on social media a day so yea!
3 0
3 years ago
Other questions:
  • I don't understand question how do I work it out?
    7·2 answers
  • Which charges a fee for access to read, research, or copy articles and other published materials?
    11·1 answer
  • Assume v is a vector of integers that has been declared and initialized. Write a statement that adds the value 42 to the vector.
    14·1 answer
  • Does the game best fiend need wifi to play on the app?
    8·2 answers
  • Why are some studs and bolts undercut in the middle?
    11·1 answer
  • Translation of a file into a coded format that occupies less space than the original file is called
    15·1 answer
  • If you want to go directly to a specific web page using a URL, where should you type the URL in Firefox?
    14·2 answers
  • Why CD-ROM is more reliable than floppy disk?​
    14·1 answer
  • Day 1 of seeing if anyone will buy me a psn gift card (if u do u get brainliest and thanks + alot of points
    11·1 answer
  • Stay at least _____ behind the vehicle ahead of you at all times.
    12·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!