1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
7

How do you hack a iPhone, Like If you forgot your password and want to get back in your phone. What do you do?

Computers and Technology
2 answers:
s344n2d4d5 [400]3 years ago
6 0

Answer:

fix it on itunes

Explanation:

or get a new one

Stella [2.4K]3 years ago
5 0

Answer:

it depends on what iphone you have. If you have a phone that can be unlocked by fingerprint, do the fingerprint go to settings and it should ask you for your finger print or password. If you have the latest iphone like 11 or 12, just use face ID.

Explanation:

You might need to go to your phone store and ask them to pull it up, they have all your passwords in the system.

You might be interested in
What should you do to organize a large amount of data??
Kay [80]
Set them up from least to greatest or create a number graph with all the data.
5 0
3 years ago
On a Linux system, which command allows you to modify settings used by the built-in packet filtering firewall?
Leni [432]

Answer:

iptables

Explanation:

On a Linux system, iptables command allows us to modify settings of the built-in packet filtering firewall.

Iptables is used to set up, maintain, inspect and update the tables of IP packet filtering rules on Linux.

For example,

  • To view the current rule settings we can use the command:

# iptables -L -n -v

  • To add new firewall rules:

# iptables -I INPUT <rule number> -s <source-ip address> -j DROP

7 0
3 years ago
The Internet is considered a WAN. *<br><br> True<br> False
nlexa [21]

Answer:

true-ish

Explanation:

WAN= wide area network

LAN= local area network

it could be considered a wide area network, but not necessarily. The internet is it's own type of connection, so I'm not quite sure if it would be considered something else or WAN.

4 0
3 years ago
Icon view, list view, and details view are all common views provided by which kind of program?
cupoosta [38]

Answer: The standard program that uses common views such as the icon view, list view, and details view would be the program known as "File Explorer" (Windows) or "Finder" (Mac). This program uses all the views to make selecting and tracking down certain files a much more painless and easier process to complete.

Explanation:

boom : )

4 0
3 years ago
Read 2 more answers
Write any two rules for writing algorithm​
inessss [21]

Answer:

1) = input and output should be defines precisely

2) = it shouldn't include computer code

5 0
3 years ago
Other questions:
  • What do you call the combination of title, description, tags, and thumbnail?
    6·1 answer
  • Write a statement that reads 5 successive integers into these variables that have already been declared : x1 x2x3x4 x5. Then wri
    7·1 answer
  • After spending a year in India, Giovanna returns home to the United States and is inspired to raise money to help her new friend
    14·1 answer
  • How do you double space on microsoft word?
    5·1 answer
  • Which of the following statements can be used as evidence that ancient Greek beliefs and art has been influential? Select the th
    9·2 answers
  • What are listed in the vertical columns across the top of the Event Editor?
    5·2 answers
  • 1. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disable
    6·1 answer
  • Which option on the Format tab is used to modify particular portions of the chart?
    13·1 answer
  • Help please i will mark brainlist!
    7·1 answer
  • A 4"x6" photo is digitized using 10,000 pixels. An 11"x7" photo is digitized using 30,000 pixels. Which image will have the bett
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!