1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goblinko [34]
3 years ago
7

How do you hack a iPhone, Like If you forgot your password and want to get back in your phone. What do you do?

Computers and Technology
2 answers:
s344n2d4d5 [400]3 years ago
6 0

Answer:

fix it on itunes

Explanation:

or get a new one

Stella [2.4K]3 years ago
5 0

Answer:

it depends on what iphone you have. If you have a phone that can be unlocked by fingerprint, do the fingerprint go to settings and it should ask you for your finger print or password. If you have the latest iphone like 11 or 12, just use face ID.

Explanation:

You might need to go to your phone store and ask them to pull it up, they have all your passwords in the system.

You might be interested in
What are some positive impacts technology has on the environment?​
dsp73

Answer:

<u>technology</u> has enabled us to capture useful heat through devices such as solar panels

Explanation:

<h3 />
7 0
3 years ago
Read 2 more answers
Can anyone help me out with my photography questions?
Oliga [24]
Verifying, The answer above me is correct
6 0
2 years ago
January 16, 2018 Q1: This question is worth 99 points and a brainliest. It is a one part question. Medium difficulty.
Naddik [55]
Well, some countries think of the Internet like as if it was a weapon. The Internet to them does not seem like what the Internet is to us. Internet features like the Dark Web or Deep web has given them enough reasons on why they should be prohibiting it.
6 0
3 years ago
Read 2 more answers
Used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a se
Sati [7]

Answer: A- Public Key Encryption

Explanation: The Public key Encryption is used prevalently on the web, it allows for secure messages to be sent between parties without having to agree on, or share, a secret key. It uses an asymmetric encryption scheme in which the encryption key is made public, but the decryption key is kept private.

7 0
4 years ago
Read 2 more answers
Eric would like to have a color textbook that makes it look as if the character in an image is speaking. Which object should he
timurjin [86]

Explanation:

the answer is call out safe or picture

3 0
4 years ago
Other questions:
  • Question 5
    5·1 answer
  • Why should you delete files from your computer? (multiple answers can be chosen)
    5·2 answers
  • Differentiate between the broadcasting and telecommunication
    5·1 answer
  • What do developers do to support software products
    14·1 answer
  • Write the definition of a function named averager that receives a double parameter and returns-- as a double -- the average valu
    11·1 answer
  • Which of the following is true of binary files?
    6·2 answers
  • Which conditions make using an array a better choice than a list? Select 3 options.
    12·2 answers
  • Osing Commands
    6·1 answer
  • Why does rating an incorrect answer as 1 star raise its score on brainly?
    8·2 answers
  • You are a teaching assistant for an introductory computer concepts course at your local community college. The instructor asks y
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!