Answer:
The four-step process of fetch, decode, execute, and store. Type of memory where the contents of this are not erased when the computer is turned off.
Answer:
1) Standalone machine
2) Local
3) Either Wide area network(WAN) or a web
Done your first 3
Answer:
A. add level
D. Delete level
E. Copy level
F. Move up or down
Explanation:
I just did it on edg. 2020
Answer:
You can setup firewall rules with for example iptables on Linux. The rules should block source addresses of private IP ranges such as 192.168.*.* and 10.*. *. * etc. Check private IP ranges for full list.
It will however not guarantee prevention of IP spoofing in general as its not possible to prevent such attacks. Its the responsibility of ISPs. But the question asked for private IP spoofing and then the above works.