Answer:
microphone
Explanation:
when you are using a microphone once it stop it done
Step 1
Save your work and close all programs. You will be restarting your computer during the process.
Step 2
Click “Start” from the task bar and then choose “All Programs.”
Step 3
Click “Accessories” from the program menu. Choose “System Tools” from the side pop-out menu and then select “System Restore.”
Step 4
Click “Restore my computer to an earlier time” from the Welcome screen. Click “Next” at the bottom.
Step 5
Choose a date in bold from the calendar shown on the Restore Point page. The date that you choose should be an earlier one, like a day or two before the deletion occurred. Click “Next” at the bottom of the window.
Step 6
Click “Next” on the next page. The restoration begins, and your computer will restart.
Step 7
Click “OK” from the completion window that appears when your computer loads again.
Answer:
C. Spoofing.
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Spoofing can be defined as a type of cyber attack which typically involves the deceptive creation of packets from an unknown or false source (IP address), as though it is from a known and trusted source. Thus, spoofing is mainly used for the impersonation of computer systems on a network.
Basically, the computer of an attacker or a hacker assumes false internet address during a spoofing attack so as to gain an unauthorized access to a network.