Answer:
Spoofing
Explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
<span>In certain cases, when the Swen executable is removed or renamed by an anti virus program without stopping to fix the registry, it then will become impossible to run any executable files on the machine. This happens because windows will be unable to find the file that is associated with any executables on it's hard drive.</span>
Answer:
An example of effective communication is when the person who you are talking to listens actively and absorbs your point and understands it.
Explanation:
Hope this helps!!