Answer:
Spoofing
Explanation:
Spoofing that occurs when an intruder computer fools network into believing its IP address is associated with trusted source
Database, a collection of information, basically an electronic filing system.. it helps users to <span>quickly </span><span>select and </span>find a desired pieces of data.
Answer:
Close or disable all unused running apps.
Explanation:
Closing programs running in the background on your computer or mobile device helps to free up system resources for your other programs. These problems can be resolved where your system is running slowly or two programs are trying to use the same device hence causing the device or system to drag.
Answer:
Option a: Trojan
Explanation:
A Trojan or Trojan horse is one of the computer malware that exist in computing world. Trojan often appears as a legitimate software to deceive user to activate it by social engineering. Once the Trojan is activated in the user computer, a hacker can remote control the infected computer for malicious purposes such as removing files, sending files, displaying message or rebooting computer.
However, Trojan cannot be replicated in the infected computer.