Julie has a smartphone with an always-on voice recognition system, which runs any commands that it hears. Root P. Hacker wants to trick Julie's phone into running a command, but Julie turns off all wireless radios on the phone as a precaution to prevent Root from breaking in over the network, and also keeps his phone in a locked sound-proof room in hopes of foiling Root. how can Root break into Julies phone to run a command of his choice?