The first one is d the second one is true the third one is false
Passwords, TPM, and Drive Encryption.
Hope this helps. :)
<span>So if some access your computer and erased some data without your permission or knowing then this threat is called as security threat. So you should have these stand alone systems with username and password concept that would protect your sensitive and private data and have the control over your computer.</span>