You have to destroy the hard drive as it is like a memory for the computer so it can never be deleted
Answer:
b. IT infrastructures and services
Explanation:
IT infrastructure or information technology infrastructure refers to the various components involved in the functioning of an IT enabled operations. These components include; hardware, software, network resources, etc.
It is usually internal to an organization and deployed within the confines of its own facilities.
Answer:
Explanation:
The first diagram shows the DFA that accepts that accepts any string except 11 and 111
The second diagram shows every odd position of w is 1
Answer:
ICMP.
Explanation:
Hackers might use ICMP for gain knowledge about current system addresses and specific procedures as part of a reconnaissance process.
ICMP is a failure informing system used by network protocols such as routers to produce warning to that of the source Address while network issues interrupt IP packet transmission.