Answer:
The answer is "Option c "
Explanation:
A Damaged Machine is characterized just like any computing device, in which secrecy, reliability, or accessibility was affected by an untrustworthy source, whether wittingly or unwittingly. A resolution could be achieved either by unreliable source administrative interaction. Evaluating the quality is especially challenged throughout the situation, the continuous pop-ups to the device make it impossible to Alfonso to be doing a job on the network, and wrong choices can be described as follows: