Which of the following data destruction methods should be used to ensure the virus has been successfully…?