A rogue loose called a hacker could take control of the entire system by implanting his own instructions in the software and then he could program the computer to erase any sign ______.
A. of his being ever there
B. he ever has been there C. of his having ever been there D. of him having ever been there