Difference between revisions of "Computer"
(removed hacking threat category) |
|||
Line 1: | Line 1: | ||
{{Scenario Task | {{Scenario Task | ||
|Scenario Task Format=Scenario | |Scenario Task Format=Scenario | ||
− | |Scenario Task Type= | + | |Scenario Task Type=Unauthorised Access |
|Scenario Task Description=A large portion of our digital identities, years of work history and meticulously configured software rests on our computers. A broken, stolen or otherwise malfunctioning computer could be a small (or large) calamity. This section deals with how best to protect your computer from various physical and digital risks. | |Scenario Task Description=A large portion of our digital identities, years of work history and meticulously configured software rests on our computers. A broken, stolen or otherwise malfunctioning computer could be a small (or large) calamity. This section deals with how best to protect your computer from various physical and digital risks. | ||
<br /> | <br /> | ||
}} | }} |
Revision as of 22:00, 24 November 2015
Scenario- Unauthorised Access
A large portion of our digital identities, years of work history and meticulously configured software rests on our computers. A broken, stolen or otherwise malfunctioning computer could be a small (or large) calamity. This section deals with how best to protect your computer from various physical and digital risks.
From here …
- How can I prevent my computer from malfunctioning
- I want to protect my computer from virus infection
- I would like to prevent others from accessing my computer
- Minimising damage from a lost or stolen computer
Base Page | Language | Modification dateThis property is a special property in this wiki. | |
---|---|---|---|
Fa/رایانه | Computer | fa | 12 March 2016 11:34:45 |
Fr/Ordinateur | Computer | fr | 17 November 2015 01:40:08 |
Ru/Компютер | Computer | ru | 10 March 2016 13:06:24 |