<=Back
Jane has acquired a computer and she would like to use it to process and store valuable data.
i)Explaining two procedures she would take to protect the computers from getting viruses.
ii) Other than viruses, outline three other possible forms of threats on her files
 Viewed: 478 times
Share in: