File Management and Protection/Common Threats/Key points
|File Management and Protection|
|Common Threats||Introduction | Identifying common threats | Ensuring integrity | Securing your system | Key points | Assessment|
If you are completing the assessment for this course, please continue to ensure you have completed the assessment activities for this unit.
Otherwise, please continue with the next unit, Data Protection.
The content of this unit has been adapted from the Personal Computer Basics workbook, developed by the Community Learning Centre, Otago Polytechnic, December 2011.