Icon Crear Crear

Technology and security - vocabulary

Completar frases

Perspectives Upper Intermediate Unit 2

Descarga la versión para jugar en papel

0 veces realizada

Creada por

Rusia

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Completar frases

Technology and security - vocabularyVersión en línea

Perspectives Upper Intermediate Unit 2

por Ekaterina Orekhova
1

phishing private active delete filter stored USB stick confirm scams

Sarah was a careful social media user . Without her permission , no one could access or a post from her account . Her spam was always up - to - date , protecting her from attempts . Sarah carefully edited posts before sharing them with her friends . She never fell for requests to her bank details online , aware of potential . Her important files were securely in the cloud , and she encrypted them on a as an extra measure . Sarah diligently made backups of her data to prevent any loss . She wasn ? t on social media and keept her profile very .

educaplay suscripción