Icon Crear Crear

Technology and security - vocabulary

Completar frases

Perspectives Upper Intermediate Unit 2

Descarga la versión para jugar en papel

0 veces realizada

Creada por

Rusia

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad
  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
game-icon

Completar

Technology and security - vocabulary

Perspectives Upper Intermediate Unit 2

Ekaterina Orekhova
1

phishing USB stick active confirm scams filter delete stored private

Sarah was a careful social media user . Without her permission , no one could access or a post from her account . Her spam was always up - to - date , protecting her from attempts . Sarah carefully edited posts before sharing them with her friends . She never fell for requests to her bank details online , aware of potential . Her important files were securely in the cloud , and she encrypted them on a as an extra measure . Sarah diligently made backups of her data to prevent any loss . She wasn ? t on social media and keept her profile very .