Jane has acquired a computer and she would like to use it to process and store valuable data.
i)Explaining two procedures she would take to protect the computers from getting viruses.
ii) Other than viruses, outline three other possible forms of threats on her files
 Viewed: 503 times For Better experience and learning,for video answers, after video ends playing, click next question in the questions list!!!