Talk:Information security
Jump to navigation
Jump to search
My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --Ted C 08:52, 22 February 2008 (EST)
With regard to VOY "Investigations", is there good reason to believe that Neelix should not have had access to that terminal? Federation computers use voice recognition to identify users, so there's no reason he shouldn't be able to open a terminal by voice command, unless that terminal has other restrictions. --Ted C 11:26, 19 February 2013 (EST)