Difference between revisions of "Talk:Information security"

From Imperial Wiki
Jump to navigation Jump to search
(New page: My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --~~~~)
 
Line 1: Line 1:
My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --[[User:Ted C|Ted C]] 08:52, 22 February 2008 (EST)
My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --[[User:Ted C|Ted C]] 08:52, 22 February 2008 (EST)
With regard to VOY "Investigations", is there good reason to believe that Neelix should not have had access to that terminal? Federation computers use voice recognition to identify users, so there's no reason he shouldn't be able to open a terminal by voice command, unless that terminal has other restrictions. --[[User:Ted C|Ted C]] 11:26, 19 February 2013 (EST)

Revision as of 16:26, 19 February 2013

My choice of terms may not be entirely standard for the IT industry, but I think I've covered most of the basic issues. --Ted C 08:52, 22 February 2008 (EST)

With regard to VOY "Investigations", is there good reason to believe that Neelix should not have had access to that terminal? Federation computers use voice recognition to identify users, so there's no reason he shouldn't be able to open a terminal by voice command, unless that terminal has other restrictions. --Ted C 11:26, 19 February 2013 (EST)