0 Bewertungen0% fanden dieses Dokument nützlich (0 Abstimmungen)
20 Ansichten3 Seiten
Group 1: Makacy is accessing confidential files from Moriah's unsecured computer. Group 2: shem is working on his laptop He leaves it on his desk to run an errand Akile and Ace break into the room and steal his laptop. Shem discovers the breach and is alarmed.
Group 1: Makacy is accessing confidential files from Moriah's unsecured computer. Group 2: shem is working on his laptop He leaves it on his desk to run an errand Akile and Ace break into the room and steal his laptop. Shem discovers the breach and is alarmed.
Group 1: Makacy is accessing confidential files from Moriah's unsecured computer. Group 2: shem is working on his laptop He leaves it on his desk to run an errand Akile and Ace break into the room and steal his laptop. Shem discovers the breach and is alarmed.