| http://www.w3.org/ns/prov#value | - They can enter a computer through different ways like transferring files from one computer to another, downloading, from USB flash drives, clicking on different links on websites, emails and other ways. ************************************************************************
|