If the Chief Engineer were abducted and the acting Chief Engineer came across information that may be the abducted engineers command codes....would the computer verify that those codes are correct? And if so, what good are the precautions set in place to ensure that one's command codes cannot be accessed by just anyone or an enemy? Are Command codes not voice-activated as well? Where would the computer draw the line or the distinction?
To what specific episode or situation do you refer to? --Bailbondsman 00:10, June 26, 2012 (UTC)