Case-Based Critical Thinking QuestionsCase 6-1Jill is concerned about the security of her computer. She is worried that her files may be in danger while being stored on her computer. Jill knows that a data file is most vulnerable while you are working with it. She activated her AutoRecovery option, but she should still ____.

A. plug her computer into the wall outlet every few hours
B. specify where and how frequently automatically saved data is stored
C. let her computer run on battery power every once in a while
D. fear power surges

Answer: B

Computer Science & Information Technology

You might also like to view...

To analyze data from an Access table or query, export the data to this file type to access its functions and features

a. Excel worksheet b. XML c. Word document

Computer Science & Information Technology

A shell company fraud involves

A. stealing cash from an organization before it is recorded. B. stealing cash from an organization after it has been recorded. C. manufacturing false purchase orders, receiving reports, and invoices. D. a clerk paying a vendor twice for the same products and cashing the reimbursement check issued by the vendor.

Computer Science & Information Technology