Another strategy for protecting important files is to ____ copy them to a USB flash drive, external hard disk, CD, or DVD.

A. hard
B. soft
C. manually
D. auto


Answer: C

Computer Science & Information Technology

You might also like to view...

A series of entries posted online similar to the entries in a diary is called a(n) _____.

A. blog B. podcast C. chat room D. Facebook

Computer Science & Information Technology

What software do I use to create a web page?

a. database b. spreadsheet c. Web authoring software d. both b and c

Computer Science & Information Technology

A background feature called _____ allows you to move the background from the slide borders in varying distances by a percentage.

A. offsets B. onsets C. reduction D. expansion

Computer Science & Information Technology

You enclose code that may contain an exception in a ____ statement.

A. throw B. catch C. throws D. try

Computer Science & Information Technology