Another strategy for protecting important files is to ____ copy them to a USB flash drive, external hard disk, CD, or DVD.
A. hard
B. soft
C. manually
D. auto
Answer: C
Computer Science & Information Technology
You might also like to view...
A series of entries posted online similar to the entries in a diary is called a(n) _____.
A. blog B. podcast C. chat room D. Facebook
Computer Science & Information Technology
What software do I use to create a web page?
a. database b. spreadsheet c. Web authoring software d. both b and c
Computer Science & Information Technology
A background feature called _____ allows you to move the background from the slide borders in varying distances by a percentage.
A. offsets B. onsets C. reduction D. expansion
Computer Science & Information Technology
You enclose code that may contain an exception in a ____ statement.
A. throw B. catch C. throws D. try
Computer Science & Information Technology