Case-Based Critical Thinking QuestionsCase 6-1Jill is concerned about the security of her computer. She is worried that her files may be in danger while being stored on her computer. Jill knows that a data file is most vulnerable while you are working with it. She activated her AutoRecovery option, but she should still ____.

A. plug her computer into the wall outlet every few hours
B. specify where and how frequently automatically saved data is stored
C. let her computer run on battery power every once in a while
D. fear power surges


Answer: B

Computer Science & Information Technology

You might also like to view...

When you use the redirect output symbol (>) on a command line, the shell creates the output file immediately, before the command is executed. Dem- onstrate that this is true.

What will be an ideal response?

Computer Science & Information Technology

When using the tabular or stacked layouts, the controls are positioned and sized as a single group

Indicate whether the statement is true or false

Computer Science & Information Technology

The computing industry is well known for rapid changes and growth, and Internet technologies have certainly evolved and grown quickly. With this trend in mind, how can you avoid having to recreate your Web pages when the technologies change? How can you ensure your Web pages will continue to be viewable in a Web browser? Provide four guidelines to help minimize the effort needed to update your Web pages.

What will be an ideal response?

Computer Science & Information Technology

A(n) ____________________ is a unique number automatically assigned to each new record you add to a table.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology