You are investigating a case in which an accountant is accused of keeping fraudulent books for a firm. Upon examining his computer, you notice that the suspect uses two different accounting programs that are capable of reading the same types of files. Given this information, where would you probably begin to search for latent data on the computer and why?