Which is not one of the basic steps involved in creating a sequential file?
a. Open the file
b. Create the contents of the file
c. Close the file
d. All of the above must be done to create a sequential file
D
You might also like to view...
____________________ installation requires the creation of a customized image that you apply to each computer.
Fill in the blank(s) with the appropriate word(s).
Describe the three permissions that can be assigned to a directory or file in UNIX/Linux systems.
What will be an ideal response?
Which of the following is not true about Internet fraud?
A) Internet fraud accounts for over 90% of all consumer-fraud complaints to the Federal Trade Commission. B) One example is the Nigerian letter scam where you receive an e-mail from someone claiming to have a large amount of money that needs to be released from an account if you can send money to help transfer the money. C) Other types of Internet security threats include phishing, pharming, and Trojan horses. D) Spam that promotes a product or cause is illegal, as well as a nuisance.
If the width of the screen is four-thirds that of the height, it is the _____ ratio.
A. standard B. widescreen C. aspect D. ?full screen