________ typically are used when the sequence in which records are to be processed can be anticipated; ________ generally are used when the sequence in which records are to be processed cannot be anticipated.

a) Queued access methods, basic access methods
b) Sequential access methods, basic access methods
c) Basic access methods, queued access methods
d) Basic access methods, sequential access methods


a) Queued access methods, basic access methods

Computer Science & Information Technology

You might also like to view...

The _____________ manager places components into five regions.

(a) BorderLayout (b) FlowLayout (c) GridLayout (d) AbsoluteLayout

Computer Science & Information Technology

To add a new record to a table, use the ________ operation.

(a) ADD (b) ADD INTO (c) INSERT (d) INSERT INTO

Computer Science & Information Technology

Which of the following is a method to install Windows on a computer system?

a. Booting from the distribution DVD or CD. b. Installing from the network. c. Drive imaging. d. All answers provided are correct.

Computer Science & Information Technology

?Accountability is the matching of an authenticated entity to a list of information assets and corresponding access levels.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology