A ____________, is an object associated with a specific file and provides a way for the program to work with that file.

a. data object
b. file object
c. Filename class
d. referential extension


b. file object

Computer Science & Information Technology

You might also like to view...

The share permission ____ permits groups or users to read, execute, add, delete, and modify files, and to create and delete subfolders and manage share permissions.

A. reader B. contributor C. co-owner D. administrator

Computer Science & Information Technology

Case-Based Critical Thinking Questions

? Case 1: MaidToOrderThe database for a cleaning service company contains the following table, named tblCustomer, that includes customer invoice data. The InvoiceNum, CustomerNum, and InvoicePaid fields contain text. The InvoiceDate field contains dates. The InvoiceAmt field contains numbers. InvoiceNum CustomerNum InvoiceDate InvoiceAmt InvoicePaid 631 13020 01/15/2013 200.00 Y 632 15411 01/20/2013 685.00 Y 633 10002 01/23/2013 75.00 N 634 13104 01/23/2013 150.00 N 635 12124 01/26/2013 75.00 Y 636 13328 02/02/2013 350.00 Y 637 10206 02/02/2013 175.00 N 638 10334 02/07/2013 450.00 Y To create a DataGridView control on the form, you would click on the ____ object in the Data Sources window and drag it to the form. A. CustomerNum B. InvoiceNum C. CustomerDataSet D. tblCustomer

Computer Science & Information Technology

____________________ routing is a dynamic technique in which routing tables react to network fluctuations, such as congestion and node/link failure.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Early cryptography algorithms used the same key for both encryption and decryption.?

Answer the following statement true (T) or false (F)

Computer Science & Information Technology