Because they enable you to locate a particular record directly (without reading all of the preceding records), random access files are also called ____ files.

A. direct access
B. indirect access
C. sequential access
D. pointed access


Answer: A

Computer Science & Information Technology

You might also like to view...

The ____ operation is a unary operation.

A. AND B. ADD C. NOT D. OR

Computer Science & Information Technology

When a URL begins with https://, it indicates the Web site is _____.

A. phishing for information B. filtered C. secure D. backed up

Computer Science & Information Technology

How would you write the following algebraic equation in C++?

c = (a + b )2 (a - b )2 A. c = (a+b)^2 * (a-b)^2 B. c = a+b^2*a-b^2 C. c = (a+b^2)(a-b)^2 D. c = sqrt(a+b)(a-b)

Computer Science & Information Technology

It is vital to have ____________________ security on all of the personal computers to defend against any attack that breaches the perimeter.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology