Because they enable you to locate a particular record directly (without reading all of the preceding records), random access files are also called ____ files.
A. direct access
B. indirect access
C. sequential access
D. pointed access
Answer: A
Computer Science & Information Technology
You might also like to view...
The ____ operation is a unary operation.
A. AND B. ADD C. NOT D. OR
Computer Science & Information Technology
When a URL begins with https://, it indicates the Web site is _____.
A. phishing for information B. filtered C. secure D. backed up
Computer Science & Information Technology
How would you write the following algebraic equation in C++?
c = (a + b )2 (a - b )2 A. c = (a+b)^2 * (a-b)^2 B. c = a+b^2*a-b^2 C. c = (a+b^2)(a-b)^2 D. c = sqrt(a+b)(a-b)
Computer Science & Information Technology
It is vital to have ____________________ security on all of the personal computers to defend against any attack that breaches the perimeter.
Fill in the blank(s) with the appropriate word(s).
Computer Science & Information Technology