The file access method illustrated in the diagram above i...
The file access method illustrated in the diagram above is called?
hashed access
indexed access
random access
sequential access
Correct answer is B
No explanation has been provided for this answer.
Effects of file insecurity include the following except? ...
Arrange in a hierarchical order by date, the following inventions: I. slide rule; Il. pascaline...
One attribute of the Read Only Memory is that it? ...
A tier in which the database resides along with the query processing language is called ...
Which number base system is used by low level languages ...
The symbolic representation of hard disk is? ...
In word processing, the icon in Fig.4 is used for __________ ...
Word processor, spreadsheets, database, graphics and presentation software are all examples of? ...