The file access method shown in Figure 12 is called ...
The file access method shown in Figure 12 is called
hashed access
indexed access
random access
sequential access
Correct answer is A
No explanation has been provided for this answer.
In data base, the minimum number of characters. user can input in the field is known as field? ...
The QBASIC statement LETX=Y-3 means ...
An algorithm can be described as? ...
Which is not a network for distribution of information? ...
In a computer, the sets of instruction that direct it in performing a particular task is called? ...
The decimal fraction 0.9375 converts to binary? ...
what is the first computing machine invented ? ...
A set of moral principles that regulate the use of computers is called ...