Which of the file organization methods can be accessed both randomly and sequentially?
Direct files
Indexed sequential files
Random files
Sequential files
Correct answer is B
No explanation has been provided for this answer.
Effects of file insecurity include the following except?
virus infection
file corruption
encrypted data
data loss
Correct answer is C
No explanation has been provided for this answer.
The following actions are sources of breaches in computing except?
carelessness
hackers' threat
piracy
viruses
Correct answer is A
No explanation has been provided for this answer.
In BCD encoding system, 25, will be represented as?
01100101
01010110
00100101
0101001
Correct answer is C
No explanation has been provided for this answer.
Multiply 101\(_2\) by 11\(_2\)
1001\(_2\)
1011\(_2\)
1110\(_2\)
1111\(_2\)
Correct answer is D
No explanation has been provided for this answer.