The _________ file exploits the capability found on disks to access directly any block of a known address.

A) direct ?
B) ?sequential
C) ?indexed sequential ?
D) ?indexed

A) direct ?

Computer Science & Information Technology

You might also like to view...

Function arguments are enclosed in ________

Fill in the blank(s) with correct word

Computer Science & Information Technology

Use the Speech Recognition menu in Windows to perform which of the following tasks?

a. Configure a touch screen. b. Configure speakers. c. Configure a microphone. d. Configure system sounds.

Computer Science & Information Technology