The _________ file exploits the capability found on disks to access directly any block of a known address.
A) direct ?
B) ?sequential
C) ?indexed sequential ?
D) ?indexed
A) direct ?
Computer Science & Information Technology
You might also like to view...
Function arguments are enclosed in ________
Fill in the blank(s) with correct word
Computer Science & Information Technology
Use the Speech Recognition menu in Windows to perform which of the following tasks?
a. Configure a touch screen. b. Configure speakers. c. Configure a microphone. d. Configure system sounds.
Computer Science & Information Technology