The data in a file are normally accessed one __________ at a time.

a. field
b. character
c. record
d. data element

c. record

Computer Science & Information Technology

You might also like to view...

A Trojan horse can perform which of the following actions?

A) Erase files on a computer. B) Launch a DDoS attack. C) Install a backdoor on a computer. D) All of the above

Computer Science & Information Technology

Write a Java statement to create a menu with the title “Drawing Template”.

What will be an ideal response?

Computer Science & Information Technology