The data in a file are normally accessed one __________ at a time.
a. field
b. character
c. record
d. data element
c. record
Computer Science & Information Technology
You might also like to view...
A Trojan horse can perform which of the following actions?
A) Erase files on a computer. B) Launch a DDoS attack. C) Install a backdoor on a computer. D) All of the above
Computer Science & Information Technology
Write a Java statement to create a menu with the title “Drawing Template”.
What will be an ideal response?
Computer Science & Information Technology