A(n) ____ file object is a stream that connects a file of logically related data, such as a data file, to a program.

a. external
b. internal
c. physical
d. logical

d. logical

Computer Science & Information Technology

You might also like to view...

Answer the following statements true (T) or false (F)

1. Modes of operation are the alternative techniques that have been developed to increase the security of symmetric block encryption for large sequences of data. 2. The advantage of a stream cipher is that you can reuse keys. 3. A message authentication code is a small block of data generated by a secret key and appended to a message. 4. Like the MAC, a hash function also takes a secret key as input. 5. The strength of a hash function against brute-force attacks depends solely on the length of the hash code produced by the algorithm.

Computer Science & Information Technology

What is a deque?

What will be an ideal response?

Computer Science & Information Technology