The ability to find an individual item in a file immediately _____ is used. 1) File allocation table 2) Directory 3) Sequential access 4) Direct access 4 5) None of these

1 Answer

Answer :

Answer :1

Related questions

Description : The ability to find an individual item in a file immediately _____ is used: a) file allocation table b) directory c) sequential access d) direct access e) None of The Above

Last Answer : a) file allocation table

Description : The Method of file organisation in which data records in a file are arranged in a specified order according to a key field is known as the1 Direct access method 2) Queuing method 3) Predetermined method 4) Sequential method

Last Answer : 4) Sequential method

Description : Direct access of file is also known as (1) random access (2) relative access (3) file access (4) sequential access

Last Answer : random access

Description : FAT stands for 1) File Accomdation Table 2) File Access Tape 3) File Allocation Table 4) File Activity Table

Last Answer : 3) File Allocation Table

Description : FAT stands for 1 File Accomdation Table 2 File Access Tape 3 File Allocation Table 4 File Activity Table

Last Answer : 3 File Allocation Table

Description : ________ is the ability of a device to ‘jump’ directly to the requested data A. Sequential access B. Random access C. Quick access D. None of the Above

Last Answer : B. Random access

Description : The two basic types of record access methods are: A) Sequential and random B) Sequential and indexed C) Direct and immediate D) Online and real time

Last Answer : Answer : A

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : C

Description : Which access method is used to access cassette tape? A) Direct B) Sequential C) Both of the above D) None of the above

Last Answer : Answer : B

Description : Magnetic disks are the most popular medium for A) Direct access B) Sequential access C) Both of above D) None of above

Last Answer : Answer : D

Description : Which of the Following is not true of immediate processing: a) It is often used in real time applications b) It can be used in an airline reservation system c) It can occur with either sequential or direct access files d) None of The Above

Last Answer : c) It can occur with either sequential or direct access files

Description : Hard Disks and Diskettes are: a) Direct Access Storage Devices b) Sequential Access Storage Devices c) Rarely used Microcomputers d) None of The Above

Last Answer : a) Direct Access Storage Devices

Description : Magnetic disk a medium known as 1) Serial access 2) Direct access 3) Sequential access 4) Sequential and rotational access

Last Answer : 2) Direct access

Description : Separate Read/Write heads are required in which of these memory access schemes. 1) Random Access 2) Sequential Access 3) Direct Access 4) None of these

Last Answer : 4) None of these

Description : Separate Read/Write heads are required in which of these memory access schemes. 1 Random Access 2 Sequential Access 3 Direct Access 4 None of these

Last Answer : 4 None of these

Description : What does DMA stand for? A) Distinct Memory Access B) Direct Memory Access C) Direct Module Access D) Direct Memory Allocation

Last Answer : Answer : B

Description : DMA stands for ________ 1) Direct Memory Access 2) Distinct Memory Access 3) Direct Module Access 4) Direct Memory Allocation

Last Answer : 1) Direct Memory Access

Description : DMA stands for ________ 1 Direct Memory Access 2 Distinct Memory Access 3 Direct Module Access 4 Direct Memory Allocation

Last Answer : 1 Direct Memory Access

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : Sequential and random

Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above

Last Answer : Both of above

Description : The two basic types of record-access methods are a. Sequential and random b. Sequential and indexed c. Direct and immediate d. On-line and real time

Last Answer : a. Sequential and random

Description : Magnetic disks are the most popular medium for a. Direct access b. Sequential access c. Both of above d. None of above

Last Answer : c. Both of above

Description : Describe sequential and direct access method.

Last Answer : Sequential access: Information from the file is processed in order i.e. one record after another. It is commonly used access mode. For example, editors and compilers access files in sequence. A read ... prevent the user from accessing portions of the file system that may not be part of his file.

Description : DMA stands for: a. Direct memory access b. Direct memory allocation c. Data memory access d. Data memory allocation

Last Answer : a. Direct memory access

Description : In the ………………… mode any record in the file can be accessed at random A) Sequential access B) Random access C) Standard access D) Source access

Last Answer : B) Random access

Description : Which of the following information not included in memory table? A) The allocation of main memory to process. B) The allocation of secondary memory to process C) Any information needed to manage virtual memory D) Any information about the existence of file

Last Answer : D) Any information about the existence of file

Description : ................. maintains the list of free disk blocks in the Unix file system. (A) I-node (B) Boot block (C) Super block (D) File allocation table

Last Answer : (C) Super block 

Description : Storage that retains its data after the power is tuned off is referred to as 1) volatile storage 2) non-volatile storage 3) sequential storage 4) direct storage 5) None of these

Last Answer : Answer :2

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : The issues that deal with the collection and use of data about individual is _____: a) Access b) Publicity c) Accuracy d) Property e) Privacy

Last Answer : e) Privacy

Description : Which of the following is not true for a magnetic disk? A) It is expensive relative to magnetic tape B) It provides only sequential access to stored data C) Users can easily update records by writing over the old data D) All of above

Last Answer : Answer : B

Description : Memories in which any location can be reached in a fixed amount of time after specifying its address is called ________ A. Sequential Access Memory B. Random Access Memory C. Quick Access Memory D. Mass storage

Last Answer : B. Random Access Memory

Description : The simultaneous execution of two or more instructions is called- 1) Sequential Access 2) Reduced Instruction set computing 3) Multiprocessing 4) None of these

Last Answer : 3) Multiprocessing

Description : Sequential step hackers use are: _ _ _ _. A. Maintaining Access. B. Reconnaissance C. Scanning. D. Gaining Access.

Last Answer : A. Maintaining Access.

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : 4 Which is the top most directory in the server file system A)Root Directory

Last Answer : A)Root Directory

Description : Which is the top most directory in the server file system A)Root Directory

Last Answer : A)Root Directory

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1) large numbers of users direct access to the computer for problem solving 2) large number of user for file sharing 3) both of above 4) none

Last Answer : 1) large numbers of users direct access to the computer for problem solving

Description : The principle of time sharing is 1 large numbers of users direct access to the computer for problem solving 2 large number of user for file sharing 3 both of above 4 none

Last Answer : 1 large numbers of users direct access to the computer for problem solving

Description : Which of the following file organization is most efficient for a file with a high degree of file activity? A) Sequential B) ISAM C) VSAM D) B-Tree Index

Last Answer : Answer : A

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : Allotment of whole item of cost to a cost centre or cost unit is known as: (a) Cost Apportionment (b) Cost Allocation (c) Cost Absorption (d) Machine hour rate

Last Answer : (d) Machine hour rate

Description : The function of a government to provide goods that cannot normally be provided by market mechanisms between individual customers and producers, is known as: a) Distribution function b) Allocation function c) Stabilization d) Protection

Last Answer : b) Allocation function

Description : Does anyone know a way to secure an individual file in Windows so that access is by password only?

Last Answer : answer:What version of Windows. 3.1, 95, 98, ME, Bob, NT, 2000, XP, Vista, Win7, It makes a difference…

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : Is Directory of Open Access Journals reputable?

Last Answer : This may sound obvious, but checking the Open Access Journals (DOAJ) directory is a great way to start your paper submission process. Here, you can check the open access status of a ... which is limited to pure open access journals that are published under the permissible Creative Commons license.

Description : What is the protocol called that defines how a client can access information perform operations and share directory data on a directory sever?

Last Answer : LDAP (Lightweight Directory Access Protocol)

Description : Is there any company directory that can provide direct contact information of decision-makers?

Last Answer : This is just me thinking out loud on how I would work around this. I would look up the company I am about to call. Find out the CEO or President, the higher up person. Write down their ... . They will just think that their company is wanting to talk to you. This method should get you somewhere.

Description : A storage device whe3re the access time is depended upon the location of the data is a. Random access b. Serial access c. Sequential access d. Transaction access

Last Answer : Serial access