All keys which are used to identify particular item must be _________
All keys which are used to identify particular item must be _________
In computer programming, particular way by which data records are arranged into a specific manner is considered as __________
In computer programming, particular way by which data records are arranged into a specific manner is considered as __________
In sorting sequential files, data is stored only when it is in _____________
In sorting sequential files, data is stored only when it is in _____________
Access in which records are accessed from and inserted into file, is classified as _____________
Access in which records are accessed from and inserted into file, is classified as _____________
File which is automatically updated when needed is classified as ______________
File which is automatically updated when needed is classified as ______________
Programs written easily by the programmers in a ______________
Programs written easily by the programmers in a ______________
Preparation of disc for subsequent file storage is classified as ______________
Preparation of disc for subsequent file storage is classified as ______________
Arrangement of data into a specific order is classified as ___________
Arrangement of data into a specific order is classified as ___________
In microcomputers files, inquiry programs used for simple purposes are classified as ____________
In microcomputers files, inquiry programs used for simple purposes are classified as ____________
The smallest piece of data that could be deal separately is classified as ____________
The smallest piece of data that could be deal separately is classified as ____________
Action in which directory reference is erased and space is available for other data is done when the file is _______________
Action in which directory reference is erased and space is available for other data is done when the file is _______________
Search in which record is checked and read for the desired items in file linearly is classified as ___________
Search in which record is checked and read for the desired items in file linearly is classified as ___________
File code which engineers add to the file name and limit access to few users is called ____________
File code which engineers add to the file name and limit access to few users is called ____________
Large collection of structured data that can be used in different applications is called __________
Large collection of structured data that can be used in different applications is called __________
Program which reads one record at a time from transaction and master file is called the ______________
Program which reads one record at a time from transaction and master file is called the ______________
Destruction of files for malicious reasons such as access by fraudulent people is classified as being __________
Destruction of files for malicious reasons such as access by fraudulent people is classified as being __________
Program packages that allows the user to search items in a file or some combination of selected items are classified as ____________
Program packages that allows the user to search items in a file or some combination of selected items are classified as ____________
Field which is used to identify specific record and can't be duplicated is classified as _____________
Field which is used to identify specific record and can't be duplicated is classified as _____________
In the files, if order of operation on two or more files are similar, then operation will be ___________
In the files, if order of operation on two or more files are similar, then operation will be ___________
To recognize the last record of program file, program uses ____________
To recognize the last record of program file, program uses ____________