adplus-dvertising
frame-decoration

Question

Sequential access files are often used with media devices such as

a.

Hard disk

b.

WORM disk

c.

Magnetic tape

d.

Zip tape

Posted under Operating System

Answer: (c).Magnetic tape

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. Sequential access files are often used with media devices such as

Similar Questions

Discover Related MCQs

Q. File operation used to access attributes of a file is known to be

Q. In processing state of data till its completion, data is stored in a file known to be

Q. A set of programs used for creating, deleting and updating files, forms a

Q. Security features offered by a file oriented approach, are of

Q. Report generated by a data processing application in a computer accessible form is stored in

Q. Against loss of data, a file is created as a safety precaution named to be

Q. All current data relevant to an application is stored in

Q. A file can be stored at location to which address generating function maps record's key field value is known to be

Q. Records are stored in a determined order one after another by key field value, in process of

Q. Selection of a particular file organization depends upon

Q. Address generating function of direct file organization is known as

Q. Hashing algorithm may end up mapping key values of two or more records to same storage address that results in

Q. File organization system that uses two files for every data file is said to be

Q. Physical organization of records of a file for storage and retrieval purposes is dealt with

Q. Most commonly used file organizations techniques in business data processing applications can be classified into

Q. To convert a record key value to storage address on disk, direct file organization uses

Q. Operating systems' module that allocates memory space to programs in need of that resource, is known as

Q. Module of an operating system that is responsible for creation and deletion of processes is named as

Q. Various system resources can be scheduled to requested processes by means of

Q. Information of a computer system is protected from unauthorized access by a module known to be