1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
iogann1982 [59]
3 years ago
13

Give examples of applications that access files by each of the following methods:

Computers and Technology
1 answer:
KengaRu [80]3 years ago
4 0

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

You might be interested in
Why do you lose internet access when you alter the arp to a static address?
Mila [183]
Sometimes you lose internet access because by altering the arp to a static address, there is change during that so u usually lose the i internet access [ hope i’m right ]
6 0
3 years ago
Read 2 more answers
A _____ utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific
Vera_Pavlovna [14]

Answer:

User application

Explanation:

A user application is a program that is created by using a standard software that is adjusted to the user's needs that can't be fulfilled by an existing system. According to this, the answer is that a user application utilizes standard business software, such as Microsoft Word or Microsoft Excel, which has been configured in a specific manner to enhance user productivity.

7 0
3 years ago
Good morning beautiful people,
Nataliya [291]

Answer:

The girl that fed the dying boy?/

Explanation:

4 0
3 years ago
What term is used to describe state-sponsored attackers that are used for launching computer attacks against their foes
Dvinal [7]
The answer is : nation state actors
6 0
2 years ago
Help me with this please. I'll mark Brainiest
S_A_V [24]
What do you need help with?
3 0
3 years ago
Other questions:
  • Hailey is preparing a questionnaire on the different number systems. He asks the students to write down the correct decimal and
    10·2 answers
  • simpley convert the code below to assembly languageYour proof-of-study task is to hand-compile the code below into an assembly l
    11·1 answer
  • How do you make a 'does not equal' symbol on the computer? you know the equal sign with a line through it..?
    6·1 answer
  • A batholith is an example of a(n) _____ igneous rock (one of the two main igneous rock groups).
    9·2 answers
  • RrayList Mystery Consider the following method:
    9·1 answer
  • A tablet computer is a low-cost, centrally managed computer with no internal or external attached drives for data storage.
    10·1 answer
  • Complete the below method, isPalindrome(), that takes in a String and returns a boolean. The boolean should be true if the Strin
    7·1 answer
  • Most job applications are online. true or false
    11·1 answer
  • Puede existir la tecnologia sin la ciencia y sin las tecnicas,explique si o no y fundamente el porque de su respuesta
    11·1 answer
  • Need help with Python coding...
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!