Question: 1 MC All data items processed by computers are reduced to combinations of and . a ) ones, twos. b ) zeros, ones. c )

1 MC All data items processed by computers are reduced to combinations of
and .
a) ones, twos.
b) zeros, ones.
c) zeros, twos.
d) None of the above.
2 MC Bytes are composed of bits.
a) Ten.
b) Six.
c) Eight.
d) Two.
3 MC To facilitate the retrieval of specific records from a file, at least one field in
each record is chosen as a .
a) record key.
b) file key.
c) field key.
d) None of the above.
4 MC When a Python program begins execution, Python creates three file
streamssys.stdin, sys.stdout and .
a) sys.stderror.
b) sys.exit.
c) sys.stdfile.
d) sys.stderr.
5 MC Function , which receives one required argument and two
optional arguments, creates a stream object.
a) create.
b) open.
c) write.
d) buffer.
6 MC File-open mode opens a file to output data to the file.
a)"r".
b)"w".
c)"a".
d) Both b and c.
7 MC If the file open-mode argument is not specified, the default value is
.
a)"r".
b)"w".
c)"a".
d) None of the above.
8 MC When the symbol follows the print keyword, the print
statement redirects the output to the file object that appears to the right of the symbol.
a)>>>.
b)-->.
c)-->>.
d)>>.
9 MC The arguments to function seek are (a required argument) and
(an optional argument).
a) offset and seek direction.
b) seek direction and location.
c) file-position pointer and location.
d) offset and file-position pointer.
10 MC The is an integer value that specifies the location in the file as
a number of bytes from the seek direction of the file.
a) location.
b) file-position pointer.
c) offset.
d) bit.
11 MC Instant access is possible with (sometimes called direct-access
files).
a) transaction files.
b) ordered-access files.
c) record-key files.
d) random-access files.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!