The method of access which uses key transformation is known as
A. | Direct |
B. | Hash |
C. | Random |
D. | Sequential |
Answer : B Explanation : |
|
Option: A Explanation : Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. Explanation will come here. |