Answer:
d) All of the above
Explanation:
In configuration management, the Identify configuration items, work products and related components are present.
- All the documents which are related to the work,the manuals how that the system works are present in the configuration item identification.
- The source code that is implement for the functioning of the products.These are implemented at the time of generation of products.
- Software Requirement Specifications are also specified by SRS it is present in design stage of software development life cycle,it is also a part of configuration item identification.
Click Accept or Reject steps involved in accepting all the changes in a document
Click Accept or Reject.
<u>Explanation:</u>
When end user drags and drop title in correct box in an open document. He has accept changes to all. Normally end user is prompted for accept and reject based on his or her selection documents changes are happened.
End user has to by click on review menu in the open document and he or she has to click on go to first tracked change. Once clicked end user is prompter for to accept the changes. Once changes is accepted next tracked changes is prompted for open document.
Answer: Virus Hoax
Explanation:
A computer virus hoax is a message that warns someone of a false virus threat. It is a a chain email that encourages who ever has received the message to pass it to other people as a form of warning.
Arch bridges have a semicirclar, curved support.