1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
10

Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control

process does Gina's company use.
A. file locking

B. file merging

C. file subversion

D. file conversion
Computers and Technology
1 answer:
Dmitry [639]4 years ago
8 0

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

You might be interested in
What type of degree do web masters tend to have?
ELEN [110]

Answer:

Webmaster is an outdated term. but besides that, Strong writing skills are valued, as is knowledge of computer science, programming, and advertising. A bachelor's degree in computer science and/or English is useful. Earning a web design diploma, an associate's degree or a bachelor's degree can be helpful in becoming a webmaster. Relevant coursework may also be enough training, as long as it is accompanied by a thorough knowledge of various programming languages and design software.

Explanation:

There aren't any formal requirements to become a webmaster, but you'll need proficiency in web-based skills like programming, layout, and content development to succeed. An Associate of Applied Science degree in computer science or technical courses geared toward webmasters can be beneficial. That said, versatile webmasters still exist as an option for organizations looking to make the most of their online presence. Webmasters even keep track of content, campaigns and marketing efforts. Most search experts rely on Google Webmaster Tools (GWT) to analyze the technical aspects of a website. These experts focus on data like crawl stats, page errors and rich snippets. Here are 6 easy ways to use Webmaster Tools to improve your on-page SEO. A webmaster can keep tabs on everything related to a website. They monitor its performance with search engines, functionality, speed and design. Webmasters even keep track of content, campaigns and marketing efforts. At its simplest, a web designer is someone who creates the design of a website. That's it. The work of actually making it functional and live on the internet is under a separate job title of web developer. So, most people, when they say they need a website designer, actually need a designer/developer

7 0
3 years ago
When you are cut off in traffic by another driver and you respond by “flipping him the bird,” you are using a type of gesture ca
harina [27]
How does this have anything to do with technology and i think so.
5 0
4 years ago
A cpu with an external clock speed of 2 ghz and a 64-bit data bus can (theoretically) transfer how much data per second?
GREYUIT [131]
The CPU could cycle the bits 2000000000 a second. That means theoretically it could process 16 gigabytes of data a second.
5 0
3 years ago
A ________ is a system of hardware and software that stores user data in many different geographical locations and makes that da
castortr0y [4]

Answer:

Content delivery network.

Explanation:

The content delivery network is also known as a network of content distribution it is a globally decentralized network of the proxy servers and the server farms.The main aim of a content delivery network is to giving the insularity of the high accessibility and efficiency by distributing the service to the end-user.

The content delivery network is a type of hardware and software network that stores u data in different geographical locations also giving the data available on the request.

7 0
3 years ago
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
xz_007 [3.2K]

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

3 0
3 years ago
Other questions:
  • Do all accounts use the same routing number
    12·1 answer
  • In Linux, when logged in as a normal user with root privileges, which command must precede the apt-get command in the command li
    13·1 answer
  • What is one important feature of an AUP?
    14·1 answer
  • When converting text to a table which feature should be used
    15·1 answer
  • An expression involving byte, int, and literal numbers is promoted to which of these?
    12·1 answer
  • Big data: options:
    8·1 answer
  • In a stream channel what is deposited first?
    7·1 answer
  • In this problem, you will fill in the code for a function count_digits(val) that takes a positive integer, val, and returns a li
    12·1 answer
  • Your classmate is frustrated because the code that was designed to add up her five quiz grades is not working properly.
    12·1 answer
  • The red dot says ‘you tried to read records from a table called “Netflix Content” but that table doesn’t exist in this’
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!