1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
4 years ago
10

Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control

process does Gina's company use.
A. file locking

B. file merging

C. file subversion

D. file conversion
Computers and Technology
1 answer:
Dmitry [639]4 years ago
8 0

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

You might be interested in
Which two options are negotiated via ncp during the establishment of a ppp connection that will use the ipv4 network layer proto
liberstina [14]
<span>NCP are protocols that are used for establishing PPP sessions. </span>During the establishment of a PPP connection that will use the IPv4 network layer protocol the following options are negotiated: the algorithm to compress TCP and IP headers and the IPv4 address used for routing IP over the PPP link.

6 0
3 years ago
Some cases have ____, also called spacers, which are round plastic or metal pegs that separate the motherboard from the case, so
lara [203]

Answer:

The answer is "standoffs ".

Explanation:

It is rolling metal or plastic pins, which is used to divide the computer frame from the chipset are stiffer springs or pauses. It unplugs the desks, and unscrew the fasteners, which keep the board on to the cases to remove the piece.

  • It is a fixed size hooked divider used only to elevate each element above others and in such an ensemble.  
  • It is generally round or hex, typically made of copper, brass or nylon.
6 0
3 years ago
Which of the following is LEAST needed when programming a computer?
PtichkaEL [24]
Computer language is essential
6 0
3 years ago
To generate a series of first ten counting number of algorithm​
Anettt [7]
Uhh i need points so i don’t fail math.
3 0
3 years ago
How do you handle sensitive data?
arlik [135]

  1. <em>Take stock. Know what personal information you have in your files and on your computers.</em>
  2. <em>Scale down. Keep only what you need for your business.</em>
  3. <em>Lock it. Protect the information that you keep.</em>
  4. <em>Pitch it. Properly dispose of what you no longer need.</em>
  5. <em>plan </em><em>ahead</em>

<em>hope </em><em>it</em><em> helps</em>

7 0
3 years ago
Other questions:
  • Help please brainliest
    8·1 answer
  • A(n) ________ moves over the spinning platters to retrieve data from the hard disk.
    6·1 answer
  • 2) Search the Web for two or more sites that discuss the ongoing responsibilities of the security manager. What other components
    15·1 answer
  • What are two names for the database that holds digital signatures provided by os manufacturers, such as microsoft and red hat?
    6·1 answer
  • Which of the following is a correct group scope type in AD, windows server 2016?
    6·1 answer
  • Question # 2
    7·1 answer
  • The Uniform Electronic Transmission Act (UETA) a. declares that e-signatures are invalid. b. has only been adopted in a handful
    8·1 answer
  • Define the term visual as used in visual programming
    9·1 answer
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
  • ____ characterized the period now known a Web 1. 0. Augmented reality
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!