1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
VARVARA [1.3K]
3 years ago
10

Gina works in an SDLC team. When Gina makes changes to a file, no one else is allowed to acess it. Which type of version control

process does Gina's company use.
A. file locking

B. file merging

C. file subversion

D. file conversion
Computers and Technology
1 answer:
Dmitry [639]3 years ago
8 0

Answer:

A. file locking.

Explanation:

File locking in computer technology is a data management mechanism used by software developers to completely restrict access of other users to a software program or computer file by granting permissions to only one user who can delete, modify or edit the application program at any point in time. This simply means that in the software development life cycle (SDLC), file locking is used to avoid interceding update on a particular software by restriction of other users while it's being modified by another user.

For instance, if two users (Gina and Mike) open the same software program, Gina then proceed to modify and save the changes. If Mike also modifies the software program and saves it, this would overwrite Gina's update. Hence, in order to prevent this type of conflict in software development, it is highly recommended that a file locking mechanism is adopted.

<em>This ultimately implies that when Gina make changes to a file, no one else is allowed to access the file because a file locking mechanism is being used by Gina's company as a version control process. </em>

You might be interested in
A company uses the account code 669 for maintenance expense. However, one of the company's clerks often codes maintenance expens
kotegsom [21]

Answer:

The correct answer to the following question will be "Valid-code test".

Explanation:

Even though no significance labels (including a standardized test score parameter) exist, valid data input codes or protocols could still be defined by having to type the correct codes as well as ranges.

  • To diagnose the given mistake, a valid code review will be the strongest internal control audit to incorporate into the organization's computer program.
  • To insert valid code the syntax is: <Code or Range>. Throughout this scenario, each code is decided to enter on another step.
3 0
3 years ago
Which one of these do you need to become president of the US ?
gladu [14]

Answer:

Tbh i dont even know

Explanation:

I had who i wanted to become president but i don't even know anymore

7 0
3 years ago
Read 2 more answers
What are the five generations of computer software​
Lerok [7]

Answer:

1st gen: Vacuum Tubes(1940–1956)

2nd gen: Transistors(1956–1963)

3rd gen: Integrated Circuits: (1964–1971)

4th gen: Microprocessors (1971–PRESENT)

5th gen: Artificial Intelligence (present)

Explanation:

8 0
2 years ago
Is the internet a private place?
Ludmilka [50]
Hey there!

No, the internet is not a private place

I hope this helped! :-)
8 0
3 years ago
Read 2 more answers
A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on mult
Mrrafil [7]

A raid 1 and mirrored system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives.

<h3>What is Disk mirroring?</h3>

In data storage, disk mirroring is a term that connote the doubling of logical disk volumes into a different physical hard disks so that it will always be available.

Conclusively, Note that this is mostly used in RAID 1. A mirrored volume is known to be full logical depiction of separate volume copies and as such the answer above is correct.

Learn more about system from

brainly.com/question/25594630

8 0
2 years ago
Other questions:
  • Truncation is a keyword search technique that helps you find useful variations of a term or terms. You want to find books on the
    5·1 answer
  • While in slide show mode, if you are not careful you can close the application by clicking the x on the menu bar. question 38 op
    12·2 answers
  • Which of the following correctly orders the investments from LOWER risk to HIGHER risk?
    7·2 answers
  • The picture that graphically represents the items you use in Windows is called a/an
    11·1 answer
  • What do character formats do for your document's message??
    14·2 answers
  • write a script that creates and calls a stored procedure named insert_category. first, code a statement that creates a procedure
    10·1 answer
  • Draw a datapath that can perform the following set of register replacement and combinational operations. Assume all registers ar
    5·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
  • A global clothing company is looking to create a more immersive shopping experience for customers.What is a way the company can
    14·2 answers
  • Fort Nite is the best u can’t say it’s not
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!