1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
djverab [1.8K]
3 years ago
7

You implement basic version control and go through the phase of creating a local repository. Initiate the commands to set up tha

t local repository
Computers and Technology
1 answer:
notsponge [240]3 years ago
3 0
Version control is the foundation of DevOps. Gain speed with Helix Core. Get the version control tools you need. Try today. Modern Collaboration. Increase Visibility.
You might be interested in
A customer comes into a grocery store and buys 8 items. Write a PYTHON program that prompts the user for the name of the item AN
Dmitrij [34]

Answer:

name = []

price = []

for i in range(0,8):

item_name = input('name of item')

item_price = input('price of item')

name.append(item_name)

price.append(item_price)

for i in range(0, 8):

print(name[i], '_____', price[i])

Explanation:

Python code

Using the snippet Given :

Apples 2.10

Hamburger 3.25

Milk 3.49

Sugar 1.99

Bread 1.76

Deli Turkey 7.99

Pickles 3.42

Butter 2.79

name = []

price = []

#name and price are two empty lists

for i in range(0,8):

#Allows users to enter 8 different item and price choices

item_name = input('name of item')

item_price = input('price of item')

#user inputs the various item names and prices

#appends each input to the empty list

name.append(item_name)

price.append(item_price)

for i in range(0, 8):

print(name[i], '_____', price[i])

# this prints the name and prices of each item from the list.

3 0
3 years ago
You have invested millions of dollars for protecting your corporate network. You have the best IDS, firewall with strict rules a
Anna35 [415]

Answer:

Social Engineering

Explanation:

Even if you invest in the best possible security infrastructure for your corporate network, you will still be vulnerable to attacks which exploit human shortcomings. An example is where an attacker manipulates a company employee to get the system access password in return for a favour. Now he can use the password to bypass all security infrastructure and gain access to critical data and code.

4 0
3 years ago
Which bitwise operation has the same effect as multiplying a by 16?
Shalnov [3]
<span>Jun 15, 2011 - Multiplication and division can be achieved using bit operators, for example .... I discovered pretty much the same thing for Sun CC close to 20 years ago. ... Just to add a rough estimation: On a typical 16-Bit processor ..... Doing it yourself willaffect readability and possibly have no effect on performance.</span><span>
</span>
4 0
3 years ago
Read 2 more answers
How do you know when a spreadsheet object is active in a Word document?      A. The Ribbon is minimized. B. The Excel Formula ba
MaRussiya [10]
Y<span>ou will know when a spreadsheet object is active in a Word document </span>t<span>he Word icon in the taskbar is selected. The ribbon of Word will provide you with the Microsoft Excel features to be used for editing. These include charts, conditional formatting, and formulas.</span>
3 0
3 years ago
Read 2 more answers
Difference between server and a client computer
maw [93]

Answer:

A server stores data for a client computer to access and use, and pretty self eplanitory for a client computer

Explanation:

5 0
3 years ago
Other questions:
  • How should a cover letter begin?
    13·2 answers
  • An example of live footage is when?
    10·2 answers
  • In the textbox below, write an email that you, as an administrative assistant at Techno Inc., would write to request information
    7·1 answer
  • Ayudaa, 5 ejes de sistemas tecnológicos
    5·1 answer
  • What is the largest value that can be represented by 6 binary digits? .
    5·1 answer
  • The ______________ shows that you have fully researched the topic and gives you a chance to prove your claim.
    8·1 answer
  • Omo help me i need it now.
    12·1 answer
  • Which of the following is not a data visualization technique?
    6·1 answer
  • Assume that students in a course are required to produce a written report on an ICT-related
    14·1 answer
  • State the base of correct addition of 27 + 6 =34​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!