1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
wlad13 [49]
3 years ago
15

What is one requirement for achieving Continuous Deployment

Computers and Technology
2 answers:
worty [1.4K]3 years ago
7 0

Answer:

You need to get everything in version control. You need to automate the entire environment creation process.

Explanation:

You need a deployment pipeline where you can create test and production environments, and then deploy code into them, entirely on demand.

hope this helped ^^

ELEN [110]3 years ago
5 0

Answer:

You need to get everything in version control. You need to automate the entire environment creation process. You need a deployment pipeline where you can create test and production environments, and then deploy code into them, entirely on demand.

You might be interested in
Which one???????????????
uranmaximum [27]
I think it’s A, but sorry if I’m wrong it just looks like the one. :) Also this is my first time answering a question!
3 0
3 years ago
Read 2 more answers
Which of the following can you not code in a subclass? Select one: a. a method with the same signature as a method in the superc
Ray Of Light [21]
<h2>Option D: a call to a private method of the superclass</h2>

Explanation:

Option a: a method with the "same signature" is allowed in the subclass. There will not be any confusion because the object which is trying to call the method will decide whether to call the sub class or super class.

Option b: a call to a super class constructor is possible because, when you create an object of sub class automatically the super class constructor will be called. Even the sub class constructor can call the super class constructor explicitly.

Option c: A subclass can create method that's not defined by the super class

Option D: a private method is private inside the class and hence even the object of that class cannot access.

8 0
3 years ago
Icons for the most commonly used applications on a Mac can be found here. Dock Menu bar Toolbar Toolbox
Kazeer [188]

What do you mean please reply to this comment with a question.

4 0
4 years ago
Read 2 more answers
What should you do when you encounter an active directory domain controller for the domain could not be contacted?
Nostrana [21]

Answer:

Issue the Dcdiag on all domain controller servers.

Explanation:

Active directory is a database that holds information of client's authentication for service access in a server. Domain controllers in servers holds these active directories, to replicate client's credentials for quick response to access to the server.

When a server domain can not contact the active directory domain controller, the Dcdiag command is issued on the server to check for connectivity issue to the DNS, AD replication, SYSVOL replication etc.

8 0
4 years ago
An extent is a named portion of secondary memory allocated for the purpose of storing physical records.
Dafna11 [192]

An extent is a named portion of secondary memory that is allocated for the purpose of storing physical records: a. true.

<h3>What is a hard-disk drive?</h3>

A hard-disk drive can be defined as an electro-mechanical, non-volatile data storage device that is made up of magnetic disks (platters) that rotates at high speed.

In Computer technology, all hard-disk drives are commonly installed on computers and other digital service for the storage of files and to enable the booting of a computer through its operating system (OS).

<h3>What is a memory?</h3>

A memory can be defined as a terminology that is used to describe the available space on an electronic device that is typically used for the storage of data or any computer related information such as:

  • Images
  • Videos
  • Texts
  • Music
  • Codes
  • Folders

In this context, we can reasonably infer that it is true that an extent refers to a named portion of secondary memory that is typically allocated for the purpose of storing physical records.

Read more on memory here: brainly.com/question/24881756

#SPJ4

3 0
2 years ago
Other questions:
  • Operating system software allows you to use your fingers, a mouse or other pointing device to select screen controls, such as bu
    5·2 answers
  • An app builder has created a report for sales people to view records from the custom object, some users have complained that the
    8·1 answer
  • The general manager for a retail clothing outlet was recently cited as saying, IT is the cornerstone of our company. All of our
    9·1 answer
  • A​ client-server application that requires nothing more than a browser is called​ ________.
    8·2 answers
  • Which term describes a protocol to manage a network able to configure out a network monitor activity and control devices
    14·1 answer
  • What is the small window that pops up in a application that requieres a response for the user
    12·2 answers
  • Which term is used to define the wires on a motherboard that move data from one part of a computer to another?
    13·1 answer
  • Write fade in shorthand​
    11·1 answer
  • Any websites online to make $50 daily?​
    11·1 answer
  • 1) The critical path of a network is the A) shortest time path through the network. B) path with the fewest activities. C) path
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!