1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Vesna [10]
3 years ago
9

Leslie works in an SDLC team. When Leslie edits a file, it gets saved as an altered version. Later all the altered versions are

combined to form the
final file. Which type of version control process does Leslie's company use?
OA.
file merging
ОВ.
file locking
Ос.
file subversion
OD.
file conversion
O E.
file diversion
Computers and Technology
1 answer:
jeka57 [31]3 years ago
4 0

Answer:

file subversion

Explanation:

File subversion is compliant with the copy-modify-and merge model. Here, users make personal working copies which they can adjust concurrently. After the adjustments, the files are merged into a final copy by the version control system or someone.

This is similar to the version control process of Leslie's company. The team members all save their altered versions of the files which are then finally merged into one final file.

You might be interested in
Which fonts do not have a practical use in writing
kondaur [170]
To be honest with you, I don’t know but you can always look up on google “which fonts do not have a practical use in writing” and then there are links you can look up for the answer . Sorry but I don’t know which link is the best answer for your question ;) have a great day bro
8 0
3 years ago
How do you take apart a I pad and put it back together and it still works
vekshin1
I would suggest getting it checked out at the apple store doing it yourself will be quite challenging. Get it done by a professional.

8 0
3 years ago
In computing, a(n) _____ is an attack on an information system that takes advantage of a particular system vulnerability. Select
tensa zangetsu [6.8K]

Answer: d) Exploit

Explanation: Exploit is a type computer attack that successful when the computer system of an user is vulnerable and attacker can do the exploitation. This happens due to the weakness of the system, applications software, network etc.

Other given option are incorrect because exit door,glitch and bad are not any type of attack in the computer field that causes harm to the system.Thus the correct option is option(d).

4 0
3 years ago
Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfo
lesya [120]

Answer:

Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfortunately, a recent power surge caused a malfunction in the system just before votes were counted. The only information saved consists of the following facts:

Explanation:

• All the N citizens casted their vote.

• Exactly one candidate received more than N/2 votes.

• We don’t know how many candidates there were.

You are hired to help using your expertise in algorithms.

5 0
2 years ago
Materials used in front office
mina [271]

Answer:

A Telephone, Printer, Computers, Security Monitor

4 0
3 years ago
Other questions:
  • You’ve been hired to help with installing cable at a new office building for the local branch of the Social Security Administrat
    14·1 answer
  • Which of the following is not a thing needed to make a network?
    6·2 answers
  • Which is the largest unit of measurement for computer data?
    14·1 answer
  • Describe a common error that presenters make during their presentation and how to remedy the error​
    12·2 answers
  • Functions can accept any number of arguments.
    8·1 answer
  • The visitor's age is stored in the variable age, the day of the week is stored in a variable day, and the price in dollars is st
    8·1 answer
  • Please help I don’t know
    5·1 answer
  • Convert the following denary numbers into
    14·1 answer
  • Reports produced by the United Nations are considered
    11·2 answers
  • Which sql keyword is used to retrieve a minimum value from an attribute in a table
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!