List three methods used to control the source program library.

What will be an ideal response?


passwords, separate test libraries, audit trail and management reports, program version numbers, controlling access to maintenance commands

PTS: 1

Computer Science & Information Technology

You might also like to view...

The default file format in Access 2016 is the ________ extension

Fill in the blank(s) with correct word

Computer Science & Information Technology

________ is the process of rearranging records in a specific order

Fill in the blank(s) with correct word

Computer Science & Information Technology

By default, Bridge creates a start page for a Web gallery with the name ____, in a folder named Adobe Web Gallery.

a. index.html b. default.htm c. home.htm d. default.html

Computer Science & Information Technology

What should you change in order to make characters narrower and give text a tall, thin appearance?

A. scale B. font size C. font style D. font effects

Computer Science & Information Technology