List three methods used to control the source program library.
What will be an ideal response?
passwords, separate test libraries, audit trail and management reports, program version numbers, controlling access to maintenance commands
PTS: 1
Computer Science & Information Technology
You might also like to view...
The default file format in Access 2016 is the ________ extension
Fill in the blank(s) with correct word
Computer Science & Information Technology
________ is the process of rearranging records in a specific order
Fill in the blank(s) with correct word
Computer Science & Information Technology
By default, Bridge creates a start page for a Web gallery with the name ____, in a folder named Adobe Web Gallery.
a. index.html b. default.htm c. home.htm d. default.html
Computer Science & Information Technology
What should you change in order to make characters narrower and give text a tall, thin appearance?
A. scale B. font size C. font style D. font effects
Computer Science & Information Technology