COMPUTER ETHICS AND SECURITY
TYPES OF THREATS AND ATTACKS
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
Memory management
|
|
Stored procedures
|
|
Normalization
|
|
Repository
|
Detailed explanation-1: -A VCS will provide a database or a storage location where you can store your files. This is called a repository or repo.
Detailed explanation-2: -Version control uses a repository (a database of changes) and a working copy where you do your work. Your working copy (sometimes called a checkout) is your personal copy of all the files in the project. You make arbitrary edits to this copy, without affecting your teammates.
Detailed explanation-3: -We call the collection of edits we are making at one time a commit.
Detailed explanation-4: -Generated files. Build artifacts. IDE specific configuration files. Binary documentation files. Pre-compiled and source code of 3rd party dependencies. All other binary content. 26-Sept-2018