This is a dedicated watch page for a single video.
You are an information system auditor of HDA Inc. You are assessing methods to mitigate the risk of unintentional changes to the source code. Which of the following is the most effective method for this purpose?