1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

Which one of the following is not possible to view in the debug logs?

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
8 0

Answer:

Formula field calculations

Explanation:

We can use debug logs to track events in our company, these events are generated if active users have trace indicators.

A debug log can register information about database operations, system processes and errors, in addition, we can see Resources used by Apex, Workflow Rules, Assignment Rule, HTTP calls, and Apex errors, validation rules. The only one we cannot see is Formula field calculations.

You might be interested in
You need to set up a network that needs to span multibple buildings. For this reason, you want to use the cabling that supports
prisoha [69]

Answer:

Extended star topology

Explanation:

The Extended star topology also known as the tree topology comprises of characteristics of the linear bus topology and star topology.

It consist of multiple star connected topologies connected to a linear backbone bus topology. It has a wider communication area than the star topology and uses more cabling length. All the star networks are connected to a central connection which allows to have a full functioning network when others fails.

5 0
3 years ago
Read the code below.
Rasek [7]

Answer:

theres an error on line one used python idle

Explanation:

8 0
3 years ago
Ethernet use a contention-based media access method defined by the IEEE 802.3 standards called ___ .
egoroff_w [7]

off the top of my head I think this might be (CSMA/CD)

4 0
3 years ago
An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int varia
Veronika [31]

Answer:

Hi, according to your description you need the code that represents the statement I will use C++ language to describe the code.

// Example program

#include <iostream>

int main()

{

int a [5] = [1,2,3,4,5];

int j = 0;

  return 0;

}

Explanation:

In this language you must have to declare in the header the <em>libraries</em> that you include in your main program, after that a function <em>main</em> where your put your<em> logical algorithm</em> in fact, you declare the algorithm that you need. In this case declare a variable and assign an <em>array</em> of <em>5 positions</em> and a j variable and assign a number between 0 and 3.

I hope it's help you.

7 0
3 years ago
Now write the outline of a Class called BulgarianSolitaire. Remember, what does this class need to "know" and what does it need
torisob [31]

Answer:

import java.util.ArrayList;

import java.util.Collections;

class Bulgarian

{

  public static void main(String[] args)

  {

      max_cards=45;

      arr->new ArraryList

      col=1;

      card=0;

      left=max_cards;

      do{

          col->random number

          row->new ArrayList;

          for i=0 to i<col

          {

              card++

              add card into row

          }

          add row into arr

          left=max_cards-card;

      }while(card<max_cards);

      finish->false

      while(!finish)

      {

          for i=0 to arr.size()

              remove one card from each row

          add row into arr

          size->new ArrayList;

          for i=0 to i<arr.size()

              add arr[i] into size

          sort(size)

          for i=1 to size.size()

              if ith element is equals to (i-1)+1

                  finish->true

              else

                  finish->false

          for i=0 to i<arr.size()

              print->arr elements

      }

  }

}

7 0
2 years ago
Other questions:
  • The memory allocated for a float value is ____ bytes.
    9·1 answer
  • To configure a router / modem, what type of IP interface configuration should you apply to the computer you are using?
    8·1 answer
  • Search the internet for news of a motor vehicle collision in your community involving drugs or alcohol. Keeping in mind that you
    8·1 answer
  • Write a Python program that reads the CSV file, compares the population estimates of every row for 2010 and 2017 and computes th
    10·1 answer
  • Which of the following is an online library?
    8·2 answers
  • Suppose you want to boot a VM from its virtual DVD drive, but it boots to the VM’s hard drive. Which of the following could be t
    12·1 answer
  • You have a team member on a remote project who is not fluent in English and
    15·1 answer
  • "Bookings are to be stored in three separate
    7·1 answer
  • Describe who was Alan Turing in 100 words.<br> First to answer will get brainliest.
    7·1 answer
  • ___________ is some danger that can exploit a vulnerability.
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!