1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
bekas [8.4K]
3 years ago
8

Which one of the following is not possible to view in the debug logs?

Computers and Technology
1 answer:
Usimov [2.4K]3 years ago
8 0

Answer:

Formula field calculations

Explanation:

We can use debug logs to track events in our company, these events are generated if active users have trace indicators.

A debug log can register information about database operations, system processes and errors, in addition, we can see Resources used by Apex, Workflow Rules, Assignment Rule, HTTP calls, and Apex errors, validation rules. The only one we cannot see is Formula field calculations.

You might be interested in
Matt is a senior developer for Cyber Protect, a company that helps secure management information systems. Matt's new task is to
Len [333]

Answer:

white-hat hacker

Explanation:

The white-hat hacker is also called as ethical hacking. The white hat hacker is the security of the computer in an ethical manner by some experts it specializing in system testing and other test modules of computer is to ensure the security of the information security of an organization.

As Matt is a  developer for protecting the Cyber in a company The Matt creates secure management information systems. it divides the new task into the computer So Matt is a white-hat hacker in that organization

4 0
3 years ago
Which f the following is not a characteristic of igneous rock
Ne4ueva [31]

Answer:

There are no answers but here is how you classify one with these characteristics so if its not on here probably that one hope this helps :)!

Explanation:

Igneous rocks are formed when melted lava or magma cools and crystallizes, and their unique traits are based on this process. They are strong because their mineral grains grow together tightly as they cool, and their minerals are usually black, white, or gray. They have a texture similar to something baked in an oven, like black bread or peanut brittle.  Some of the main minerals in igneous rocks are feldspar, quartz, olivine and mica. The size of the minerals depends on the depth of the magma that formed the rock. Deeper magma cools more slowly and forms larger crystals. Rocks that cool over a few months have microscopic mineral grains and are called extrusive. Rocks that cool over thousands of years have small to medium grains and are called intrusive. Rocks that cool over millions of years have large pebble sized grains and are called plutonic.  Granite and basalt make up the majority of igneous rocks. Basalt is dark and fine-grained with minerals rich in magnesium and iron. It is either extrusive or intrusive and is the primary rock on the ocean floor. Granite is light and coarse-grained and rich in feldspar and quartz. It is plutonic and less dense than basalt. Granite is found nearly everywhere beneath the continents.  The word "igneous" comes from the Latin word "fire" and is related to the melting process that forms these rocks.

3 0
3 years ago
One of the most studied computational problems is the ordering of a collection of values. Ordering is important because many pro
andreyandreev [35.5K]

I think the order should be 2-1-3-4, but the description of step 1 is confusing. In selection sort, you iterate from the point of the marker down through the entire list and find the smallest value, and swap that with the value at the marker. Then you advance the marker and repeat the process on the remainder of the list.

7 0
3 years ago
A rang check that could be use to validate... Date and time
lisov135 [29]

A range check is often used when a person works with data consisting of numbers, dates and times, or currency, ensuring that a number is within a specific range.

Explanation:

  • Range checks allow a person to set suitable boundaries.
  • An example of a range check is checking to see if the value of a 16-bit integer is within the capacity of a 16-bit integer. When a range check is performed, upper and lower boundaries are specified.
  • Range check is a validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
  • A method of validation which checks that data falls between an upper and lower acceptable value.
  • This validation check which can be applied to numeric fields. This is done to ensure that only numbers within a certain domain can be entered into a field. Remember that this does not necessarily mean that the data entered will be correct. But it will certainly lie within reasonable limits.
5 0
3 years ago
Electronic résumés have an attractive, highly formatted appearance. please select the best answer from the choices provided t f
Len [333]

An electronic resume can carry so much data about the person, and it includes images also. Then the statement is true.

<h3>What is an electronic resume?</h3>

An electronic resume is termed as a resume that is read by a computer program that summarizes the information of each person.

The electronic resume has the data such as their parent name, education, skills, job experience, hobbies, languages, and so on.

Thus, the photo of the document about the project or internship that has been done in the past can be given on the electronic resume by uploading the certificate on the computer system along with the resume.

For example, in companies like Linkedin, and so on there are many companies that ask about the person before creating an account.

More about the electronic resume link is given below.

brainly.com/question/2798964

4 0
2 years ago
Read 2 more answers
Other questions:
  • This was not a "true" operating system, but rather an operating environment.
    5·1 answer
  • What are the first two lines of defense a company should take when addressing security risks?
    10·1 answer
  • Files with what two file extensions are commonly known as tarballs??
    8·1 answer
  • Using underlining and italics at the same time is which of these? A. allowed but might be overkill B. always a good idea C. not
    15·2 answers
  • Suppose you're currently completing an examination online. When you're finished, you click on Reset Exam. Why would you do this?
    8·1 answer
  • Which federal agency enforces safety and health legislation and requires employers to be sure that adequate first-aid supplies a
    5·1 answer
  • A software update is also referred to as what?
    15·2 answers
  • Im boing exam help please In a category-based course grading system, teachers weigh a student's performance in all courses. all
    7·2 answers
  • How does a modem work​
    13·1 answer
  • Que papel tuvo la innovación en la propagación de la telefonía móvil?​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!