1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Whitepunk [10]
3 years ago
13

A developer has been asked to create code that will meet the following requirements: Receives input of: Map, List Performs a pot

entially long-running callout to an outside web service Provides a way to confirm that the process executed successfully Which asynchronous feature should be used?A. @future (callout=true)
B. Database.AllowsCallouts interface
C. Schedulable interface
D. Queueable interface
Computers and Technology
1 answer:
Sophie [7]3 years ago
4 0

Answer:

The answer is "Option D'

Explanation:

Queue-able framework is used to control the Apex codes, it also allows users to connect and track workers on the line. It was an improved way to manage the asynchronous apex code in contrast to possible approaches, that use this framework, and other choices were incorrect, that can be described as follows:

  • In option A, It's not correct because, It can't control apex code.
  • In option B, The database can't use to call outs interface, that's why it is wrong.
  • In option C, It contains methods, that's why it is wrong.
You might be interested in
failed logins or instances of denial of access to restricted files may be indicators of compromise. suggest where records of suc
algol [13]

As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

<h3>What is indicators?</h3>

System administrators and information security (InfoSec) experts can identify malicious activity such as intrusion attempts using these artifacts. IOCs are used by security researchers to more thoroughly examine the methods and behaviour of a certain malware.

IOCs also offer useful threat intelligence that can be disseminated around the community to help organizations develop their incident response and remediation plans.

Some of these artifacts can be seen on the system's event logs, time-stamped entries, apps, and services. Various tools that monitor IOCs are also used by infosec experts and IT/system administrators to help mitigate, if not stop, breaches or assaults.

Therefore, As forensic evidence of suspected intrusions on a host system or network, indicators of compromise (IOCs) are used.

To learn more about indicators, refer to the link:

brainly.com/question/28093573

#SPJ1

4 0
1 year ago
Which vpn protocol is a poor choice for high-performance networks with many hosts due to vulnerabilities in ms-chap?
blsea [12.9K]
PPTP is what uses chap-secrets. So I imagine that's it
3 0
3 years ago
What is the Matlab command to create a vector of the even whole numbers between 29 and 73?
Nana76 [90]

Answer:

x = 29:73;

x_even = x(2:2:end);

Explanation:

In order to create a vector in Matlab you can use colon notation:

x = j:k

where <em>j</em> is 29 and <em>k</em> is 73 in your case:

x = 29:73

Then you can extract the even numbers by extracting the numbers with even index (2,4,6,etc.) of your vector:

x_even = x(2:2:end);

In the line of code above, we define <em>x_even</em> as all the elements of x with even index from index 2 till the end index of your vector, and an increment of 2 in the index: 2,4,6,etc.

If you want the odd numbers, just use the odd indices of your vector:

x_odd = x(1:2:end);

where <em>x_odd</em> contains all the elements of <em>x</em> with odd index from index 1 till the end index, and an increment of 2: 1,3,5,etc.

6 0
3 years ago
What are some things all boomers say.
lilavasa [31]

Answer: the last one ;)

Explanation:

6 0
3 years ago
Read 2 more answers
Helppppppppppppppppppppppppppppppppp
Natalija [7]

Answer:

answer below

Explanation:

hope this helps

6 0
2 years ago
Read 2 more answers
Other questions:
  • The first step in database design is defining a _____, which defines how data is created, represented, organized, and maintained
    13·1 answer
  • The ____ search feature allows you to look for words with extensions such as “ing,”“ed,” and so forth. .
    12·1 answer
  • A technician has just finished installing a secondary OS on a workstation. After rebooting the computer, the technician receives
    13·1 answer
  • An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored
    12·1 answer
  • Whoever answers int the next 15 minutes will get brainliest. To get brainliest, it also has to be the correct answer. 8 points r
    11·2 answers
  • . How do you find and remove files whose names contain embedded spaces? What would the Linux command(s) be?
    12·1 answer
  • What does the revolver do?
    10·1 answer
  • Please help me convert the numbers into binary
    14·1 answer
  • Write a Python statement that displays the value referenced by the number variable formatted as1,234,567.5
    9·1 answer
  • Please help!!!
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!