1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Goryan [66]
3 years ago
8

Which two approaches optimize test maintenance and support future declarative configuration changes? Choose 2 answers Create a m

ethod that performs a callout for valid records, then call this method within test methods. Create a method that creates valid records, then call this method within test methods. Create a method that loads valid Account records from a static resource, then call this method within test methods. Create a method that queries for valid records, then call this method within test methods.
Computers and Technology
1 answer:
patriot [66]3 years ago
3 0

Answer:

B and C

Explanation:

B. Create a method that load valid account records from a static resource, then call this method within test method

C. Create a method that creates valid records, then call this method within test methods

You might be interested in
Does anyone know who this man issss?
devlian [24]

Kaeya Should be the correct answer

3 0
3 years ago
What technology gets its name from the notion that it ignores the traditional A, B, and C class designations for IP addresses?
goblinko [34]

Answer:

Classless Inter-Domain Routing

Explanation:

Classless Inter-Domain Routing (CIDR), pronounced “cider” or “sidder,” gets its name from the notion that it ignores the traditional A, B, and C class designations for IPv4 addresses and sets the network-host ID boundary wherever it wants to, in a way that simplifies routing across the resulting IP address spaces.

3 0
3 years ago
In order, the three-step process of using a file in a C++ program involves
Anna71 [15]

Answer:

c. open the file, read/write/save data, close the file

Explanation:

8 0
3 years ago
Internet Security: How can you work securely on the internet? What actions should be avoided and what are the pitfalls?
Cerrena [4.2K]

Answer:First of all, to work safely at the internet you should avoid any not secure page, and if you can’t do that, avoid entering stuff such as credit cards or passwords on this sites. Now, to work safely it’s recomendable to have a VPN(virtual private network), that hides your IP direction.

Explanation:

8 0
3 years ago
List three considerations when you choose memory.
liq [111]
1)How many memory cards (how many can you computer hold)
2)Company (some companies run better than others)
3)Amount of memory (xGb)
8 0
3 years ago
Other questions:
  • The order in which statements are executed during a program run. Answer 1 The first part of a compound statement begins with a k
    12·1 answer
  • A collection of facts can be copyrighted, but only if the collection is ____ in a way that causes the resulting work to rise to
    14·1 answer
  • Let's play Silly Sentences!
    10·1 answer
  • Isabel and Jared work for the same company but in different departments. Their workstations are both part of the company's compu
    5·2 answers
  • The person responsible for setting goals and schedules, monitoring work, motivating the team, and reporting progress to managers
    7·1 answer
  • Karen is designing a website for her uncle's landscaping business. She wants to ensure that it's engaging and provides a lot of
    5·1 answer
  • Samuel was hired to create a program that asks the user questions and, based on the answers, recommend a book to read. What kind
    8·1 answer
  • Only about 10 percent of the world’s population uses the internet.
    6·1 answer
  • Tascake Gets Free Brainliest Because he didnt get it<br><br> Tascake Heres Brainliest
    6·2 answers
  • Brook is designing a database that customers can use to find their ideal vacation spot. If they only want to see beach vacations
    15·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!