Answer:
The main functionality verified by this test method command is user sharing record.
Explanation:
Generally, every apex code runs in system mode.
Apex is strong object-oriented programming language that allows the developers to execute flow and transaction control.
Using syntax which look like java and acts as databases, Apex allows the developer to add any type of business logics to an event which can include button, clicks records or visual pages.
Apex code can be initiated by web service request.
The permissions and record sharing of current user are not consider by apex codes.
Now the system method runAs() will allow you to take or write a test method which will basically change the user context to an existing or an new user, so that the record sharing will take place.
runAs() command will not change or anything done with user permissions or permission levels, it will only record sharing of the user.
When you use runAs() command the original and true context will run after the test method is once completed under the command of runAs().
The runAs() has no concern with the user license.
If there is no or expired your personal or organization license you can just make a new user with this runAS() command.
In using this command we have to make a private class by the name of this test and then our further code to make a user , afterwards which we will the true and original code of ours which we want to run.
There are many other uses of runAs() like
Mixed DML operations in test by opening the DML operations.
We can also use it as a version which will take a package as a version argument. This will cause the code a specific version.
runAs(System.Version) is the command used for this.
Answer:
Deny
Explanation:
Under the New Technology System, the Deny permission is applied when the administrator wants to overrule the permission given to members of a group. The Allow and Deny options help in regulating access to the components of the system. Only authorized groups are granted access to the files.
Most times, the Deny permission is considered before the Allow permission. If the user is denied access to some files and granted access to some, the deny permission is most times considered first.
Here a 5 step recovery plan, I have been in IT for 8 years
1. Create a disaster recovery team.
The team will be responsible for developing, implementing, and maintaining the DRP. A DRP should identify the team members, define each member’s responsibilities, and provide their contact information. The DRP should also identify who should be contacted in the event of a disaster or emergency. All employees should be informed of and understand the DRP and their responsibility if a disaster occurs.
2. Identify and assess disaster risks.
Your disaster recovery team should identify and assess the risks to your organization. This step should include items related to natural disasters, man-made emergencies, and technology related incidents. This will assist the team in identifying the recovery strategies and resources required to recover from disasters within a predetermined and acceptable timeframe.
3. Determine critical applications, documents, and resources.
The organization must evaluate its business processes to determine which are critical to the operations of the organization. The plan should focus on short-term survivability, such as generating cash flows and revenues, rather than on a long term solution of restoring the organization’s full functioning capacity. However, the organization must recognize that there are some processes that should not be delayed if possible. One example of a critical process is the processing of payroll.
4. Specify backup and off-site storage procedures.
These procedures should identify what to back up, by whom, how to perform the backup, location of backup and how frequently backups should occur. All critical applications, equipment, and documents should be backed up. Documents that you should consider backing up are the latest financial statements, tax returns, a current list of employees and their contact information, inventory records, customer and vendor listings. Critical supplies required for daily operations, such as checks and purchase orders, as well as a copy of the DRP, should be stored at an off-site location.
5. Test and maintain the DRP.
Disaster recovery planning is a continual process as risks of disasters and emergencies are always changing. It is recommended that the organization routinely test the DRP to evaluate the procedures documented in the plan for effectiveness and appropriateness. The recovery team should regularly update the DRP to accommodate for changes in business processes, technology, and evolving disaster risks.
summary :an organization must develop a recovery team to create a disaster recovery plan that includes identifying and assessing disaster risks, determining critical applications, and specifying backup procedures. Other procedures may be included in the plan based on the organization. The recovery team and organization must then implement the DRP and follow through on the plan procedures. The DRP should be continually tested and maintained to consistently prepare the organization for evolving disasters and emergencies.
<em>answer</em><em>=</em><em> </em><em>safari</em><em>,</em><em> </em><em>ms</em><em>-</em><em>word</em><em>,</em><em> </em><em>moviemaker</em><em>,</em><em> </em><em>ms</em><em>-</em><em>pain</em><em>t</em><em>,</em><em> </em><em>firefox</em><em>,</em><em>etc</em><em>.</em><em>.</em><em>.</em>