answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
givi [52]
2 years ago
14

The initial value for a number field on a record is 1. A user updated the value of the number field to 10. This action invokes a

workflow field update, which changes the value of the number field to 11. After the workflow field update, an update trigger fires.
a. Null
b. 11
c. 1
d. 10
Computers and Technology
1 answer:
erik [133]2 years ago
3 0

Answer: b. 11

Explanation:

//The  initial value is 1

//let call the value as x

x = 1

//then the user updated the value to 10

//so now x is 10

x = 10

// and update the workflow to 11

//so now the value of x is 11

x = 11

even if the programmer print x, so the output will be 11

You might be interested in
For his class project, Matt has to create an image in a color scheme that has shade or tint variations of the same hue. Which co
Alex

Answer:

B.Monochromatic

Explanation:

mono means one

5 0
2 years ago
Compare the encryption algorithms found in s-tools: idea, mdc, des, and 3des.
grin007 [14]
Are their answer chocies 

3 0
2 years ago
The Online Shopping system facilitates the customer to view the products, inquire about the product details, and product availab
jeyben [28]

Answer:

see explaination

Explanation:

We will consider the five Actors in the prearranged Online shopping software system:

Customer:

The scheme allows the customer to do below mention actions:

View goods and inquire about the niceties of products and their ease of use.

To create version to be able to purchase invention from the structure.

Browse crop through search category or shortest search alternative.

Place order for the necessary crop.

Make sum for the order(s) positioned.

Payment System:

Payment system allows client to pay using subsequent two methods:

Credit card.

PayPal.

Seller:

System allow seller to perform underneath actions:

Place the foodstuffs for selling under apposite product category.

Create account to happen to a member.

Administrator:

Following actions are perform by Admin:

Manage the goods posted in the system.

Modify existing manufactured goods categories or add novel categories for foodstuffs.

Site Manager:

System privileges Site director with the following role in the system:

View information on:

Orders Placed by customer

Products added by seller

Accounts created by users

check attachment

3 0
2 years ago
In a ____________________ attack, the attacker sends a large number of connection or information requests to disrupt a target fr
Blababa [14]

DDoS - Distributed Denial of Service

<u>Explanation:</u>

  • In DDoS attack, the attack comes from various system to a particular one by making some internet traffic.
  • This attack is initiated from various compromised devices, sometimes distributed globally through a botnet. It is different from other attacks  such as (DoS) Denial of Service attacks, in which it utilizes an unique Internet-connected device ( single network connection) to stream a target with the malicious traffic.
  • So in DDoS, multiple systems are involved in the attack and hence we can conclude that as the answer.
8 0
2 years ago
Technician A says that the excessive length of a heater hose is intended to protect the heater core from undue stress. Technicia
hammer [34]
It is both true that <span>Technician A says that the excessive length of a heater hose is intended to protect the heater core from undue stress. Technician B says that excessive wear adds to the length of a heater hose, and a replacement heater hose should be roughly three to four inches shorter than its predecessor.  So the asnwer is letter B.</span>
6 0
2 years ago
Other questions:
  • What is the term for a web site that uses encryption techniques to protect its data?
    12·1 answer
  • n the video, McWhorter says that “textspeak” might be a good thing for young people’s brains. Why does he think this?
    13·1 answer
  • Which statement about dialogues is NOT correct? Select one: A. Users should be able to control the direction of speed of dialogu
    5·1 answer
  • What data discovery process, whereby objects are categorized into predetermined groups, is used in text mining?
    9·1 answer
  • Your revenue is $22,000. Your Cost of Goods is 16,250. Your gross profit is _____________, fill in the blank,.
    14·1 answer
  • Given an alphabet, print all the alphabets up to and including the given alphabet.
    15·2 answers
  • The attack in which the attacker sends a forged packet with the same source IP address and destination IP address in which the v
    10·1 answer
  • The UML models operations by listing the operation name preceded by an access modifier. A(n) ________ indicates a public operati
    7·2 answers
  • 10. There is repeated code in these onevent blocks. Choose the correct code for the updateScreen() function which would be calle
    11·1 answer
  • Laura is the first person in her SDLC team to detect and predict security vulnerabilities in the software. In which phase is Lau
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!