answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
2 years ago
5

An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE

. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed
Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
6 0

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

You might be interested in
Splunk uses ________ to categorize the type of data being indexed..
timama [110]
<span>Splunk is the system process that handles indexing, searching, forwarding and the web interface for Splunk Enterprise.</span>
Splunk uses sourcetypes to categorize the type of data being indexed.
Splunk supports the Common Information Model (CIM). 
7 0
2 years ago
Read 2 more answers
9. Which of the following are true for all regular languages and all homomorphisms? (a) h (L1 ∪ L2)= h (L1) ∩ h (L2). (b) h (L1
mixer [17]

Answer:

h (L1 ∪ L2)= h (L1) ∩ h (L2).

This is true.

There will be w ∈  (L1 ∪ L2) for any s ∈ h (L1 ∪ L2) in such a way that s=h(w)

we can assume that w ∈ L1

So In this case h(w) ∈ L (S1). Hence s ∈ L(S1)

for any s ∈ h (L1) U h(L2)

We can assume that s ∈ L(S1)

There exists w ∈ L1 such that s= h(w)

In this case it is w ∈ L1 U L2 as well.

Hence , s ∈ h (L1 U L2)

Explanation

consider  = 0,1 and  = a,b and h(0) = a , h(1) = ab

(a) Consider L1 = 10,01 and L2 = 00,11

   Now L1 ∪ L2 = 00,01,10,11

   h (L1 ∪ L2) = h(00) , h(01) , h(10) , h(11) = h(0)h(0) , h(0)h(1) , h(1)h(0) , h(1)h(1)

  = aa, aab , aba , abab

Hence h (L1 ∪ L2) = aa, aab , aba , abab .

Here h (L1) = h(10) , h(01) = h(1)h(0) , h(0)h(1) = aba , aab

Hence h (L1) = aba , aab .

Here h (L2) = h(00) , h(11) = h(0)h(0), h(1)h(1) = aa, abab

Hence h(L2) = aa, abab.

Finally Hence , h (L1 ∪ L2)= h (L1) ∩ h (L2).

5 0
2 years ago
python Write a function that computes a future investment value at a given interest rate for a specified number of years. The fu
Svetlanka [38]

Answer:

def future_investment_value(investment, monthly_interest_rate, years):

  print("Years\tFuture Value")

  print("- - - - - - - - - - -")

  for i in range(1, years+1):

      future_value = investment * ((1 + monthly_interest_rate) ** (12 * i))

      print(i, "\t\t", format(future_value, ".2f"))

investment = float(input("Enter the invesment amount: "))

interest = float(input("Enter the annual interest rate: "))

year = int(input("Enter the year: "))

future_investment_value(investment, interest/1200, year)

Explanation:

Inside the function:

- In the for loop that iterates through the years, calculate the future value using the formula and print the results

Then:

- Ask the user for the investment, annual interest rate, and year

- Call the function with the given inputs

4 0
2 years ago
__________ is the current federal information processing the standard that specifies a cryptographic algorithm used within the U
Free_Kalibri [48]

Answer:

FIPS 140-2 es el acrónimo de Federal Information Processing Standard (estándares federales de procesamiento de la información), publicación 140-2, es un estándar de seguridad de ordenadores del gobierno de los Estados Unidos para la acreditación de módulos criptográficos. ... El Instituto Nacional de Estándares y Tecnología (NIST)

Explanation:

8 0
2 years ago
What does the following function return? void index_of_smallest(const double all, int startindex, int numberOfSlots); A. a doubl
Flauer [41]

Answer:

nothing

Explanation:

Because the return type of the function is void. void means does not return any thing.

The syntax of the function:

type name( argument_1, argument_2,......)

{

  statement;

}

in the declaration the type define the return type of the function.

it can be int, float, double, char, void etc.

For example:

int count( int index);

the return type of above function is int. So, it return integer.

similarly,

void count(int index);

it return type is void. So, it does not return any thing.

7 0
2 years ago
Other questions:
  • Icon view, list view, and details view are all common views provided by which kind of program?
    6·2 answers
  • If a street has a central lane bordered by solid yellow and broken yellow lines, you ________________.
    6·1 answer
  • Tina reported a safety hazard at her workplace to OSHA. Representatives from OSHA
    5·1 answer
  • "Suppose there is a class Alarm. Alarm has two class variables, code which contains a String value representing the code that de
    10·1 answer
  • A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
    6·1 answer
  • Use the image below to answer this question.
    14·1 answer
  • Assume there is a class AirConditioner that supports the following behaviors: turning the air conditioner on and off. The follow
    7·1 answer
  • Question 1 :Which type of unshielded twisted pair (UTP) cable is commonly used for 1000BASE-T Ethernet networks and is often mad
    8·1 answer
  • 63:47 One side in a Transmission Control Protocol (TCP) connection has not been able to properly recover from a series of malfor
    15·1 answer
  • What is the value of the variable result after these lines of code are executed?
    5·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!