answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pashok25 [27]
2 years ago
5

An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE

. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed
Computers and Technology
1 answer:
Pani-rosa [81]2 years ago
6 0

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

You might be interested in
Which statement best describes the Tell Me feature in PowerPoint 2016?
Triss [41]

Answer:

It is definitely not used for locating the options in the menu. its the new feature available which is available from the Tell Me text box which you can find immediately right of the very last cmd tab which is above the ribbon. And as you add any help topic to this into textbox, the excel shows all Excel command list , command which are related to the help topic in a drop down.

Explanation:

The answer is self explanatory.

8 0
2 years ago
1. A pure aggregator is best defined as a blog that
miss Akunina [59]
A pure aggregator is best defined as a blog that aggregates blog content from other sources.

An Aggregator blog or website don't write its own content. It aggregates information or content from third-party websites. There are different types of aggregator websites such as a poll aggregator, a review aggregator, and a search aggregator.
5 0
2 years ago
Adele’s mother owns a Daycare and she wants to learn all about this business, to help her mom and own it one day. Which CTSO sho
Gennadij [26K]

Answer:

She should join the Future Business Leaders of America–Phi Beta Lambda

Explanation:

CTSOs are Career and technical student organizations. These organizations are vocational and extracurricular groups based primarily in high schools, colleges and career technological centres, for students in Career and Technical Education. They are important parts of the high school and college programs.

The Future Business Leaders of America–Phi Beta Lambda prepares students to become community-minded business leaders. It provides opportunities to learn career skills and gain leadership experience.

Therefore Adele should pick this CTSO

7 0
2 years ago
Jannette has been experiencing slow performance on her computer. Today she received an error message saying that an update to he
Marysya12 [62]

Answer: ur never going to get your answer!!!!

ExpElanation: hahahahaha ( pls 5 star pls pls. Shhhh)

3 0
2 years ago
Read 2 more answers
The it department is reporting that a company web server is receiving an abnormally high number of web page requests from differ
Talja [164]
<span>In the scenario in which the IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously the DDoS security attack is occurring.
</span>DDos stands for Distributed Denial of Service<span> . This </span><span>attack is an attempt to make an online service unavailable by overwhelming it with traffic from multiple sources.</span>
8 0
2 years ago
Other questions:
  • Why would Network Systems employees be employed by the government?
    12·2 answers
  • Have you ever tried to teach a class full of restless, active sixth-graders? I have. I taught sixth-grade students for 12 years.
    15·1 answer
  • Show how to define a view tot_credits (year, num_credits), giving the total number of credits taken by students in each year
    8·1 answer
  • A ____ resembles a circle of computers that communicate with each other.
    14·1 answer
  • Mrs. Johnson is here today to receive an intercostal nerve block to mitigate the debilitating pain of her malignancy. Her cancer
    13·1 answer
  • In defining security implemention, what are the roles of the following committees. 1) gateway committee 2) project committee 3)
    8·1 answer
  • You are consulting for a trucking company that does a large amount ofbusiness shipping packages between New York and Boston. The
    5·1 answer
  • Write a program that prints the U.S. presidential election years from 1792 to present day, knowing that such elections occur eve
    9·1 answer
  • We Deliver trains its truck loaders how to set the packages in the delivery vehicles, so that when delivery drivers are pulling
    15·1 answer
  • What does the binary odometer show about representing large numbers​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!