The following Salesforce-Development MCQs have been compiled by our experts through research, in order to test your knowledge of the subject of Salesforce-Development. We encourage you to answer these multiple-choice questions to assess your proficiency.
Please continue by scrolling down.
A. Fields.
B. Phone numbers.
C. Phones.
D. Phone fields.
A. Yes.
B. No.
C. No IP is allowed.
D. Yes, but it is set by default to allow all IP addresses.
A. serverName/services/Soap/c/29.0/ID
B. serverName:port/Soap/services/c/29.0/ID
C. serverName:port/services/Soap/c/29.0/ID
D. serverName/Soap/services/c/29.0/ID
A. InvalidObjectSFault
B. InvalidSimpleObjectFault
C. InvalidObjectSimpleFault
D. InvalidSObjectFault
A. List of single and mass emails.
B. List of mass emails.
C. Single email only.
D. List of mass emails.
A. DescribeGlobalsResult object, which allows to retrieve an array of DescribeGlobalOrgObjectResult objects by calling sobjectlist.
B. DescribeGlobalResult object, which allows to retrieve an array of DescribeGlobalSObjectResult objects by calling sobjects.
C. DescribeGlobalResult object, which allows to retrieve an array of DescribeGlobalOrgObjectResult objects by calling sobjectlist.
A. Scale and precision.
B. Age and scale.
C. Size and time.
D. Scale and position.
A. All objects.
B. Only objects with the right calls.
C. Objects that have errors.
D. No objects.
A. Relationships between master and detail sectors.
B. Relationships between parent and child elements.
C. Relationships between master and slave drives.
D. Cascading deletes and sharing rules that are controlled by the parent.
A. SystemStamp
B. systemModstamp
C. SysModMap
D. SystemMod
A. Reveal sensitive information protected by many layers of authorization.
B. Query the networks information.
C. Query your organization’s information.
D. Query the systems information.
A. includes users, profiles, and roles.
B. approval processes and related objects.
C. content and libraries and their related objects.
D. view and vote statistics, article versions, and other related objects.
A. Writing metadata.
B. Storing binary files in Attachment, Document, and Scontrol records.
C. Compressing files.
D. Encrypting documents.
A. Obtain metadata about another system.
B. Replace your systems metadata.
C. Obtain metadata about your data.
D. Breach security across multiple systems.
A. Never.
B. Before setup.
C. During setup.
D. After setup.
A. sObject
B. sObjects
C. Client
D. Account
A. Currency, formula, number, percent, and roll-up summary
B. Number, percent, checkbox.
C. Currency, number, long text area.
D. Number, percent, day/time.
A. MALFORMED_ERROR
B. MALFORMED_12
C. idError
D. MALFORMED_ID
A. TOKEN
B. mypasswordTOKEN
C. mytokenPASSWORD.
D. PASSWORD
A. create(), delete(), describeLayout(), describeSObjects(), getDeleted(), getUpdated(),query(),retrieve(), search(), undelete(), update(), upsert()
B. open(), remove(), describeLayout(), describeSObjects(), getDeleted(), getUpdated(),merge(), retrieve(), search(), undelete(), update(), upsert()
C. create(), delete(), describeLayout(), describeSObjects(), getDeleted(), getUpdated(),merge(), retrieve(), search(), undelete(), update(), upsert()
D. create(), remove(), describeLayout(), describeSObjects(), getDeleted(), getUpdated(),merge(), retrieve(), search(), undelete(), update(), upsert()
A. SYSTEM_TIMEOUT
B. INVALID_SESSION_ID
C. SESSION_END
D. INVALID_SESSION
A. Session Ideas
B. Security Controls
C. Session Monitor
D. Session Controls
A. An element rule.
B. A relationship rule.
C. A system rule.
D. A sharing rule.
A. AutoRollback
B. Committed Automatically Versus Rollback on Error
C. AlwaysOn
D. SuperCommit
A. It invokes a process to breach security.
B. Nothing.
C. It is returned.
D. It is not returned.
A. Only when the array is processed with a matrix.
B. Only when the array is consolidated with a matrix.
C. Yes.
D. No.
A. https://login.salesforce.com/services/Soap/u/29.0
B. https://test.salesforce.com/services/Soap/u/29.0/12.1.0
C. https://login.salesforce.com/services/Soap/c/29.0
A. Not Possible to create Many to Many relationship in salesforce.com
B. Create a direct Many to Many relationship
C. Use a piece of code to relate both objects
D. Use a junction Object
A. date
B. base32
C. time
D. dateTime
A. A solution to the problem.
B. Nothing.
C. The row and column numbers where the problem occurred.
D. A problem itself.
A. When you are loading a large number of records.
B. When you are processing data up to one thousand records.
C. When you are updating small numbers of records at a time.
D. When you are using REST requests and prefer to use SOAP.
A. Custom objects must have unique names within your organization. The first letter is capitalized. Prefix "C__" is added.
B. Custom objects must have unique names within all organizations. The first letter is capitalized. Prefix "c_" is added.
C. Custom objects must have unique names within your organization. The first letter is capitalized. Suffix "__c" is added.
D. Custom objects must have unique names within all organizations. The first letter is capitalized. Suffix "_C" is added.
A. CreateID
B. CreatedById
C. OldID
D. NewID
A. REQUEST_LIMIT_EXCEEDED
B. EXCEEDED_ID_LIMIT
C. INVALID_OPERATION_WITH_EXPIRED_PASSWORD
D. INVALID_SESSION_ID
A. Yes.
B. Yes. It has to be larger.
C. No.
D. Yes, and it has to be significantly larger.
A. FieldCore information.
B. Date and time when this record was last modified.
C. SystemModMap information.
D. The time the system last failed.
A. Undefined fault errors.
B. Just API errors.
C. Only SOAP errors.
D. API-returned SOAP fault messages and general API errors.
A. Triple
B. Alphabetical.
C. Double
D. Single
A. A number of picks.
B. Lists that have been picked.
C. A number of picked numbers.
D. A set of enumerated values from which one can be selected.
A. Common__c
B. c_common
C. common_C
D. c__common
A. In divert() and update() calls.
B. In create() and update() calls.
C. In delet() and update() calls.
D. In distract() and update() calls.
A. Operations running in the foreground.
B. Operations invoked at compile time.
C. Specific operations that your client applications can invoke at runtime.
D. Operations that run in the background.
A. The system has encountered a breach.
B. The system has encountered an internal error.
C. The system has encountered a hardware issue.
D. The system has encountered data loss.
A. The file can be deleted, but not changed.
B. Users can only view objects of this type.
C. Only guest users can read the file.
D. Only the system can read the file.
A. Service Requests and Responses, Asynchronous, Committed Automatically Versus Rollback on Error
B. Service Requests and Responses, Asynchronous, Rollback on Error
C. Some of calls are Asynchronous, Rollback on Error
D. Service Requests and Responses, Synchronous, Committed Automatically Versus Rollback on Error
A. A globally synonymous file that identifies a process.
B. A globally unique field that identifies a record.
C. A globally unique system that identifies a file.
D. A globally unique process that identifies certain data.
A. They are asynchronous.
B. They are synchronous.
C. They perform the same function.
D. They are the same size.
A. Carthaginian.
B. Numerical.
C. Carpathian.
D. Boolean.
A. A field defined by its size.
B. A field defined by another field.
C. A field defined by a formula.
D. A field defined by its metrics.
A. True, or false.
B. False, or yes.
C. 2, or 4.
D. True, or true.