
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question
thumb_up100%
Professor please do not reject it under complex . I want answer and if you have not the anser please let someone other help me. if this behaviour is repeated agan it will be reported to the administration.
![I am getting Error While Performing Database.Upsert[] result in Salesforce
and Want to get record Ids of Failure records.
I am getting Null When Using the Below Code.
Database.UpsertResult[] srList = Database.upsert(listOfAccounts ToUpdate, false);
mapOfAccounts.putAll(listOfAccountsToUpdate);
System.debug('map log again' + mapOfAccounts);
// Iterate through each returned result
for (Database.UpsertResult sr : srList) {
System.debug('sr.getID()'+sr.getld());
if (sr.isSuccess()) {
listOfErrorLogUpsert.add(new Error Log_c(Parent_Record Idc = sr.getld(),Parent_Record Name_c = mapOfAccounts.ContainsKey(sr.getld()) ? mapOfAccounts.get(sr.getld()).Name: "));
// Operation was successful, so get the ID and insert contact on that id's
for(Integer j =1; j<=listOfContacts.size(); j++){
listOfContactTolnsert.add(new Contact(FirstName = 'Sammer' +j, LastName = 'Test'+ j, Accountld = sr.getld()));
}
System.debug('Succesfully updated the Account' + sr.getld());
else {
// Operation failed, so get all errors
for(Database.Error err : sr.getErrors()) {
listOfErrorLogUpsert.add(new Error_Log_c(Error_Detailsc = err.getMessage(),Parent Record_ld_c = sr.getld()));
System.debug('The following error has occurred.');
System.debug(err.getStatusCode() + ': ' + err.getMessage());
System.debug('Account fields that affected this error: '+ err.getFields());
Please Update the Below Code So that I can get the Record Ids of Failure Records.
APEX Salesforce](https://content.bartleby.com/qna-images/question/4540eaec-5255-46b1-ab5b-d6ad29226e84/f400ae3f-31c5-42f2-88e7-e3db04e3a591/cvxj167_thumbnail.jpeg)
Transcribed Image Text:I am getting Error While Performing Database.Upsert[] result in Salesforce
and Want to get record Ids of Failure records.
I am getting Null When Using the Below Code.
Database.UpsertResult[] srList = Database.upsert(listOfAccounts ToUpdate, false);
mapOfAccounts.putAll(listOfAccountsToUpdate);
System.debug('map log again' + mapOfAccounts);
// Iterate through each returned result
for (Database.UpsertResult sr : srList) {
System.debug('sr.getID()'+sr.getld());
if (sr.isSuccess()) {
listOfErrorLogUpsert.add(new Error Log_c(Parent_Record Idc = sr.getld(),Parent_Record Name_c = mapOfAccounts.ContainsKey(sr.getld()) ? mapOfAccounts.get(sr.getld()).Name: "));
// Operation was successful, so get the ID and insert contact on that id's
for(Integer j =1; j<=listOfContacts.size(); j++){
listOfContactTolnsert.add(new Contact(FirstName = 'Sammer' +j, LastName = 'Test'+ j, Accountld = sr.getld()));
}
System.debug('Succesfully updated the Account' + sr.getld());
else {
// Operation failed, so get all errors
for(Database.Error err : sr.getErrors()) {
listOfErrorLogUpsert.add(new Error_Log_c(Error_Detailsc = err.getMessage(),Parent Record_ld_c = sr.getld()));
System.debug('The following error has occurred.');
System.debug(err.getStatusCode() + ': ' + err.getMessage());
System.debug('Account fields that affected this error: '+ err.getFields());
Please Update the Below Code So that I can get the Record Ids of Failure Records.
APEX Salesforce
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps with 1 images

Knowledge Booster
Similar questions
- If we live in a free and open society, what purpose do barriers serve? Please include at least two instances of such restrictions in your response.arrow_forwardYou have successfully implemented the information systems in your company. Your next plan is to implement proper security measures to secure the information systems and move forward with the new implementation of the systems.a) You realized that your colleagues are reluctant to change or move forward with the new implementation of the systems. Discuss FIVE (5) challenges that leads to the situation of reluctant to change among your colleagues in the company. In addition, explain the examples for each of the challenges that you have mentioned before.arrow_forwardA security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/arrow_forward
- 4. Do you think it was ethical for authorities to use one of the high-ranking members to trap other gang members? Why or why not?arrow_forwardProvided that your organization has an Email and Internet use policy covering “Code of Conduct” on using computer assets during working hours. What should you do in the following situations if you are an IT security professional in the company: Your colleague Linda received several emails from another colleague Greg. In the emails, Greg used strong language to abuse and criticize her work. Those emails were broadcasted to the whole team and the managers, but no one respond to it. Your colleague Jack maintain his private blog online. Occasionally, he will post comments on his work and the company. You find that his blog has a link to a website “YourCompanySucks.” He explained to you that he maintains his blog during non-working hours and he is not the owner or author of that website.arrow_forwardIn this discussion post, you will analyze difficult and often complex ethical decisions you may encounter as a security professional. To start, please watch Alex Stamos’s An Open Letter The White Hat's Dilemma video. After watching the video, respond to the following prompt in your post: How would you respond to the questions Alex asks the crowd? Why?arrow_forward
- A keylogger was used to get the password of a victim's Facebook account, and the hacker tried to extort money from the victim. The victim is informed that the contents of his emails will be abused unless he pays the money. What was the offence that was committed in violation of RA 10175? What are the ramifications? Justify your answer.arrow_forwardCan you please help me find an applicable law/s for these three commandments, the specific violation identified, and a Remark (including specific penalties). Below is an example. The law/s should be from the Philippines Here is the table I should fill out: Computer Ethics commandment Applicable Laws Specific Violation Identified Remark 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness 6. Thou shalt not copy or use proprietary software for which you have not paid (without permission).arrow_forwardAnalyze the following scenario: An employee using company resources sends email that is later retrieved when the employee sues the company. Is there a reasonable expectation of privacy? Is it different if the computer used was purchased by the employee but the email was sent during work hours? What additional facts or changes in your assumptions would alter your analysis? Ethically, what are the arguments, pro and con, for an employer monitoring electronic communication?arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY