Application - A collection of files and data that deliver a service and manage business
processes
Application Scope - Protects applications by identifying and restricting access to
application files and data
Private
...
Application - A collection of files and data that deliver a service and manage business
processes
Application Scope - Protects applications by identifying and restricting access to
application files and data
Private - By default, all custom applications have a ________ scope that uniquely
identifies them and their associated artifact with a namespace identifier
Global Scope - Special application scope that identifies applications developed prior to
application scoping or applications intended to be accessible to all other global
applications
Global Scope - ________ applications can bypass scope protections, allowing them to:
-Read records
-Run API requests
-Create Configuration records
False - True//False: Assume an application scope, sn_my_app, exists. Scripts from
other application scopes can never delete records from tables in the sn_my_app scope.
All application scope, This application scope - The application Access settings for a
table are:
True - True//False: An application owns its tables and determine whether other
application can access resources from them
DO NOT - Developers DO/DO NOT create application file records directly from the
Application File table
contextual - The platform is a ____________ development environment that displays
the currently selected application, identifies the scope of every application artifact, and
prevent any changes that violate the access settings for an applicationApplication Access Settings - ____________________ is similar to ACLs in that it allow
you to restrict access to certain resources, but instead of restricting tables and records
from users - they restrict application resources from other applications
Runtime Access tracking - -Allows administrators to manage script access to application
resources be creating a list of script operations and targets that the system authorizes
to run
-Options: None, Tracking, Enforcing
Cross-scope privilege record - -Runtime access tracking uses
__________________________ to determine which script operations and targets the
system allows to run
-System creates this when: Runtime Tracking is set to "Tracking" or "Enforcing"
Script API, Web Services - Runtime access points
Application List - Allows application developers to view and select applications
Application Picker - Allows application developers to view and select the application
where their changes apply
False - True//False: Removing a field from a form using the Form Designer deletes the
field from the database table.
Application Creation options - -Start from scratch
-Create a custom application
-Start from a template
-Start from an existing service
-Start from global
Start from scratch - -Create an empty application
-Good for application that only use one configuration record, such as workflow or scriptbased application
Create a custom application - -Create an application with UI and data elements
-Good for applications that require UI elements and tables
[Show More]