Which one of the following is NOT a debugging strategy for client-side scripts?
Which one of the following is NOT a debugging strategy for client-side scripts?A . g_form.addInfoMessage()B . Field WatcherC . jslog()D . gs.log()View AnswerAnswer: D Explanation: https://developer.servicenow.com/dev.do#!/learn/learning-plans/rome/new_to_servicenow/app_store_learnv2_scripting_rome_debugging_client_scripts The following are debugging strategies for client-sidescripts, which run in the web browser and manipulate the user interface: g_form.addInfoMessage(). This is a client-side API...
There is a basic strategy when creating a Utils Script Include. Identify the step that does not belong.
There is a basic strategy when creating a Utils Script Include. Identify the step that does not belong.A . Identify the tableB . Script the function(s)C . Create a classD . Create a prototype object from the new classView AnswerAnswer: A Explanation: The step that does not belong when creating...
Which of the following GuideRecord methods run a query against a database table?
Which of the following GuideRecord methods run a query against a database table? Choose 3 answersA . -query( )B . runQuery()C . query()D . -get()E . get(View AnswerAnswer: A, C, E Explanation: https://docs.servicenow.com/bundle/tokyo-application-development/page/app-store/dev_portal/API_reference/GlideQuery/concept/GlideQueryGlobalAPI.html#GlideQueryAPI https://docs.servicenow.com/bundle/tokyo-application-development/page/app-store/dev_portal/API_reference/glideRecordScoped/concept/c_GlideRecordScopedAPI.html
When evaluating Access Controls, ServiceNow searches and evaluates:
When evaluating Access Controls, ServiceNow searches and evaluates:A . Only for matches on the current tableB . Only for matches on the current fieldC . From the most specific match to the most generic matchD . From the most generic match to the most specific matchView AnswerAnswer: C Explanation: When...
Which one of the following is true for a Script Include with a Protection Policy value of Protected?
Which one of the following is true for a Script Include with a Protection Policy value of Protected?A . Any user with the protected_edit role can see and edit the Script IncludeB . The Protection policy option can only be enabled by a user with the admin roleC . The...
What is the REST API Explorer used to do?
What is the REST API Explorer used to do?A . Practice using REST to interact with public data providersB . Find resources on the web for learning about RESTC . Convert SOAP Message functions to REST methodsD . Create sample code for sending REST requests to ServiceNowView AnswerAnswer: D Explanation:...
In an Email Notification, which one of the following is NOT true for the Weight field?
In an Email Notification, which one of the following is NOT true for the Weight field?A . Only Notifications with the highest weight for the same record and recipients are sentB . A Weight value of zero means that no email should be sentC . The Weight value defaults to...
The source control operation used to store local changes on an instance for later application is called a(n) <blank>.
The source control operation used to store local changes on an instance for later application is called a(n) <blank>.A . BranchB . TagC . StashD . Update setView AnswerAnswer: C Explanation: The source control operation used to store local changes on an instance for later application is called a stash....
Which one of the following is NOT required to link a ServiceNow application to a Git repository?
Which one of the following is NOT required to link a ServiceNow application to a Git repository?A . PasswordB . URLC . User nameD . Application nameView AnswerAnswer: D Explanation: The application name is not required to link a ServiceNow application to a Git repository. You only need to provide...
Which of the following statements does NOT apply when extending an existing table?
Which of the following statements does NOT apply when extending an existing table?A . The parent table’s Access Controls are evaluated when determining access to the new table’s records and fieldsB . The new table inherits the functionality built into the parent tableC . The new table inherits all of...