1. How to find the Apex current running context?
In Salesforce Apex, getQuiddity() returns the Quiddity value of the current Request object.
2. Salesforce Lightning Web Component Event Types
- Standard Events
- Custom Events
Salesforce Lightning Web Components dispatch standard DOM events. Example: click, mouseover, mouseout, etc.
CustomEvent interface should be used for creating Custom Events in the Salesforce Lightning Web Component development.
3. How to open records in a tab or as sub tab using Lighting Web Component in a Console Application?
import { EnclosingTabId, openSubtab, openTab } from ‘lightning/platformWorkspaceApi’ can be used to open records in a tab or as sub tab using Lighting Web Component in a Console Application.
4. Guest User Sharing Rule Access Report
Salesforce Guest User Sharing Rule Access Report is used to review and assess the standard and custom objects shared with guest users via guest user sharing rules. We can also adjust/modify the access levels to avoid the unintended sharing of personal data with the guest users.
5. Refresh page without page reload in Salesforce
RefreshEvent from the “lightning/refresh” module in Salesforce Lightning Web Component can be used to refresh the page without browser reload.
6. Delay in Queueable Apex
Option 1:
From Setup, in the Quick Find box, enter Apex Settings, and then enter a value (1–600 seconds) for Default minimum enqueue delay (in seconds) for queueable jobs that do not have a delay parameter.
Option 2:
Use delay parameter in System.enqueueJob() method.
Syntax:
System.enqueueJob(queueable, delay)
delay (0–10 minutes). The delay is ignored during Apex testing.
Using the System.enqueueJob(queueable, delay) method ignores any org-wide enqueue delay setting.
7. Difference between Data Lake and Datawarehouse.
Data Lake
A data lake is a vast pool of raw data, the purpose for which is not yet defined.
Data Warehouse
A data warehouse is a repository for structured, filtered data that has already been processed for a specific purpose.
8. How to Pause and Resume Scheduled Jobs by Using Apex
pauseJobByName(), pauseJobById(), resumeJobByName(), and resumeJobById() System methods can be used to Pause and Resume Scheduled Jobs by Using Apex.
9. Will Roll-Up Summary field cause Parent record update when the child record is updated?
Yes. If the field used in the Roll-Up Summary is changed in the child record, it will update the parent record. If other fields are updated on the child record, then the parent record will not be updated.Change in the child record will update the parent record only when the fields used in the Roll-Up field are updated.
Reference:
If the record contains a roll-up summary field or is part of a cross-object workflow, performs calculations and updates the roll-up summary field in the parent record. Parent record goes through a save procedure.
10. Issue JSON Web Token (JWT)-based access tokens in Connected App
To define the amount of time before the JWT-based access tokens expire, select a value for Token Timeout. The timeout for a JWT-based access token is fixed and doesn’t change based on when the token was last active.
11. Authentication vs. Authorization
Authentication confirms an entity’s identity.
Authorization determines the permissible actions and resource accesses that the authenticated identity is allowed to perform, defining the scope and limitations of delegated activity.
12. Id.getSObjectType()
Returns the Object of the record id passed.
Example:
Id accountId = '001Hn00001yqvjT';
System.debug(
accountId.getSObjectType()
); //Account
13. Different Types of APIs
REST API
Uses HTTP and HTTPs.
Used for general-purpose web applications.
SOAP API
Uses WSDL.
Used in secure, enterprise-grade systems.
GraphQL
Query Language which provides a single endpoint for querying data.
Used for dynamic data queries and front-end flexibility.
gRPC
Google Rempote Procedur Calls framework. Uses Protocol Buffers for data serialization.
Microservices & real-time communication.
WebSockets
Uses a single long-live connection.
Live, interactive applications.
Used by applications like Chat.
Webhooks
Event-driven callbacks that notify external systems when specific events occurs.
MQTT
Message Queueing Telemetry Transport.
Uses publish-subscribe model for asynchronous communication.
Used for IoT and connected devices.
AMQP
Advanced Message Queuing Protocol.
Ensures reliable and scalable message queuing.
Used for message brokers like RabbitMQ.
SSE
Server-Sent Events.
A simple HTTP-based technology that allows servers to push real-time updates to clients without continuous polling.
EDI
Electronic Data Interchange.
Application Programming Interfaces (APIs) provide system functions in real time, which can be accessed and used by other applications. But, Electronic Data Interchange (EDI) automates the exchange of documents between organizations. Examples of EDI include purchase orders, billing invoices, and shipping notices.
14. How to instantiate LWC dynamically?
lightning__dynamicComponent can be used.
15. Data Cloud Governance
Private Connect:
For completely isolated data that never traverses the public internet, Private Connect is a useful solution.
Customer Managed Keys:
Platform Encryption for Data Cloud offers Customer Managed Keys, empowering administrators with enhanced data security through the management of their own encryption keys for data at rest. This feature provides greater control over the protection of stored data.
Data Spaces:
Data Spaces enable the separation of data, metadata, and processes according to brand, business unit (BU), and region. This allows each business unit to retain control over its specific data while operating within a single Data Cloud instance.
AI Tagging and Classification:
Automatically classify and label records using AI-recommended tags (e.g., “HIPAA,” “GDPR,” or “PII”) to ensure consistent data management and protection.
Policy Based Governance:
Policy Based Governance empowers administrators to manage data visibility for both users and AI agents. This system allows for the creation, maintenance, and application of tailored access policies, guaranteeing that individuals and AI only access authorized data. These policies offer granular control over data access by enabling restrictions at the field, object, or record level.
Dynamic Data Masking:
Dynamic Masking policies enhance data security by automatically controlling the visibility of sensitive information. Access to data is dynamically adjusted, either revealing or concealing it based on the user’s identity and permissions.