giannaprato7351 giannaprato7351 18-01-2024 Computers and Technology contestada Set a checkpoint in the EmailMissionSpecialist class. Then execute the class and analyze the objects logged at the checkpoint. a. Debugging technique b. Software design principle c. Network security measure d. Data visualization method