Answer:
Check sharing rules
Check organization-wide defaults
Check the user s profile for object settings
Explanation:
There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.
These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.
<h2>
Answer:</h2>
The quality of lacking a pattern or organization so that result are unpredictable is also known as<u> Randomness.</u>
<h2>
Explanation:</h2>
In the daily routine work, randomness can be defined as the apparent lack of pattern. Randomness occurs when there is no predictability in events. Thus a random pattern of events, steps or symbols often has no sequence and order so they lead eventually towards Randomness. Similarly when elements will not follow an intelligible pattern or a proper combination they will result in Randomness.
<h3>
I hope it will help you!</h3>
Answer:
First one would be work ethic.
Second one would be communication.
Third one would be adaptability.
Fourth one would be creativity.
(These are all guesses tho, so i'm not 100% sure !!)
Explanation:
Answer:
An operating system has three main functions: (1) manage the computer's resources, such as the central processing unit, memory, disk drives, and printers, (2) establish a user interface, and (3) execute and provide services for applications software.
Memory Management.
Processor Management.
Device Management.
File Management.
Security.
Control over system performance.
Job accounting.
Error detecting aids.
Answer:
Answered below
Explanation:
Coaxial cables weaknesses include; fluctuation of speed during heavy use, leaks at the point of connection and signal loss over long distances. Twisted pair cables are not durable enough and are susceptible to interference. Fibre optic cables are costly and need expertise to install.
Hacked or compromised routers can be infected with malwares that reroutes users to spam sites and also to ddos attacks.
Steps to protect cable networks include; network encryption, physical security, VPN usage, updating networks, auditing and mapping.