1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
12345 [234]
3 years ago
8

An app builder has created a report for sales people to view records from the custom object, some users have complained that the

y are unable to see all of the appropriate records. What steps should be taken to ensure data visibility within the report? Choose 3 Answers A. Check organization-wide defaults B. Check the user's profile for object settings. C. Check the report folder sharing settings. D. Check reports filter E. Check Sharing rules.

Computers and Technology
1 answer:
Mila [183]3 years ago
8 0

Answer:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

Explanation:

You might be interested in
Machine language library routines are installed on computers Select one: a. because they can come as part of the operating syste
Licemer1 [7]

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

<em>hope this helpsssssssss!!!!!!!!!!! :):):)</em>

6 0
3 years ago
Application means to
lakkis [162]
An application or an app is a type of software that allows us to perform specific task . When you opens an application it runs inside your operating system . If more than one application are opened in one time it is known as multitasking  
Applications of desktop or laptop are called desktop applications while mobile applications are called mobile apps
3 0
3 years ago
Which of the following, (1) money deposited in a bank account, (2) student recording her answer to a question in an online test,
tamaranim1 [39]

An Information System is when key components such as hardware, software, data, and process are combined for collection, processing, and distribution of data. All of these scenarios mentioned on the choices above are considered transactions in an information system. There is an exchange of information that fully satisfies the request of a user and describes what transactions in information systems are. They are good examples of users entering information whether, physically or electronically, as data into computers. This data is then processed, and the database changes adjusted with some being made permanent.

3 0
3 years ago
Float in is an example of a(n) _____. annotation, evolution, animation, simulation
Pavel [41]
Animation or C your welcome my friend
7 0
3 years ago
Question 4 Multiple Choice Worth 5 points)
Morgarella [4.7K]

The correct answer is Boolean logic.

Booleans are true or false statements.

An example of a while loop is:

while 1 < 5:

   #do something.

The Boolean statement is 1 < 5 which evaluates to true because 1 is less than 5.

I hope this helps!

3 0
3 years ago
Other questions:
  • When a server crashes and goes offline on a network, which of the following helps to determine that the server is unavailable?
    9·1 answer
  • Solve the following quadratic equation <br><br>y=6x^2-12x+1
    9·1 answer
  • A TCP ________ segment is a request to the other transport process to close a connection. ACK FIN SYN CLS
    15·1 answer
  • Whats a field in databases?
    5·1 answer
  • Why is it important to put the most specific case first? What types of errors does it help avoid?
    11·1 answer
  • Which object event is an indication that something has been created but not committed into the database?
    13·1 answer
  • A computer is performing a binary search on the sorted list of 7 numbers below. What is the maximum number of iterations needed
    15·1 answer
  • how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks
    10·1 answer
  • Computer programming 5
    10·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is contained in
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!