1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
goldfiish [28.3K]
4 years ago
12

What are the features that can extend record acees beyong Organization-wide defaults?A. Criteria-based sharing rules.B. Owner-ba

sed sharing rules.C. Public or private groups.D. Dynamic role hierarchy.
Computers and Technology
1 answer:
Arturiano [62]4 years ago
8 0

Answer: Criteria based sharing rules; Owner-based sharing rules.

Explanation:

The features that can extend record access beyond Organization-wide default are Criteria-based sharing rules and Owner-based sharing rules.

An owner-based sharing rule gives access to the records that certain users own. An example is when the sales manager for a company sees the opportunities that are owned by the sales managers in different locations. For the criteria-based sharing rule, it is not based on the record owners but rather on the record values.

You might be interested in
A pages visual organization is known as the
OLEGan [10]
The correct answer to this is D layout. hope this helps :)
7 0
4 years ago
Read 2 more answers
A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, p
Bad White [126]

Answer:

For Plato users the Answer is C

Explanation:

7 0
3 years ago
Hackers often argue that hacking is for the good of all people because it points out flaws in computer systems. do you agree wit
zzz [600]
 "Hackers" who work for companies to expose security flaws are definitely good, they're helping protect systems, often referred to as "white-hat" hackers. Many companies hire people like these or offer bounties for such people who can find vulnerabilities. One could say that even without permission, people who hack with the intent of demonstrating holes in security or improving a service could be considered good.

However, I don't believe that as firstly, they are breaking the law, and secondly, they are stealing data and invading people's privacy. One might as well break into somebody's house to say their security is bad! 
6 0
4 years ago
An isotope of an element has:
goldenfox [79]
C: a different atomic mass
3 0
4 years ago
Read 2 more answers
ওয়ার্ড প্রসেসিং এ একটি সাধারন ডকুমেন্ট প্রিন্ট করার পদ্ধতি বর্ননা কর?answered
FinnZ [79.3K]

Answer:

আপনি কি জানেন যে বেশিরভাগ লোকেরা আপনার প্রশ্নটি কী তা বুঝতে পারে না? আপনি কী বলছেন তা আমি জানি না, আমার ফোনে কেবল একটি অনুবাদক আছে!

3 0
3 years ago
Other questions:
  • What is basic statement made up of​
    10·2 answers
  • To add a row labeled "total" to a query design click the ____ button in the show/hide group on the design tab on the ribbon.
    14·2 answers
  • bad word bad word bad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word bad wordbad word
    5·1 answer
  • When designing a suitable and safe flexibility training program, you should set reasonable and appropriate goals depending on wh
    15·1 answer
  • A great way to obtain Hands-On training in a real quick environment is to complete a ??
    12·1 answer
  • The premise of this exam is to synthesize your knowledge and understanding of recursion. Your synthesize may be in the form of a
    14·1 answer
  • How does AI use data
    7·1 answer
  • When I click on someone who asked a question and i want to see there answer it is always blurred and when I asked a question I c
    8·1 answer
  • ________ is a human-computer interaction method whereby inputs to and outputs from a computer-based application are in a convent
    8·1 answer
  • Which generation computer supported GUI operating system?​
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!