1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
rosijanka [135]
2 years ago
6

Universal Containers needs to add an additional recipient to a workflow email alert that isfired from the case object. What type

of field could be added to the case object to allow theadditional desired recipient on the email alert? Choose 2 answers:A. Formula fieldB. Email fieldC. Text fieldD. Lookup field
Computers and Technology
1 answer:
777dan777 [17]2 years ago
3 0

Answer:

Lookup field and Email field.

Explanation:

You might be interested in
In the excerpt above, what can be inferred by the statement, “The Dillingham had been flung to the breeze during a former period
galina1969 [7]
The best and the most correct answer among the choices provided by the question is the first choice. We can infer from the excerpt that <span>Jim felt important enough to place his full name on the mailbox when he enjoyed a higher income. </span>I hope my answer has come to your help. God bless and have a nice day ahead!
3 0
2 years ago
Read 2 more answers
You can customize backdrops in Scratch, adding text or freestyle drawings over the initial image
sveticcg [70]

Answer:

A. True

Explanation:

ive done this myself

https://scratch.mit.edu/projects/395142260/

3 0
2 years ago
HELP PLEASEEEE!!!!!!!
Lubov Fominskaja [6]
This is too little points for a question I’m sorry.
8 0
2 years ago
A digital certificate confirms that the macro created by the signer has not been altered since the digital certificate was creat
Nesterboy [21]

Answer: False

Explanation:

Digital certificate is defined as entity identification in digital form that is used by a user or firms to share their information along with authentication and security. It uses public key cryptographic technique and so it is also know as public key certificate.

  • Digital signature is the signature that is done digitally to secure data or document.It maintains security of the content present  in message of information that is being exchanged through e-signature.It follows encryption technique for maintaining authenticity.
  • Therefore, digital signature is the signing feature that protects macro after being made to maintain its authenticity.
  • Thus, the given statement is false.
3 0
2 years ago
Which of the following devices can be connected to a network? Check all of the boxes that apply.
Diano4ka-milaya [45]

Answer:

1, 2, 4, 6

Explanation:

5 0
2 years ago
Other questions:
  • When a user receives an email warning about the dire consequences of possible virus attacks on their pc or tablet, it is often a
    6·1 answer
  • Create a function that will perform linear interpolation from a set of measured data stored in a list or array. The function sho
    13·1 answer
  • 4 types of system software
    10·2 answers
  • Routing connects different network segments and decides where __________are sent to
    7·1 answer
  • Convert each of the fo" wing base ten representations to its equivalent binary form a. 6 b. 13 C. d. 18 e. 27
    6·1 answer
  • What dose a company’s code of ethics cover
    9·2 answers
  • Which Excel function or tool will you use to display the cells that are referred to by a formula in the selected cell
    8·1 answer
  • Define a function below, posodd_number_filter, which takes a single numerical argument. Complete the function to return accepted
    10·1 answer
  • Write pseudo code that performs the following: Ask a user to enter a number. If the
    13·1 answer
  • Big Data _______________. Relies on the use of unstructured data imposes a structure on data when it is captured relies on the u
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!