1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Fynjy0 [20]
3 years ago
13

What happens to an LR if they troll/spam?

Computers and Technology
1 answer:
Mkey [24]3 years ago
8 0
They have a chance of being blocked
You might be interested in
An app builder has created a report for sales people to view records from the custom object, some users have complained that the
a_sh-v [17]

Answer:

Check sharing rules

Check organization-wide defaults

Check the user s profile for object settings

Explanation:

There is a need for some people to see the total transparency of the records that are meant to be shared with a select group of people. There are certain things that can be done for this. The first one is that the sharing rules should be checked. To whom are the details shared with. The next one is the filters that are used.

These can be reported and changed accordingly. Lastly, the whole organization’s defaults can be checked. This is something that can be done when the previous methods that were done did not work that well. Once some changes are done, the people can check if they already work and if the records can be viewed.

6 0
4 years ago
Which of the selections below is not a benefit of imaging the computers on your network? There are fewer licensing fees because
Stella [2.4K]
Among the selections, the statement that is not a benefit of imaging the computers on your network is: It helps to lessen the impact of spyware on the network. 
The area that studies covering digital images - images that can be stored on a computer like bit-mapped images is called Computer imaging or digital imaging. 
8 0
3 years ago
In your own words, describe UML. Identify at least two types of UML diagrams that can be used in software development; describe
lora16 [44]

<u>Uml (Unified Modified Language):</u>

In those days before software development normally we used flow chart, which will have Start, Process, Conditions and Stop, Modified version of flow chart is called UML (Unified Modified Language).

UML is standard model language which help develop understand flow of the software. Uml (Unified Modified Language).

There are 7 type of diagram is used in Uml (Unified Modified Language).

  • Class Diagram.
  • Object Diagram.
  • Component Diagram.
  • Composite Structure Diagram.
  • Deployment Diagram.
  • Package Diagram.
  • Profile Diagram.

I will suggest profile diagram and class diagram.

  • Profile diagram – This diagram is just to define use role and user rights.
  • Class diagram: - This diagram explains the class and their uses in the software development.
7 0
4 years ago
There’s No Difference In Security If You Use A Public PC Or Your Own Computer.
Andreas93 [3]
False because if you use public someone else could be using it as a a trap to get your information and with your own if you no how to use it well you will be safe


3 0
4 years ago
2. (8 points) When creating the Academic Database, there were several instances of data
Bad White [126]

Answer:

See explaination

Explanation:

An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.

One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.

One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.

Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.

8 0
4 years ago
Other questions:
  • When you want to print a page from the World Wide Web, select the print command in the _____.
    8·2 answers
  • Write a program that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, i
    11·1 answer
  • What part of the communication feedback loop results in unclear communication?
    13·1 answer
  • Given an array of n distinct integers,d = [d[0], d[1],.., d[n - 1]], and an integer threshold, t, how many (a,b,c) index triplet
    11·1 answer
  • Which of the following statements is false ^^^^^Please Help^^^^^^
    10·1 answer
  • 1. What is Computer Hardware?
    14·1 answer
  • Someone hacked into an employees computer and erased all of their data. All data for the past three weeks was lost as that was w
    11·2 answers
  • The _____ feature will mark all changes made to a document for others to review at a later time.
    13·1 answer
  • The basics of color theory assume what central tenets
    14·1 answer
  • John is writing a code instructing the character to move forward 10 steps, choose a number between 1 to 10, and if the number is
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!