1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Jlenok [28]
4 years ago
12

An sObject named Application _c has a lookup relationship to another sObject named Position_c.

Computers and Technology
1 answer:
Vedmedyk [2.9K]4 years ago
4 0

Answer:

The correct options to the following question is C.).

Explanation:

Because there is given that it is the lookup relationship.

  • The Flow or the Process builder can do this (as given in the question) as well.
  • The lookup relationships with the other objects are just like the Child's to the Parent's relationships. Here, the Position_c is Parent and the Application _c is the child.
  • The updated fields in the child records is when the parent's records are updated.
You might be interested in
The concept of a process in an operating system embodies two primary characteristics, one of which is:
miv72 [106K]

Answer:

Resource Ownership and Scheduling execution

Explanation:

In process characteristic the characteristic is

  • Resource ownership
  • Scheduling / Execution

In Resource ownership, the OS performs a protection function where unwanted interference in processes are with resources

In scheduling execution, the process has execution state and scheduled. They can be separated by resource ownership.

The dispatching of the process is the lightweight process, and it is multi-threading. The ability of the operating system supports the single concurrent process.

The process is a unit in the resource protection and protected the CPU and other processes. It contains the multiple thread execution

Each thread contains the running, ready state and saved the thread context and access the memory. Some necessary activities of the various threads are the same address space and the resources.

7 0
4 years ago
Write a program that reads integers from the user and stores them in a list. Your
Blizzard [7]

Answer:

The program in Python is as follows:

numList = []

num = int(input())

while num != 0:

   numList.append(num)

   num = int(input())

   

numList.sort()

for num in numList:

   print(num)

Explanation:

This initializes the list

numList = []

This gets input from the user

num = int(input())

This loop is repeated until the user enters 0

while num != 0:

This appends the user input to the list

   numList.append(num)

This gets another input from the user

   num = int(input())

This sorts the list in ascending order    

numList.sort()

This iteration prints the list elements, each on a line

<em>for num in numList:</em>

<em>    print(num)</em>

3 0
3 years ago
1. provides a list of at least five SSIDs and the
taurus [48]

One of the most important ways to provide wireless security is through:

  • The use of encryption.

<h3>What is Wireless Security?</h3>

This refers to the network authentication and use of encryption to secure a network from unauthorized access or compromise of the network by an external agent.

With this in mind, we can see that SSID is a WiFi network name and it makes use of WPA2 security encryption to protect the wireless network through wireless encryption protocol.

Please note that your question is incomplete so I gave you a general overview to help you get a better understanding of the concept.

Read more about wireless security here:
brainly.com/question/14449935

8 0
2 years ago
A variable is assigned a value on line 328 of a program. Which of the following must be true in order for the variable to work?
Ivanshal [37]

Answer:

the answer is A

Explanation:

I just did this

3 0
3 years ago
Read 2 more answers
_________values are stored as the number of seconds since the unix epoch (35 POINTS)
Nataly_w [17]

Answer:

he Unix epoch (or Unix time or POSIX time or Unix timestamp) is the number of seconds that have elapsed since January 1, 1970 (midnight UTC/GMT), not counting leap seconds (in ISO 8601: 1970-01-01T00:00:00Z).

Explanation:

The answer above is from a secure website

3 0
3 years ago
Other questions:
  • Two users, UserA and UserB, are engaging in secure communication using only asymmetrical encryption. UserA needs to send a secur
    11·1 answer
  • Technology not only influences what formats are possible in media, it also defines their contents.
    13·1 answer
  • Cross-functional systems are being phased out in favor of systems that support business processes within a single functional gro
    14·1 answer
  • JOIN ZOOM <br> Code- 858 1417 3090 <br> Password- XvT18Q
    11·2 answers
  • Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
    5·1 answer
  • Convert the expression ((a+b) + c * (d+e) + f) * (g+h) to a:
    13·1 answer
  • How many registers are there in the memory unit?
    8·1 answer
  • What is the depth of the following tree?
    10·1 answer
  • AUPs ensure that an organization’s network and internet are not abused. Select 3 options that describe AUPs.
    12·1 answer
  • The analysis of attempting to solve a problem with information systems is called ________.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!