A restaurant has a case type that allows customer to book the dining room for events. Customers provide basic information includ
ing party size and indicate whether they want the restaurant to cater the event. If the catering is not requires are given a rental rate quote. If customers indicate that want the restaurant to cater the event, they must provide menu preferences and schedule an appointment to do menu before they are given a quote. Which two options would you use to configure the case type to achieve the requested behavior?(Choose Two.) A. Create a check box for customer to indicate whether they want the restaurant to cater the event. Create a selection with the menu preferences and scheduling feature that has a Visible when condition. B. Create a check box for customer to indicate whether they want the restaurant to cater the event. Add a decision shape that evaluates whether the customer checks the box. C. Create a process for customers to indicate menu preference and schedule the menu testing appointment. Add the process as a case-wide optional action. D. Create a process for providing menu preferences and scheduling the menu appointment. Create a parallel process for providing the customer with the rental rate quote.
A. Create a check box for customers to indicate whether they want the restaurant to cater the event. Create a section with the menu preferences and scheduling feature that has visible when condition
C. Create a process for customers to indicate menu preferences and schedule the menu tasting appointment. Add the process as a case-wide optional action.
When someone is upset and they are driving they usually have their music baring and the they can't hear their surroundings and all they can think about is what they are upset about so therefor they don't pay attention. Hope this helped! Have a great day! :)
Try restating system software and delete anything that may have caused the online fraud then remove all credit cards and info on the device. Tell the authorities and get a new device and email with a software protector. When doing this DO NOT DO WHAT YOU ORIGINALLY DID TO GET VICTIMIZED AND (DON'T TRY TO SIGN INTO YOUR PREVIOUS EMAIL ON A NEW DEVICE)