1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
9

Universal Containers is tracking the interviewer's ratings of candidate in Salesforce. They would like to easily link the Candid

ate record to the Rating record. Only the recruiter and interviewer should have access to the Rating records, whereas all the employees of Universal Containers can see the Candidate records. What type of relationship should be created between Candidate and Ratings?a. Master-Detailb. Lookupc. Searchd. Hierarchical
Computers and Technology
1 answer:
uranmaximum [27]3 years ago
3 0

Answer:

Hierarchical is scenario is used to between condition and ratings.

Explanation:

Master   -details its open up all details of the candidate and his rating to Universal Containers is tracking by interviewer ratings. where they are no classified. Just data collection.

Lookup:- where it fetches all details and further analysis will be a big task.

Search  :- it is a just search where relevant information based on queries.

Hierarchical;- it is further classified and it is very to do analysis and takes decisions.

Since it is classified further drill down is possible and make a good analysis report can be made.

You might be interested in
Which of the following best explains how the Internet is a fault-tolerant system?
IrinaK [193]

Answer:

A

Explanation:

The Internet is fault-tolerant because cybercriminals can conceal their actions, allowing them the ability to carry out faulty actions without leaving a trace.

This statement is actually the same question I had to answer when in my 2nd year 1st semester in itt.
<3 enjoy

8 0
2 years ago
Read 2 more answers
Insecurely attached infants who are left my their mothers in an unfamiliar setting often will
Temka [501]

Insecurely attached infants who are left my their mothers in an unfamiliar setting often will Hold fast in their mothers in their return.

A. Hold fast in their mothers in their return

<u>Explanation:</u>

It is in the conscience of the infants to have the company of their parents no matter the place or time and do not generally like to be left alone. Moreover, the questions says, insecurely attached infants which further add up to this behavior.

The infant would not explore the surroundings due to lack of confidence in an unfamiliar setting. They would rather be uncomfortable and most probably weep the time until their mother arrives and hold fast on to them on their return.  

8 0
4 years ago
In what way, if any, are problems related to conflicts? Problems and conflicts are the same thing. Problems and conflicts are th
Marrrta [24]

Answer:

A small problem can turn into a huge one if there is conflict and it you allow it to fester,

Explanation:

according to Helpguide.org. It is a mistake to assume that all conflicts are problems because they are not. The problem is in figuring out how to effectively deal with problems that can become conflicts, according to Neil Thompson of Avenue Consulting.

4 0
2 years ago
The______ technique helps you explode possible risks by providing access to risk areas identified in the past. It also provides
Natalka [10]

Answer:

Threat and Hazard Identification and Risk Assessment

Explanation:

Its the threat and hazard identification and risk assessment technique that helps in exploding possible risks, which have been identified in the past. Also, it lists the solutions that were being brought to use for getting rid of the risk, and also list the outcome. Thus, you get the complete picture of the risk involved through the THIRA. And thus, you can easily get rid of them.

6 0
4 years ago
A(n) _________ is any system resource that is placed onto a functional system but has no normal use for that system. If it attra
Kisachek [45]

Answer:

Honeytoken

Explanation:

Honeytokens (aka honey traps or honeypots) may be described as bogus or dummy IT resources which are created or placed in a system or network for the sole purpose of attracting the attention of cyber-criminals and being attacked. These might be servers, applications, complete systems or datasets which are placed online (via the public internet, or a public-facing gateway to a private network), in order to attract cyber-attackers.

Honeytokens may be specifically defined as pieces of data which on the surface look attractive to potential attackers, but actually have no real value – at least, not to the attacker. For the owners of the tokens (i.e. the people who set the trap), they can be of great value, as they contain digital information which is monitored as an indicator of tampering or digital theft.

8 0
3 years ago
Other questions:
  • What browser is included with windows?
    7·1 answer
  • What does 4g consistâ of?
    14·1 answer
  • DSSS uses a chipping code to encode redundant data into the modulated signal. Which two of the following are examples of chippin
    12·1 answer
  • How do i cancel my subscription please help it doesnt say cancel anywhere todays the last day of my free trial help
    8·1 answer
  • The spoken version of your company's purpose is called
    14·1 answer
  • All nuclear energy results in the rapid release of energy, such as in atomic bombs. true or false
    8·1 answer
  • Sam would like to install a new application on every computer in his SOHO network. All the computers are currently connected in
    15·1 answer
  • Which recorder is least recommended in automation anywhere?
    11·2 answers
  • What is the difference between windows 10 and windows 11
    13·1 answer
  • Imagine an everyday scenario in which you are using the internet: downloading a file, uploading a photo, checking your email, et
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!