1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Andrej [43]
3 years ago
9

Universal Containers is tracking the interviewer's ratings of candidate in Salesforce. They would like to easily link the Candid

ate record to the Rating record. Only the recruiter and interviewer should have access to the Rating records, whereas all the employees of Universal Containers can see the Candidate records. What type of relationship should be created between Candidate and Ratings?a. Master-Detailb. Lookupc. Searchd. Hierarchical
Computers and Technology
1 answer:
uranmaximum [27]3 years ago
3 0

Answer:

Hierarchical is scenario is used to between condition and ratings.

Explanation:

Master   -details its open up all details of the candidate and his rating to Universal Containers is tracking by interviewer ratings. where they are no classified. Just data collection.

Lookup:- where it fetches all details and further analysis will be a big task.

Search  :- it is a just search where relevant information based on queries.

Hierarchical;- it is further classified and it is very to do analysis and takes decisions.

Since it is classified further drill down is possible and make a good analysis report can be made.

You might be interested in
Explain why professional software that is developed for a customer is not simply the programs that have been developed and deliv
denpristay [2]

Answer:

1. Professional Software is not just the program developed for a customer

2. The software is meant for a specific purpose

Explanation:

Professional software is not just the program developed for a customer. Infact professional software along with executable code will also contain documentation, configuration of data - all that is required to make the operation of programs correct and accurate. Generally such a software do contain separate files for program and configuration purposes. Documentation of the professional software consists of several topics such as structure of the system, user documentation with all the information required for user to work on that. Hence professional software is not just a set of programs developed for customer - but it is a comprehensive information collection and set up tool set designed for the usage of a customer as well.

2. Custom software development are commisssioned by a specific customer for his specific requirements. Whereas Generic software products are general software applicable for diverse customers for their requirements and hence can be sold in open market for any customer. And hence the aplication development of both the software products mentioned above also do vary, in the first case specifications will be completely provided by the customer and will be controlled as well by the cusotmer

8 0
3 years ago
The MAA is responsible on a daily basis to protect office computers and patient records and personal information from hackers. R
d1i1m1o1n [39]

Two things that I can do in order to protect these assets with the use of the computer or the internet is by first, downloading and using an antivirus software where this has the ability to protect the computer from invaders, hackers and other viruses that could get into the system of the computer. Second, making the data encrypted, so that it will be protected with a code to prevent other people who are trying to get in the data.

3 0
4 years ago
Five types of conflict in the school​
MrRissso [65]

Answer:

Conflicts can be classified into five different types: structural, value, relationship, interest, and data [

Explanation:

5 0
3 years ago
Read 2 more answers
Putting commands in correct order so computers can read the commands
lana66690 [7]

Answer:

its b I think I'm pretty sure

8 0
3 years ago
चार फरक छुट्याउनुहोस् ।) 3. Write down any four provisions of cyber ethic साइबर नैतिकताका कुनै चार प्रावधानहरु लेख्नुहोस् ।​
Kruka [31]

Answer:

Five provisions of cyber ethics are:

Your computer or system should not be used to harm others. Your cyber knowledge should not be used to steal other people's resources. One should not use or copy softwares for which you have not paid. ... Never use other people's resources without their consent.

7 0
3 years ago
Other questions:
  • Which of the following is an example of a consumer service? computer builder motorcycle manufacturer cabinet maker air condition
    15·2 answers
  • Assume you have a byte-addressable machine that uses 32-bit word (integers are 32-bit) and you are storing the following informa
    5·1 answer
  • Please Help!
    14·2 answers
  • HELP ME PLZ QUICK Adam is writing a program that: 1) has the user guess a number, and 2) tells the user how many guesses it took
    11·1 answer
  • Which are factors that go into a project plan? choose four answers
    14·1 answer
  • Sally needs to teach her class how to convert a decimal number to a binary number. What is the first step she should take to sta
    5·1 answer
  • CORRECT ANSWER GETS BRAINLIEST
    8·2 answers
  • You have this code in your program.
    7·1 answer
  • HELP PLS
    5·2 answers
  • Digital communication and production chapter 17
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!