1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
4 years ago
10

Universal Containers decided to start using salesforce for all its sales automation its current sales database has about 50 mill

ion records. These records were all migrated into the database from other legacy systems. After migration to salesforce UC wants to be able to search and cross reference records with the original source system. What should a consultant recommend to meet the requirement?
A. Use the standard external ID field and map this to the original record ID value
B. Use a custom field named external ID and map this to the current record ID Value
C. Use a custom external ID field and map this to the original record ID value
D. Use the standard external ID field and map this to the current record ID Value
Computers and Technology
1 answer:
scoundrel [369]4 years ago
3 0

Answer:

The correct option of the following question id C.).

Explanation:

The system which contains the databases is known as DBM, or the database management system. The database is the organized collection of the data and accessed electronically and generally stored from the computer system.

There are the four main types of databases:

  • Desktop database programs,
  • Text databases,
  • RDMS  (relational database management systems),
  • Object-oriented databases and NoSQL.
You might be interested in
Write a Racket two-way selection structure that will produce a list '(1 2 3) when the first element of a list named a_lst is ide
ANEK [815]

Answer:

A

Explanation:

3 0
3 years ago
Spelling and grammar checking options can be controlled at the word options dialog box. To display this dialog box, begin by cli
Cerrena [4.2K]
By clicking the file tab
8 0
4 years ago
Pls help!!
alexira [117]

Answer:

4.24

Explanation:

First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.

7 0
2 years ago
Create a structure representing a student. The member variables should include student name, student ID, and four test grades fo
Neporo4naja [7]

Answer:

Output:

Name: Brainly

ID:0001

Write the 4 tests grades of the student separated by space :10 9 8 10

Brainly

0001

10 9 8 10

Average :9.66667

'1' to continue '0' to exit :

Explanation:

#include<iostream>

#include<string>

using namespace std;

//variables declaration

struct Student {

  string id; //string declaration ID

  string name; // string declaration name

  int grades[4]; //array of 4 because it is 4 grades

};

//definition of the function get information

void inputData(Student &s){

 

   

   cout << "Name:" ;

   getline(cin,s.name);

   cout << "ID:";

   cin >> s.id;

   cout << "Write the 4 tests grades of the student separated by space :";

   for (int i = 0; i<4; i++)

       cin >> s.grades[i];

}

//definition of the function of average

double inputAvg(Student s){

   double summation;

   int temporary;

   double average;

   for (int i = 0; i<4; i++){  

      for (int j = i; j<4; j++){

         if (s.grades[j] > s.grades[i]){

             temporary = s.grades[i];

             s.grades[i] = s.grades[j];

             s.grades[j] = temporary;

         }

      }

    }

    summation = 0;

    for (int i = 0; i<3; i++){

        summation = summation + s.grades[i];  

    }

    average = summation/3;

    return average;

}

void disp(Student *s){

   cout << s->name << endl;

   cout << s->id << endl;

   for (int i = 0; i<4; i++)

       cout << s->grades[i] << " ";

   cout << endl;

   cout << "Average :" << inputAvg(*s) << endl;

   

}

int main(){

  Student st;

  int ch;

  while(true){

      inputData(st);

      disp(&st);

      cout << " '1' to continue '0' to exit :";

      cin >> ch;

      if (ch == 0)

         break;      

  }

  return 0;

}

6 0
3 years ago
he IT director asks you to verify that the organization's virtualization technology is implemented securely. What should you do
Kamila [148]

Answer:

Check that virtual machines have always had the upcoming services packs as well as patches set up.

Explanation:

  • Among the very most essential preventive measures, you could even begin taking would be to download the application security relies on upon and splotches. The whole principle applies to routine OS, implementations as well as virtualization software.
  • It would not be appropriate for software applications to have been multihomed even though it will not seem to significantly boost their protection.
  • Penetration testing is being managed to complete before the implementation of virtual servers. Subnetting isn't necessary for virtual servers, and while it may improve safety. It must be factored into the equation during most of the capacity building phase.
7 0
3 years ago
Other questions:
  • _____ is a valuable tool that enables you to find information on the web by specifying words or phrases know as keywords- which
    14·1 answer
  • Word Online works exact same as the downloaded Office 2016 version.<br>True<br>False​
    7·1 answer
  • What natural boundary separated british territory from louisiana?
    7·1 answer
  • When parallel sections of oxygen and fuel gas hoses are taped together, only _____ inches out of 12 inches should be covered by
    8·2 answers
  • What is a fragmented disk?
    14·1 answer
  • Which of the following are best practices that should be done in Photoshop before placing images in InDesign?
    11·1 answer
  • Which of the following is defined in terms of their activities related to denial-of-service attacks? Cracker Script kiddie White
    6·1 answer
  • According to the video, what types of education are useful for Database Administrators? Check all that apply.
    5·2 answers
  • A small business named Widgets, Inc. has hired you to evaluate their wireless network security practices. As you analyze their f
    13·1 answer
  • Can someone please help me with this .
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!