1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ugo [173]
4 years ago
10

Universal Containers decided to start using salesforce for all its sales automation its current sales database has about 50 mill

ion records. These records were all migrated into the database from other legacy systems. After migration to salesforce UC wants to be able to search and cross reference records with the original source system. What should a consultant recommend to meet the requirement?
A. Use the standard external ID field and map this to the original record ID value
B. Use a custom field named external ID and map this to the current record ID Value
C. Use a custom external ID field and map this to the original record ID value
D. Use the standard external ID field and map this to the current record ID Value
Computers and Technology
1 answer:
scoundrel [369]4 years ago
3 0

Answer:

The correct option of the following question id C.).

Explanation:

The system which contains the databases is known as DBM, or the database management system. The database is the organized collection of the data and accessed electronically and generally stored from the computer system.

There are the four main types of databases:

  • Desktop database programs,
  • Text databases,
  • RDMS  (relational database management systems),
  • Object-oriented databases and NoSQL.
You might be interested in
If you are inserting an address block with the Address Block dialog box and the fields do not connect automatically, what can yo
erica [24]

Answer: B

Explanation:

5 0
4 years ago
Read 2 more answers
What is an establishing shot, and when is it an appropriate shot choice in a film?
Mila [183]
Here's the official definition:

It is generally a long or extreme-long shot<span> at the beginning of a scene indicating where, and sometimes when, the remainder of the scene takes place. </span>Establishing<span> shots were more common during the classical era of filmmaking than they are now.</span>
4 0
4 years ago
Read 2 more answers
What is technology addiction​
Helen [10]

Answer:

What is the definition of technology addiction?

Technology addiction is defined as the uncontrollable overuse of technological devices including smart phones, computers, and gaming systems. ... Individuals suffering from technology addiction often display both behavioral and physical symptoms.

Explanation:

Technology addiction can be defined as frequent and obsessive technology-related behavior increasingly practiced despite negative consequences to the user of the technology. An over-dependence on tech can significantly impact students' lives.

5 0
4 years ago
Describe the third generation of computers​
djverab [1.8K]

Answer:

The period of third generation was from 1965-1971. The computers of third generation used Integrated Circuits (ICs) in place of transistors. A single IC has many transistors, resistors, and capacitors along with the associated circuitry.

The IC was invented by Jack Kilby. This development made computers smaller in size, reliable, and efficient. In this generation remote processing, time-sharing, multiprogramming operating system were used. High-level languages (FORTRAN-II TO IV, COBOL, PASCAL PL/1, BASIC, ALGOL-68 etc.) were used during this generation.

Third Generation

The main features of third generation are −

IC used

More reliable in comparison to previous two generations

Smaller size

Generated less heat

Faster

Lesser maintenance

Costly

AC required

Consumed lesser electricity

Supported high-level language

Some computers of this generation were −

IBM-360 series

Honeywell-6000 series

PDP (Personal Data Processor)

IBM-370/168

TDC-316

3 0
3 years ago
What are the purpose of each in c++?
34kurt

<u>If statements</u>- This statement is used to check the condition.

    if(condition)

      {

        statement

     }

If the condition is true,then statement will run,else not.

<u>Switch statement</u>-This statement is used for long conditions.It is a substitute for if,else conditions

     switch(a)

       {

          case1: statement 1//if a=1

                      break;

          case2: statement 2 //if a=2

                       break;

         .....

          default:statement//if a is not equal to any of the cases.

<u>Multiway if</u>-In this statement ,if elseif and else were there.

    if(condition1)

       {

         statement 1

       }

   elseif(condition2)

       {

         statement 2

      }

..............

   else

       {

         statement n

       }

<u>Nested loops</u>-This statements are used when we use if-else conditions in other if,else conditions.

   if(condition 1)

     {

       if(condition 2)

          {

           if (condition 3)

              {

               statement 3

              }

          else

               {

                 statement 4

               }

           }

      ]

<u>rand()</u>-This method is used for generating random number.The expression is

     number=rand()%50;

It will generate a random number ranges between  0 to 50.

<u>srand()</u>-This method is used to set the starting value for random number series.

srand (time(NULL));

<u>seed()</u>-It is a method for initializing the same random series,it is passed in srand().

6 0
3 years ago
Other questions:
  • You just realized the turn signal on your vehicle is broken,
    15·1 answer
  • Which of the following statements is not true about proper tire care? a.If you see a wear bar across the width of the tread whil
    14·2 answers
  • Which of the following is false?
    7·1 answer
  • Which statement is FALSE? If a method does not return a value, the return-value-type in the method declaration can be omitted. P
    8·1 answer
  • Which loan type requires you to make loan payments while you’re attending school?
    7·2 answers
  • In both direct flooding attacks and _____ the use of spoofed source addresses results in response packets being scattered across
    9·1 answer
  • A television advertisement claiming that a product is "light-years ahead of its time" does not make sense because (a) it doesn’t
    10·1 answer
  • What questions do they ask for the 08.03 Discussion- Based Assesment in Drivers Ed?? Thanks.
    11·1 answer
  • The U.S. consumes lots of energy. Which fuel provides the most energy?
    15·2 answers
  • Connection security rules are used to secure traffic between two computers while it crosses internet?
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!