1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
zalisa [80]
4 years ago
10

How can these requirements be met? Universal Containers conduct evaluations of their sales reps using a custom object consisting

of numerical scores and executive comments. The company wants to ensure that only the sales reps and their manager’s executive can view the rep’s evaluation record but the reps should not be able to view the executive comment field on their review.
A. Use a private sharing model granting record access using hierarchy; manage field access with record types and field-level security
B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security
C. Use a private sharing model granting record access using hierarchy; manage field access with field-level security
D. Use a private sharing model granting record access using custom setting; manage field access with record types and page layouts
Computers and Technology
1 answer:
Rudik [331]4 years ago
4 0

Answer:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security

Explanation:

The answer is B. Use a private sharing model granting record access using custom setting; manage field access with page layouts and field level security.

The reason the answer is B is because if access is provided through a hierarchy, it will give access to all the users at the higher manager role for the records of every executive. Also the options provided do not state clearly if Grant access using hierarchy is also checked so we cant assume that.

You might be interested in
Explain the steps you take to complete an Internet search. Do you use a particular search engine every time or do you alternate?
Naddik [55]
1. Personally, I always use the same search engine, which is Google. I once opened Bing mistakenly, but obviously returned to Google immediately. Google is my preferred choice because I've used it for such a long time that I've gotten so used to it and cannot change it. The other search engines don't look as appealing to me as Google.

2. Some advantages would be definitely the format of the information you get from a search engine as opposed to the metasearch engine - sometimes, the metasearch engine cannot provide you with complete results or even complete sentences, so you may be left with illegible texts. On the other hand, metasearch engines can give you so much more information than regular search engines.

3. If the credentials seem legit, based on particular rules as to how to write sources used (such as Chicago style, APA, etc.), then you can safely assume the source is credible. If the author wrote everything necessary in his text (especially works cited/links available), you can usually trust that source.
5 0
3 years ago
Which tab provide text formatting features
kirill [66]

Answer:

Home tab

Explanation:

Assuming that this question is based on providing text formatting features in Microsoft Word, this feature is found on the Home tab in the Font group or the Font dialog box. Some of these formatting features include underline style, colour, strikethrough, superscript, and subscript.

4 0
4 years ago
Can any software run on any processor
jekas [21]

Answer:

Yes.

Explanation:

Your software requires CPU instruction if CPU doesn't provide that instructions the software won't work/run.

hope this helps you

have a great day:)

6 0
3 years ago
Your boss calls you from the road she's trying to connect to the local hotel guest wireless network but there's a yellow shield
tino4ka555 [31]

Hiya!

If there is a yellow shield next to the wireless icon, this indicates that the connection is functioning but is not secured. In this case because she's using the hotel guest wifi, I would tell her to switch to a more secure network or to disregard the error.

Hope this helps!

6 0
4 years ago
Please help me please i’ll give brainli
DaniilM [7]
Answer: a digital bulletin board
4 0
3 years ago
Other questions:
  • Your desktop computer monitor is not displaying a picture. What would you do to troubleshoot the problem?
    9·2 answers
  • WILL GIVE  BRAINLIEST!! WILL REPORT TOO....
    13·1 answer
  • What Are some examples of options you can use for bullets? Check all that apply
    14·1 answer
  • There are six different sequences for the three approval tasks: check inventory; check credit; check special terms.
    5·1 answer
  • I need help with this
    12·1 answer
  • Is a pocket watch consider a computer
    15·1 answer
  • 7.2.6: First Character CodeHS
    9·2 answers
  • Write a code segment that uses a loop to create and place nine labels into a 3-by-3 grid. The text of each label should be its c
    6·1 answer
  • In the program evaluation and review technique (PERT), a delay in ________ will cause the entire project to fall behind. Multipl
    7·1 answer
  • _____ drives are storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power o
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!