1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Lana71 [14]
3 years ago
6

A company wants a recruiting app that models candidates and interviews; displays the total number of interviews each candidate r

ecord; and defines security on interview records that is independent from the security on candidates records. What would a developer do to accomplish this task?
Computers and Technology
1 answer:
dmitriy555 [2]3 years ago
3 0

Answer:

Create a lookup relationship between the Candidate and Interview objects.

Create a trigger on the Interview object that updates a field on the Candidate object.

Explanation:

You might be interested in
Which command is used to encrypt all passwords in a router configuration file?
Veseljchak [2.6K]

Answer:

Service Password encryption

Explanation:

It is noted that the command used on routers, to get the data of all the passwords in a router configuration file encrypted is the service password encryption.

Service password encryption solely affects plain text passwords types that includes that of the line passwords or that of the enable password. The feature uses a simple substitution method to create a "secure" non-text password displayed in the configuration.

8 0
3 years ago
What medical equipment do they have in Jr. high, To help save peoples lives?
lawyer [7]

Vital signs monitors, Electronic Medical Records (EMR), and Medication Management Systems.

5 0
3 years ago
Match the following terms and definitions.
vovikov84 [41]

Answer:

1. Spaghetti code.

2. Business process management.

3. Procure-to-pay

4. Order-to-cash

5. User tier

6. Firewall

7. Database tier

8.Application tier

9. Three-tier architecture

Explanation:

1.Programming code used to connect stand-alone systems is spaghetti code.

2. Transforming business processes to improve efficiency business process management.

3. Corresponds to the purchasing cycle is called procure to pay.

4. Corresponds to the sales cycle is order-to-cash

5. Consists of front-end client computers and the user interface is user tier.

6. Software programs on a router that monitor network traffic is firewall

7. Comprised of a centralized relational database and an RDBMS is database tier.

8. Consists of servers and application software is application tier.

9. When an enterprise system uses layers of IT components: enterprise database, application, and client computers is three tier architecture.

4 0
3 years ago
Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string
grigory [225]

Answer:

def my_compare(str1, str2):

   mylist = sorted([str1, str2])

   if str1 == str2:

       return 0

   elif str1 == mylist[0]:

       return -1

   elif str1 == mylist[1]:

       return 1

def is_char_in(string, char):

   if char in string:

       return True

   return False

def is_char_not_in(string, char):

   if char not in string:

       return True

   return False

def my_count(string, char):

   return string.count(char)

def my_endswith(string, char):

   return string.endswith(char)

def my_find(string, char):

   if char in string:

       return string.index(char)

   else:

       return -1

def my_replace(string, char1, char2):

   lst = [i for i in string]

   print(lst)

   for i, v in enumerate(lst):

       if v==char1:

           lst[i] = char2

   return "".join(lst)

Explanation:

Above are defined functions similar to the string built-in functions in python. To use them, type in the function name and pass in the required arguments. Save the file name as "string_functions" with a ".py" file extension and use the functions in other files by importing all the function as "import string_functions" or import individual functions with "from string_function import 'function_name' ".

5 0
3 years ago
5.6 Look carefully at how messages and mailboxes are represented in the email system that you use. Model the object classes that
Annette [7]

Answer:

See explaination for the details of the answer.

Explanation:

A class is a structured diagram that describes the structure of the system.

It consists of class name, attributes, methods and responsibilities.

A mailbox and an email message has some certain attributes such as, compose, reply, draft, inbox, etc.

See attachment for the Model object classes that might be used in the system implementation to represent a mailbox and an email message.

5 0
3 years ago
Other questions:
  • The following function open_file() opens a file called 'example.txt' and returns the file pointer. This function is called withi
    12·1 answer
  • I want to message someone on Brainly but it wont let me. How many questions do I need to answer before I could message?
    12·2 answers
  • How many generations of computer languages
    10·1 answer
  • This LEGENDARY character made a much-celebrated comeback in 2017. What was the name of the villain he faced in this epic tale?
    7·2 answers
  • What are three to five (3-5) key differences and features in Windows Server 2016 versus 2012?
    14·1 answer
  • A large company has a LAN. The manager of the company wants to change it to a WAN
    10·1 answer
  • Is this very epik or not?
    9·2 answers
  • Write a program to find all integer solutions to the equation 4x + 3y -9z = 5 for values of x, y, and z between 0 to 100.
    11·1 answer
  • What does an arrow after a command indicate
    13·2 answers
  • Which step do you think is most useful from big data life cycle and why?
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!