1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ghella [55]
3 years ago
10

What options does the business user have to manually share individual records? A new custom object is being created with a priva

te sharing setting. The business wants to share individual records with specific people or group of people on a case by case basis.
A. Public groups
B. Permission sets
C. Roles
D. Profiles
Computers and Technology
1 answer:
lutik1710 [3]3 years ago
6 0

<em>The answer is C. </em>

<em>The business user or admin must set rules or permission per user or user groups that would allow him to decide how each user or group would use the shared folder or records. One user or group can just view the record, other may have access on it and can edit the files. </em>

You might be interested in
Suppose end system A wants to send a large file to end system B. At a very high level, describe how end system A creates packets
sashaice [31]

Answer:

The answer is below

Explanation:

Suppose end system A wants to send a large file to end system B, the large file is first divided into smaller chunks. Each chunk is then assigned a header forming a packet. Multiple packets are being generated with each of the packet containing a unique destination address in its header.

When a packet arrives at the packet switch, the switch uses the unique destination address that is attached in the header of the packet to determine the link onto which the packet is to be forwarded.

5 0
3 years ago
Neil holds a discussion session with his clients. He recommends the kinds of network topologies the clients should consider, acc
mash [69]

Answer:

Neil should recommend to this client a star network.

Explanation:

A star network is a computer network where every host is connected to a central hub, switch, or computer.

Main advantage of a star network is that one corruption (unless it is central hub) doesn't affect the rest of the network, and it's easy to modify.

The star network is one of the most common computer network setups

6 0
3 years ago
Which of the following statements is false? A constructor is similar to a method but is called implicitly by the new operator to
Volgvan

COMPLETE QUESTION:

Which of the following statements is false?

A) A constructor is similar to a method but is called implicitly by the new operator to initialize an object's instance variables at the time the object is created.

B0 Scanner method next reads characters until any white-space character is encountered, then returns the characters as a String.

C)A class instance creation expression begins with keyword new and creates a new object.

D) To call a method of an object, follow the object name with a comma, the method name and a set of parentheses containing the method's arguments.

Answer:

D) To call a method of an object, follow the object name with a comma, the method name and a set of parentheses containing the method's arguments.

Explanation:

To call a method, the name of the object is not followed by a comma (,) but with a dot (.) operator, the method's name and a set of parentheses containing the method's arguments, then follows.

4 0
3 years ago
Which of the following button should always be included when designing a navigation pictures escape contact FAQ
evablogger [386]

Answer: Escape

Explanation: Exiting/Escaping current state within navigation is the universally needed action. Navigation menus can be complex and are hierarchical in nature. Users make mistakes and the only remedy is an escape function.

4 0
4 years ago
Read 2 more answers
_______________ bytes of storage are needed to represent the name "sarah." two three five ten
Sholpan [36]
The answer is five...
4 0
3 years ago
Other questions:
  • You’re responsible for an always-on VPN connection for your company and have been told that it must utilize the most secure mode
    12·1 answer
  • Data bars describe a graphic element that
    9·2 answers
  • PDA is an acronym for professional digital aid. <br><br> True <br><br> False
    10·1 answer
  • To which built-in object does the function sin(x) belong?
    12·1 answer
  • What information and options can be found on the File tab?
    8·1 answer
  • CAN YOU PLEASE HELP WITH THIS DUE IN 10 MINUTES
    8·1 answer
  • Hey im b---o---r---e---d dont report cuz if u do ur l a m e :)
    14·1 answer
  • Match each item with a statement below. - Uses two keys: one to encrypt data and one to decrypt data - Encryption algorithm used
    9·1 answer
  • B. Directions: Fill in the blanks with the correct answer.
    13·1 answer
  • During an election year, why would a senator want to determine a mode?
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!