1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
astra-53 [7]
3 years ago
8

A developer working on a time management application wants to make total hours for each timecard available to application users.

A timecard entry has a Master-Detail relationship to a timecard. Which approach should the developer use to accomplish this declaratively?
(A) A roll-up Summary field on the Timecard Object that calculates the total hours fromtimecard entries for that timecard
(B) A process builder process that updates a field on the timecard when a timecard entry iscreated
(C) An apex trigger that sues an aggregate query to calculate the hours for a given timecard andstores it in a custom field.
(D) A visualforce page that calculates the total number of hours for a timecard and displays it onthe page.
Computers and Technology
1 answer:
Llana [10]3 years ago
3 0

Answer:

The correct option to the following question is A.) .

Explanation:

A Timecard is an application which is used for recording the times the user is working and it is an application for record the time upon logging in to the Web Timesheet, a user punches out and into the mark time they stop and start the works, along with the any comment they choose to enter.

You might be interested in
Stella is surfing the Internet to look for affordable apartments in New York City. Every time she clicks on a link to a webpage,
alexgriva [62]

rich media Web advertisement, These can easily be prevented by downloading https://chrome.google.com/webstore/detail/adblock-plus-free-ad-bloc/cfhdojbkjhnklbpkdaibdccddilifddb?hl=en-US   My personal favorite

7 0
3 years ago
What is a independent variable
katovenus [111]
An independent variable is many things. In math, it is the x axis or something that doesn't depend on anything else, like time. But in an experiment it's the thing that you have control over and can change to see how it effects your results. Hope this helped!
7 0
3 years ago
What is the local portion of the e-mail address below? <a href="/cdn-cgi/l/email-protection" class="__cf_email__" data-cfemail="
abruzzese [7]

Every email address is something like this ...  <u>[email protected]</u>

the name after the @ symbol is a domain name that represents the administrative realm for the mail box and the part before the @symbol identifies the name of the mailbox.

<u>twrigley(local portion)</u>@   gumchewer.biz(domain)

twrigley is the local portion  which indicates to the mail server which mailbox the message is from or to.This portion is only important to gumchewer mail server which is why it is called local.


6 0
3 years ago
The approved detail design resulting from the __________ serves as a basis for making the decision to begin production.
natita [175]
I am pretty sure, that complete answer looks like this: The approved detail design resulting from the <span>Critical Design Review</span> serves as a basis for making the decision to begin production. Critical Design Review is needed to ensure that system can meet stated performance including costs and risks.
8 0
3 years ago
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user
sergeinik [125]
<h2>A <u>Rogue attack</u> utilizes software just to attempt hundreds of frequent phrases in a row.</h2>

  • Rogue access equipment would be any WLAN radio channel that isn't even authorized to communicate or join the corporate connection.
  • Whenever they have been misconfigured as well as set up without authentication, it creates a new security vulnerability potentially gaining simple access to a private network.

Thus the response above is correct.

Learn more about software attacks here:

brainly.com/question/25407509

7 0
3 years ago
Read 2 more answers
Other questions:
  • The ___ is the primary storage device of a personal computer. hard drive RAM ROM compact disc
    6·1 answer
  • Sam has installed a new CPU in a client’s computer, but nothing happens when he pushes the power button on the case. The LED on
    14·1 answer
  • Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
    7·1 answer
  • A ____ is a collection of computers and users that are identified by a common security database. workgroup controller segment do
    7·1 answer
  • 1 Explain the difference between using a computer program and programming a computer.
    12·1 answer
  • Assuming that t is an array and tPtr is a pointer to that array, which expression refers to the address of element 3 of the arra
    7·1 answer
  • e do loop differs from the while loop in that a. the while loop will always execute the body of the loop at least once b. the do
    9·1 answer
  • The information stored in the _____ is used by the DBMS for a recovery requirement triggered by a ROLLBACK statement, a program'
    7·1 answer
  • Write a formula that would return a TRUE result if the sum of the first five numbers in a column of data are negative
    7·1 answer
  • How do people and computers approach problems differently
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!