1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
aleksandr82 [10.1K]
4 years ago
8

An Administrator is preparing to deploy change set into the production environment. Until the deployment is complete, only user

with System Administrator profile should be allowed to access data in the production system. When any other user attempts to log in, a maintenance notice should be displayed instead. How can administrator meet this requirement
Computers and Technology
1 answer:
ivann1987 [24]4 years ago
8 0

Answer:

Assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message

Explanation:

Until the deployment is complete, no user other than the user with System administrator profile should be allowed to access data in the production system.

In such a case, the administrator can assign all other users a custom profile with reading access to all objects revoked and add a custom homepage message.

You might be interested in
Which of the following describes how modern operating systems function?: A
sertanlavr [38]

Answer:

Try B

Explanation:

6 0
3 years ago
*explain why computer literacy is vital to access in today’s business work
kkurt [141]

Answer:

Computer literacy is vital to access in today’s business work because of advanced technology which ensured that most companies run a computerized system as against the manual one which was existent in the past.

The use of computerized system enables work to be done faster and in a more accurate manner which is why bring a computer literate is widely embraced in the world today.

8 0
3 years ago
What are the different components of the cloud architecture?
sashaice [31]

Cloud computing architecture can be described as components and subcomponents required for cloud computing. Typically, these components consist of front (fat client, mobile device, thin client) and black end platforms (storage, servers), a cloud based delivery, and a network (Internet, Internet, Cloud). When all of these components are combined, they make up a cloud architecture.

3 0
3 years ago
Abdhbhbhsbfhsbhcvdhcbsdbhsvhgvhdsgvfhsgdvfhgdsvghcghvc
Orlov [11]

Answer:

thats what i like daddy

ohhhh

Explanation:

6 0
4 years ago
Read 2 more answers
I have an android tablet, when I charged it, it was at 23%. I put away my charger and just started playing. My percent didn't go
Irina-Kira [14]
Try resetting the tablet and see what happens. If that doesn't work you can hard reset it (This will remove everything on your device and make it look brand new)
6 0
3 years ago
Other questions:
  • Which statement about word processing software is true? A)You can use it to perform mathematical calculations.B) You can use it
    6·2 answers
  • What is the portrait mode?
    5·2 answers
  • Wired Equivalent Privacy (WEP) is an IEEE 802.11 wireless protocol which provides security algorithms for data confidentiality d
    14·1 answer
  • If you sort by Last Name, Ascending, which of the following last names would come first in the list?
    11·2 answers
  • Does anyone know how to cancel a Pandora Free Trial Subscription? I need to cancel it by tomorrow. Please help!
    12·1 answer
  • In which encryption strategy is the plaintext encrypted one character at a time and each encrypted character depends on that sin
    14·1 answer
  • Guyssss......urgent helppp plsss answerrrr
    5·1 answer
  • In the previous project, you are storing the first name of the gamer. Write a phrase to the game right before the first word wit
    6·1 answer
  • Becca is working on a program that will store data. The program will need quick access to data and data persistence is not impor
    15·1 answer
  • List and describe with details at least three approaches to selecting processes from priority-based multi-level queues.
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!