1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
yanalaym [24]
3 years ago
14

How can a System Administrator quickly determine which user profiles, page layouts, and record types include certain fields? Uni

versal Containers wants to store Payment Term Details on the Account Object, but the fields should only be visible on certain record types and for certain user profiles.
A. Use the Field Accessibility Viewer for the fields in question
B. Universally require the field at the field level
C. Log in as each user profile and view the Account Page Layouts
D. Click the Field-Level Security for the field on each profile
Computers and Technology
1 answer:
VLD [36.1K]3 years ago
3 0
It seems to be C I hope I helped
You might be interested in
During which geologic era was nearly all of Earth's land concentrated into one giant mass called Pangaea?
Scorpion4ik [409]
The answer would be Mesozoic.
HOPE THIS HELPS YOU! ^_^
6 0
3 years ago
Implement a sublinear running time complexity recursive function in Java public static long exponentiation (long x, int n) to ca
Charra [1.4K]

Answer:

Following are the code block in the Java Programming Language.

//define recursive function

public static long exponentiation(long x, int n) {

//check the integer variable is equal to the 0.

if (x == 0) {

//then, return 1

return 1;

}

//Otherwise, set else

else {

//set long data type variable

long q = exponentiation(x, n/2);

q *= q;

//check if the remainder is 1

if (n % 2 == 1) {

q *= x;

}

//return the variable

return q;

}

}

Explanation:

<u>Following are the description of the code block</u>.

  • Firstly, we define the long data type recursive function.
  • Then, set the if conditional statement and return the value 1.
  • Otherwise, set the long data type variable 'q' that sore the output of the recursive function.
  • Set the if conditional statement and check that the remainder is 1 and return the variable 'q'.
4 0
2 years ago
In case of a suspected data breach, what course of action should a chief information security officer (CISO) take
guapka [62]

Answer

1. Assemble his team

2. Find reason for breach

3. Evaluate what was lost

4. Ensure password change

Explanation:

In case of a suspected breach, the Chief information security officer should first of all assemble his incidence response team. This team should have representatives from all areas of the organization.

Then the reason for the breach and how access was gained has to be found out. An evaluation of what has been lost in the breach would be carried out and it's likely impact on the company.

In case credentials were stolen the CISO has to ensure that the employees change passwords. Also he has to notify all the necessary parties about the breach.

The CISO has to ensure that all employees are trained properly on security and they comply to security policies.

7 0
3 years ago
Carrie is looking at the Form Properties Sheet. Which tab will control how the data is displayed and the data source it is bound
Lemur [1.5K]
The Answer is: Data


Hope this help
8 0
2 years ago
Distinguish between overloading and overiding in c++​
kari74 [83]

Answer:

When overloading, you define the <u>same</u> class function multiple times, each with different arguments. When overriding, you give a <u>new implementation</u> in a subclass for a virtual function defined in a base class.

Explanation:

The answer <em>is</em> the explanation.

4 0
2 years ago
Other questions:
  • Given positive integer numInsects, write a while loop that prints that number doubled without reaching 200. Follow each number w
    8·1 answer
  • in c Write a program that reads an integer, a list of words, and a character. The integer signifies how many words are in the li
    14·1 answer
  • Explain the third <br> generation
    6·1 answer
  • Hunter took his sick puppy to Jade to get medication. Jade is
    14·2 answers
  • The ability of services to grow or shrink based on need is called __________.
    14·1 answer
  • IT investments can lead to developing IT capabilities and dynamic IT competencies, which can lead to achieving the following six
    5·1 answer
  • Complete the following table.
    6·1 answer
  • I made Pico with a Ray Gun (Next is Dad/Tankman)<br><br> Opinons?
    11·2 answers
  • How does calculate() work?
    6·2 answers
  • People’s personal information is collected _____. Select 4 options.
    7·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!