1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nonamiya [84]
3 years ago
9

Which two actions allow the System Administrator to limit Chatter access during roll-out to a subset of Salesforce users?

Computers and Technology
1 answer:
Wewaii [24]3 years ago
5 0

Answer:

a. Edit a Profile to "Enable Chatter" for the subset of users.

b. Create a Permission Set with the "Enable Chatter" permission for the subset of users

Explanation:

There are two ways to limit Chatter access during roll-out to a subset of Sales force users

  • through user profiles
  • through permission sets

"Enable Chatter" permission is added to the user profiles and permission sets during Chatter profile based roll-out.

a.

  • The system Administrator has to log in as Sales force administrator to perform this action.
  • Then select Profiles from Setup.
  • Click on Edit for the custom user profile.
  • Tick the Enable Chatter check box in the Administrative Permissions section.

b.

  • Search through the Permission Sets in Setup.
  • System section appears. Select System Permissions in that section.
  • Click on the Edit button .
  • Tick the Enable Chatter check box.
You might be interested in
1.Which of the serves as the basis for determining whether an object has moved or not?
Harrizon [31]

Answer:

1. b

2. c

3. b

4. d

5. a

(hope this helped)

4 0
2 years ago
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
mars1129 [50]
E-text <span>is digital textual information that can be stored, manipulated, and transmitted by electronic devices. The term "e-text" stands for electronic text and it is used for any digital document written, read, transmitted or manipulated by electronic devices, such as smart phones, PCs, tablets,...The origins of the e-text are in the beginning of the Internet.</span>
7 0
3 years ago
Huan wants to enter the science fair at his school. He has a list of ideas for his project. Which questions could be answered th
never [62]

<u>Answer:</u>

<em>Science fair always has experiments which prove science concepts.</em> Students will bring apparatus or an lab items and show experiments as a magic. There are only certain things which a Science can prove and show to other.

<em>From the given question, the following can be proved: </em>

  • <em>Does pressure have an effect on the volume of a gas? </em>
  • <em>Which brand of soap is the best for cleaning grease off dishes? </em>
  • <em>Which laboratory experiment is the most fun to perform?</em>

<em> The below cannot be proved but can be explained </em>

  • <em>Is the information on the periodic table difficult to understand? </em>
  • <em>Which physicist was the smartest?</em>
4 0
3 years ago
Are used in the Excel application to create calculations
OlgaM077 [116]

Answer:

I think the answer is formulas

6 0
3 years ago
Read 2 more answers
A security engineer is configuring a wireless network that must support mutual authentication of the wireless client and the aut
rewona [7]

Answer:C) PEAP(Protected Extensible Authentication Protocol)

Explanation: PEAP(Protected Extensible Authentication Protocol) is the protocol that is used in point-to-point network connection and wireless network connection.It is the version of EAP(Extensible Authentication Protocol) with the advantage of protection to maintain the security.

Other options are incorrect because EAP-FAST is the EAP protocol with that has flexible authentication through secure tunneling, EAP-TLS is the EAP protocol with the transfer layer security and EAP is used for the expansion of authentication method for the network between internet and computer system.Thus, the correct option is option(c).

7 0
2 years ago
Other questions:
  • True False The explicit location always tells you where users are located when they type the query.
    10·2 answers
  • Find the reciprocal of 7/2 × 3/5<br>​
    6·1 answer
  • Comments should be written in what type of language
    6·1 answer
  • A ______ is a computer that controls access to the hardware, software, and other resources on a network. mainframe server workst
    10·1 answer
  • Please give me correct answer<br><br>please give me very short answer​
    13·1 answer
  • In which situation would saving a Word document as a PDF be most useful?
    9·2 answers
  • A location in memory which stores a value, the value can change as the program is running is
    12·1 answer
  • Write a program that inputs numbers and keeps a running sum. When the sum is greater than 100, output the sum as well as the cou
    8·1 answer
  • In Subtractive empathy, the counselor responses gives back less (or distorts) than what the client has said. slightly add someth
    14·1 answer
  • One of 34 possible _________________ can be assigned to each axis of classification in the seven-character code.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!