1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
9

A company wants a recruiting app that models candidates and interviews; displays the total number of interviews on each candidat

e record; and defines security on interview records that is independent from the security on candidate records. What would a developer do to accomplish this task? Choose 2 answers
a. Create a roll -up summary field on the Candidate object that counts Interview records.

b. Create a master -detail relationship between the Candidate and Interview objects.

c. Create a lookup relationship between the Candidate and Interview objects.

d. Create a trigger on the Interview object that updates a field on the Candidate object.
Computers and Technology
1 answer:
S_A_V [24]3 years ago
3 0

Answer:

c. Create a lookup relationship between the Candidate and Interview objects.

d. Create a trigger on the Interview object that updates a field on the Candidate object.

Explanation:

Objects relationships is considered a form of field type that joins two or more objects together such that, after understanding objects and fields, it creates some form of bonding known as object relationships. This helps define security on interview records that is independent from the security on candidate records.

For an example, in a standard object like Account, where a sales representative opens an account, and has had interviews or chats with a few people at that account’s company, and as well made contacts with the likes of executives or IT managers and still stored those contacts’ information in salesforce.

Hence, what would a developer do to accomplish this task is to:

1. Create a lookup relationship between the Candidate and Interview objects.

2. Create a trigger on the Interview object that updates a field on the Candidate object.

You might be interested in
How to unlock your iphone when you forgot the password?.
Lena [83]

Answer:

go to customer service

Explanation:

5 0
2 years ago
What color is excel?​
Eduardwww [97]

Answer:

green

Explanation:

5 0
3 years ago
Read 2 more answers
What type of lens was used to take this picture?
Leona [35]

Fish-eye because this is how you would see through a "fish eye" point of view in a rounded tank that is commonly used.

May I please have brainliest

4 0
3 years ago
Given two 3x3 arrays of integer, x1 and x2, write the code needed to copy every value from x1 to its corresponding element in x2
Reika [66]

Answer:

#include<iostream>

#include<iomanip>

using namespacestd;

int main ()

{

int x1[3][3]={1,2,3,4,5,6,7,8,9};

int x2[3][3];

int i,j;

for(i=0;i<3;i++)

for(j=0;j<3;j++)

x2[i][j] = x1[i][j];

cout<<"copy from x1 to x2 , x2 is :";

for(i=0;i<3;i++)

for(j=0;j<3;j++)

cout<<x2[i][j]<<" ";

cout<<endl;

system("pause");

return 0;

}

/* Sample output

copy from x1 to x2 , x2 is :1 2 3 4 5 6 7 8 9

Press any key to continue . . .

*/

Explanation:

5 0
3 years ago
Which best describes a paraphrase?
Anna11 [10]
To rewrite something , but in your own words
4 0
3 years ago
Other questions:
  • Suppose a MATV/SMATV (Satellite Master Antenna Television) firm has to start it's operation in the metropolitan area of a countr
    12·1 answer
  • Write a program that allows two players to play a game of tic-tac-toe. Use a two dimensional char array with three rows and thre
    7·1 answer
  • Courses that enable students to begin jobs that require course completion certificates are know as
    8·1 answer
  • Mention two strategies of collecting data​
    13·1 answer
  • Ryan would like to copy a list of contacts from a colleague into his personal address book. The list of contacts is
    9·1 answer
  • Recently, a serious security breach occurred in your organization. An attacker was able to log in to the internal network and st
    11·1 answer
  • BRAINLEST AND 20 POINTS! Most GUls provide all of the following except
    6·2 answers
  • Write a Python program which asks a user for a word and performs letters manipulation. If the word is empty, the program should
    6·1 answer
  • Which example illustrates the idea of "collecting data"?
    8·2 answers
  • A(n) ________ address is the address that external entities use when communicating with your network.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!