1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
FromTheMoon [43]
3 years ago
12

Sales representatives want to capture custom feedback record details related to each Account. The sales reps want to accomplish

this with minimal clicks on the Salesforce1 mobile application Which two solutions should be recommended in order to meet this requirement
A. Create predefined values for most of the fields.
B. Create a global action on Account.
C. Create a feedback object as a parent of Account
D. Create an object-specific action on Account.
Computers and Technology
1 answer:
Tomtit [17]3 years ago
3 0

Answer:

Create predefined values for most of the fields.

Create an object-specific action on Account

Explanation:

The sales reps would need to create predefined values for most of the fields, or they can create an object-specific action on account. In doing this, the sales reps will capture custom feedback record details related to each account and will accomplish this with minimal clicks on the Salesforce1 mobile app.

You might be interested in
Who like anime becus i dooooo ( wrote this becuse i forgot what i was writing abot)
mars1129 [50]

Answer:

My bestie loves Animes...... I don't watch anime But good at drawing anime(◠‿◕)

4 0
3 years ago
Computer crimes are a big concern since the creation of innovative technological advances; which is/are examples of computer cri
Natali [406]

Answer:

The answer is E: All of the above

Explanation:

All of the above scenarios are examples of serious computer crimes. They are crimes that exist in the offline world but take place online. Sexual predators, for instance, mostly take advantage of the anonymity provided by the internet. They often target dating sites and find suitable victims. Cyber bullying and Cyber stalking are just as harmful as any other computer crime. Industrial Espionage may also somehow fall into this category. Less frequently, criminals may steal documents and computer files or more often, illegally gain access to company’s trade secrets on computers and servers.

3 0
3 years ago
Read 2 more answers
PLEASE HELP ASAP!!!!111 Read "Teenagers are rewriting the rules of the news" (find it somewhere and answer questions below)
Ilya [14]

Answer:

Sorry, we picked up your question late. There are a lot of questions, and every now and then some misses out. And I am sure you will understand. However, the cool thing is your answers are correct. I read the complete article on young adults or teenagers and found the same. And I am sure you will agree with the facts, and use its best meaning in your own life. I am, however, listing below all the answers for your complete satisfaction. And I congratulate you, you are up with the correct list of answers.

The answer to the First question is:

B. the description of how influencers follow young social media users"

Second question answer is

C. Andrew Yang

And the third question answer is:

C. Teens and young adults consume and spread news information through social media.

And I am sure you must have liked this article. Article reading is a good habit. You should always start a day by reading one article online or in newspaper.

Explanation:

Please check the answer section.+

4 0
3 years ago
Lập trình web truy vấn csdl và hienr thị ra màn hình danh sách các bản ghi
almond37 [142]

Answer:

ExplanatOverfishing occurs "when more fish are caught than the population can replace through natural reproduction," according to the World Wildlife . Once this occurs, the species is no longer "sustainable." Eighty-seven percent of all the world's fish stocks that we know about are at the "breaking point," according to the Environmental Defense Fund (EDF).

ion:

3 0
3 years ago
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
DIA [1.3K]
Configure terminal because Commands in this mode are written to the running configuration file as soon as you enter them (using the Enter key/Carriage Return). After you enter the configure terminal command, the system prompt changes from switch# to switch(config)#, indicating that the switch is in configuration mode.
7 0
3 years ago
Other questions:
  • "a router interface has been assigned an ip address of 172.16.192.166 with a mask of 255.255.255.252. to which subnet does the i
    5·1 answer
  • what important technology has done the most to allow small businesses a change to compete with larger international companies?
    5·1 answer
  • tion. 6. A step occasionally required to repair damaged relationships is O A. looking at the problem from the other person's poi
    14·1 answer
  • Public class Car {
    15·1 answer
  • Where does microsoft word put elements such as text, logos, or graphics saved for later use in a document?
    15·1 answer
  • Write a pseudocode that will take marks of physics, chemistry and math as input, calculates the average and displays output.
    7·2 answers
  • In a client/server architecture, an optional _____ is sometimes used to pass bulk information to the server. a. request line b.
    8·1 answer
  • M f2.app.edmentum.com
    5·1 answer
  • For which purpose is RAM used?
    7·2 answers
  • What will happen when you drag and drop a worksheet tab into another workbook WITHOUT holding the Ctrl key down?
    13·2 answers
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!