1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Leto [7]
3 years ago
10

Universal Containers (UC) uses a custom object called Vendor. The Vendor custom object has a Master-Detail relationship with the

standard Account object. Based on some internal discussions, the UC administrator tried to change the Master-Detail relationship to a Lookup relationship but was not able to do so. What is a possible reason that this change was not permitted
Computers and Technology
1 answer:
Rudik [331]3 years ago
4 0

Answer:

The account record comprises of Invoice roll up summary fields.

Explanation:

The possible reason that this change was not permitted was that the account record comprises of Invoice roll up summary fields.

Invoice roll up summary fields: A roll-up summary field computes values from associated records, for example those in a linked list. a person or someone ca design a roll-up summary field to show a value in a master record by building  the values of fields in a particular record.

The detail record must be associated to the master through a master-detail relationship. for instance, you want to show the sum of invoice amounts for all linked custom object records in an account’s Invoices related list. you can show the whole or sum in a custom account field refereed to as Total Invoice Amount.

You might be interested in
Which function of InfoSec management encompasses security personnel as well as aspects of the SETA program?
inessss [21]

Answer:

People

Explanation:

Information security management provides a description of the controls needed by an organization in order to ensure that it is capable of protecting the integrity, availability, and confidentiality of assets from security vulnerability and threats. On the other hand, the SETA program is three phased and ensures that organizations address and implement training and techniques for information security. Hence the only function that encompasses security personnel as well as aspects of the SETA program is the People function.

8 0
4 years ago
A router has just received the following new IP addresses: 88.62.108.0/21, 88.62.116.0/21, 88.62.120.0/21 and 88.62.128.0/21. If
Natali [406]

Answer:

Yes, they can be aggregated into a single network address of 88.62.0.0/16

Explanation:

Since they all will be using the same outgoing interface so they can be grouped according to next hop which appears to be the same for all four IP address.

First convert all the network addresses into binary.

DECIMAL                      BINARY                                                      CLASS OF IP

88.62.108.0/21            01011000.00111110.01101100.00000000      Class A

88.62.116.0/21             01011000.00111110.01110100.00000000     Class A

88.62.120.0/21            01011000.00111110.01111000.00000000     Class A

88.62.128.0/21           01011000.00111110.10000000.00000000    class A

Looking at the binary form of the address from left to right it can be observed that all for address are identical in the first two octet, that is up to the 16th digit.

So the new subnet mask will be /16, using any of the four address and the /16 mask will can obtain the new network address

All four address can be summarized as 88.62.0.0/16

4 0
3 years ago
Write the code to declare a variable to hold the value of the grade you hope to get in this class. What stdio.h input function w
GREYUIT [131]

Answer:

// code to read grade

#include <stdio.h>

// main function

int main(void) {

   // if grade is character

char grade;

// if grade is numeric then we can use int or double

// int grade;

// double grade;

printf("Enter your grade:");

// read grade from user

scanf("%c",&grade);

// print grade

printf("your grade is:%c",grade);

return 0;

}

Explanation:

To read a value, scanf() function is used from stdio.h.Read a grade from user and assign it to variable "grade".

Output:

Enter your grade:A

your grade is:A

// code to read die volt

#include <stdio.h>

// main function

int main(void) {

// variable

double die_volt;

printf("Enter die volt:");

// read die volt from user

scanf("%lf",&die_volt);

// print die volt

printf("Entered die volt is:%0.2lf",die_volt);

return 0;

}

Explanation:

Read the die volt from user and assign it to variable "die_volt" with the help

of scanf() function.

Output:

Enter die volt:220                                                                                                        

Entered die volt is:220.00

4 0
3 years ago
The Appliance Warehouse case study is designed to practice systems analysis and design skills using a life-like scenario. Applia
nikdorinn [45]

Answer:

A service department that I would create for a product from Appliance Warehouse is:

The washing machines service department.

Explanation:

Appliance Warehouse is one of the most important if not the most important washer and drying machine leasing company. So, they require a very good service department for them. Thus, I would develop one very innovative service department with an online application that would allow performing this job with an outsourcing labor force making it cheaper or us. The recruitment would be based on the different washing machine brands certification as a service and repair provider technician. We would also select them based on consumer service orientation and will create a database on the platform. This platform would be categorized by county, let us offer it for our selected local service outsource technicians. We would make an agreement with them for the database in the form of a services contract that would set a diagnosis and a services fee. We would also have an inventory of machine parts and we would only charge 20% of the cost of the services. We would establish the fee and we would also sell the costumer the fee for the parts used to fix the machines.  

6 0
3 years ago
What are face shields intended to protect you from? (select best answer?
aivan3 [116]
Well it determends if there wearing them for sports or for fighting 
if it is for sports then they are protected from balls and such
if it is for fighting then they are protected from bullets arrows and anything else you could think of
they are used to shield your face
8 0
3 years ago
Read 2 more answers
Other questions:
  • What happens to the data in rom when the power is turned off?
    10·1 answer
  • Which data type stores images and audio visual clips?
    9·2 answers
  • Your project must satisfy the following requirements:
    7·1 answer
  • The term median means
    9·2 answers
  • A computer programme that tells the computer how to perform particular tasks
    8·1 answer
  • What kind of storage is an internet service that provides storage to computer users?
    12·1 answer
  • You want to substitute one word with another throughout your document. What tool(s) should you use?
    9·1 answer
  • During the preventive maintenance phase of a project involving a hydraulic power system, an engineer must change a gasket on a p
    14·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
  • This program will output a right triangle based on user specified height triangleHeight and symbol triangleChar. It is strongly
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!