1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vlada-n [284]
4 years ago
14

What are three considerations when a user is importing data via Data Loader? Choose 3 answers:

Computers and Technology
1 answer:
kondor19780726 [428]4 years ago
7 0

Answer:

a. 3 Importing data Into checkbox fields allows for the use of TRUE/FALSE.

b. E Field-Level Security access determines which fields will be visible.

c. 0 Unrestricted picklists, a new picklist value will be applied but will not be added to the picklist.

Explanation:

The true/false use is definitely allowed while importing data into the checkbox fields. Also field level security decides the fields that will be visible to all, and the restricted picklists, a new picklist value is never set to the default value. However, in case of the unrestricted picklists, a new picklist value is definitely going to be applied however, it will not be added to the picklist. And there is no option to stop the validation rules from executing while importing the data. Hence, the above answer.

You might be interested in
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's dev
Mamont248 [21]

Answer: A. CRYPTO-MALWARE

Explanation: Crypto-malware is a type of ransomware that blocks the uses from accessing the computer system,it also encripts all the files.

This type of ransomware is mainly used to demand for ransom.

This type of ransomware which makes use of sophisticated and advanced ransomware technology to ensure that encripting must be with a unique Key or password,the hijacked system is used for crypto mining without the owns consent.

7 0
3 years ago
Read 2 more answers
During slide show mode, hitting the B key will do which of these things?
tia_tia [17]

Answer:

move to the first page?

6 0
4 years ago
Read 2 more answers
A network administrator notices that some newly installed Ethernet cabling is carrying corrupt and distorted data signals. The n
OleMash [197]

Answer: EMI(Electromagnetic interference)

               RFI(Radio frequency interference)

Explanation: Electromagnetic interference is the emission of the electromagnetic signal that can disturb the working of the other device.It invokes the disturbance that can create error, under-performance mechanism,distortion etc in the equipment.

Radio-frequency interference(RFI) is the radio-frequency signal that interferes the other device by creating noise and distortion. This leads to breaking of the operation and data error.

Other options are incorrect because cross talk is referred as undesired communication between signal ,attenuation is the degradation in the  amplitude of any signal and extended length of cabling is increasing the length of the cable.Thus the correct answer is RFI and EMI.

4 0
4 years ago
You are running Windows 8 on your laptop. You install a 64-bit application on it. Where will this application reside on your com
melamori03 [73]
In the Program Files folder.
6 0
3 years ago
Read 2 more answers
Which action best describes a branch in a computer program
weeeeeb [17]
<span>This would be a jump to a line number that is non sequential. This is the best way to describe this process. </span>
3 0
3 years ago
Other questions:
  • If a disk drive has 8 surfaces and there are 1024 tracks per surface with 256 sectors per track and 512 bytes/sector. What is th
    9·1 answer
  • Nonverbal communication relies on _________________. a. multiple channels b. continuous feedback c. ambiguous interpretation d.
    9·1 answer
  • One of the most toxic components of a computer is the
    11·1 answer
  • The economist George gilder argued that
    6·1 answer
  • Which osi layer defines the functions of logical network-wide addressing and routing?
    14·1 answer
  • Help please and thank you
    11·1 answer
  • Pleaseeeeeeee tellllllllllllllllllllll​
    8·1 answer
  • Vẽ sơ đồ lắp đặt gồm 2 cầu chì, 1 ổ điện, 2 cực điều khiển 2 đèn mắc song song
    9·1 answer
  • Canada’s energy plan, named __________, makes three governmental agencies accountable for safeguarding Canada’s environment.
    5·1 answer
  • Compare the strengths and limitations of modern computer programming <br> languages.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!