1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
7

Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus

tomer payment information and will link to the Opportunity. Only those users with access to the Opportunity should be able to see the records on the new object.
Computers and Technology
1 answer:
Artemon [7]3 years ago
4 0

Answer:

The answer is "Creates a profile, that permits master-detail relationship".

Explanation:

This relationship provides the relationship between parent and child when masters describe as a parent and information describes a child by which the main item controls the actions of the object of the detail.  

  • In this relationship, the main object history is destroyed, the detailed object associated with it will also be lost.
  • It lists all related information on the details page of the database, and other choices were wrong which can't be defined in the given senior.
You might be interested in
Jax needs to write a block of code that will organize a list of items alphabetically. Which function should he use? append() pri
rusak2 [61]

In python, the sort() function will alphabetically sort a list of strings

3 0
3 years ago
When was kale discovered?
anyanavicka [17]
Kale was discoverd just 2 years ago ........
8 0
3 years ago
A search engine is aprogram to search......<br>​
coldgirl [10]
Yes it is. Why are you asking?
4 0
3 years ago
It is good practice, however, for policy _________________________ to solicit input both from technically adept information secu
s2008m [1.1K]

Answer:

It is good practice, however, for policy <u>Administrator </u>to solicit input both from technically adept information security experts and from business-focused managers in each community of interest when making revisions to security policies.

<u>Explanation</u>

Administrator is the person who has access to each part of the computer. Ha has rights to revise, add or edit application. The administrator is authorized to make and implement policies that are for the interest of the community.

7 0
3 years ago
The _____ constraint assigns a value to an attribute when a new row is added to a table
bixtya [17]

The default constraint gives a value to an attribute when a new row is added to a table.

<h3>Is default a kind of constraint?</h3>

This is known to be a type of constraint that often apply a value to a column if an INSERT statement does not really give the value for the column.

Therefore, one can say that the default constraint gives a value to an attribute when a new row is added to a table.

Learn more about default constraint from

brainly.com/question/19130806

#SPJ12

5 0
2 years ago
Other questions:
  • A user calls the help line and ask for some help installing a new keyboard. He isn't sure how to plug the keyboard into the comp
    15·1 answer
  • 1. Itemise the order in which BASIC executes arithmetic operation.
    13·1 answer
  • Help what is a computer made from (computer class question)!!
    9·1 answer
  • Write a program whose input is two integers and whose output is the two integers swapped. Ex: If the input is: 3 8 then the outp
    12·1 answer
  • I know how to design it but I’m confused as to how to write a function code based on the info provided.
    10·1 answer
  • The purpose of​ a/an _________ system is to capture best practice solutions and program them into a set of rules in a software p
    13·1 answer
  • Hich of these statements is a value statement?
    14·2 answers
  • The physical layer of the OSI model is not foundational to any of the other layers. True or False
    8·1 answer
  • Which of the following is NOT a reason we use subprograms?
    7·1 answer
  • In order to control access to a company's intranet and other internal networks, all communications pass through a _____ server.
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!