1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
7

Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus

tomer payment information and will link to the Opportunity. Only those users with access to the Opportunity should be able to see the records on the new object.
Computers and Technology
1 answer:
Artemon [7]3 years ago
4 0

Answer:

The answer is "Creates a profile, that permits master-detail relationship".

Explanation:

This relationship provides the relationship between parent and child when masters describe as a parent and information describes a child by which the main item controls the actions of the object of the detail.  

  • In this relationship, the main object history is destroyed, the detailed object associated with it will also be lost.
  • It lists all related information on the details page of the database, and other choices were wrong which can't be defined in the given senior.
You might be interested in
Danny is editing the text content of a single page on a website he created a year ago. What part of the tag would he have to upd
Verdich [7]
<h2>"<lastmod>" is the right choice for the given scenario</h2>

Explanation:

<update> This tag does not belong to <URL> tag of the site map. Hence this option goes invalid.

<lastmod> This gives details of the date and time when the website content was changed. It will be in "W3C Date time format". This may omit time at times. This is the write answer.

<loc> This contains the URL of the web page.

<changefreq>: How frequently the "web page is likely to get modified". The  values which it accepts are: "monthly, always , daily , weekly ,hourly, yearly , never"

5 0
3 years ago
When Creating a game ( Which I Am, FPS ofc ) what are the basic rules would you want to add
Gnesinka [82]

Answer:

2 ig

Explanation:

5 0
3 years ago
Write a public static method called getPIDs that has a parameter of type Map called nameToPID (keys are student names and values
Rasek [7]

Answer:

Java program is explained below

Explanation:

import java.util.HashSet;

import java.util.Map;

import java.util.TreeMap;

public class TruckRace1 {

   public static HashSet<String> getPIDs (Map<String,String>nameToPID ){

       HashSet<String> pidSet = new HashSet<>();

       for(String ids: nameToPID.values()){

           pidSet.add(ids);

       }

       return pidSet;

   }

   public static void main(String[] args) {

       Map<String,String> pids = new TreeMap<>();

       pids.put("John","123");

       pids.put("Jason","124");

       pids.put("Peter","125");

       pids.put("Alice","126");

       pids.put("Peny","129");

       HashSet<String> ids = getPIDs(pids);

       for(String id:ids){

           System.out.println(id);

       }

   }

}

4 0
3 years ago
The height of a small rocket y can be calculated as a function of time after blastoff with the following piecewise function: y 5
SOVA2 [1]

Answer:

High level Language

understand

Explanation:

rocket is 0...4433456u888

5 0
2 years ago
List the seven basic internal components found in a computer tower
egoroff_w [7]
1. Motherboard (you plug all other components to it)
2. Processor (CPU)
3. Memory (RAM)
4. Graphics card
5. Sound card (sometimes integrated with motherboard)
6. Hard Disk Drive (HDD)
7. Power supply unit
6 0
3 years ago
Read 2 more answers
Other questions:
  • When does a kernel panic occur?
    12·2 answers
  • Suppose you send data to the 11111111 11111111 11111111 11111111 ip address on an ipv4 network. to which device(s) are you trans
    15·1 answer
  • Define a function CoordTransform() that transforms its first two input parameters xVal and yVal into two output parameters xValN
    6·2 answers
  • I can create spreadsheets in Google Draw. False True
    14·2 answers
  • Vitamins and minerals dissolve easily in water.True or false?
    5·1 answer
  • During the forensic phase of a security investigation, it was discovered that an attacker was able to find private keys on a poo
    9·1 answer
  • One key to success in a career is to be an accomplished
    15·1 answer
  • The repeated use of electronic communications, such as chat rooms and email, to seek out, harass, or frighten someone is called
    12·1 answer
  • Examples of pop in computer​
    14·1 answer
  • A) Calculate the checksum of following 2 bytes: 00110101 and 10101100, and fill in the blank:
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!