1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
4 years ago
7

Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus

tomer payment information and will link to the Opportunity. Only those users with access to the Opportunity should be able to see the records on the new object.
Computers and Technology
1 answer:
Artemon [7]4 years ago
4 0

Answer:

The answer is "Creates a profile, that permits master-detail relationship".

Explanation:

This relationship provides the relationship between parent and child when masters describe as a parent and information describes a child by which the main item controls the actions of the object of the detail.  

  • In this relationship, the main object history is destroyed, the detailed object associated with it will also be lost.
  • It lists all related information on the details page of the database, and other choices were wrong which can't be defined in the given senior.
You might be interested in
The _ are the devices that allow a computer system to communicate and interact with the outside world as well as store informati
padilas [110]

Answer:

I think the answer is the central processing unit. Hope it helps!!!!!

5 0
4 years ago
Which of the following is necessary to connect a computer outside of the hospital to the hospital's server?
dybincka [34]

Answer:

The answer is "Option C"

Explanation:

VPN reflects virtual private networking, providing secure networking and strong links between private networks. It helps us to use remote machines, that are like on the same local site, and we use VPN to reach the hospital website. And other choices which could be listed as follows that is not correct:

  • In option A, WAN represents a wide area network, it's used to connect computers through networking, that's why it's not correct.
  • In option B, LAN stands for local area network, it shares a common line or wireless links for communication, that's why it is not correct.
  • In option D, FOV stands for field of view that is used for gaming purposes, that's why it is not correct.
7 0
4 years ago
This rlly isnt a question but give me some movies to watch or netflix movies/shows to watch
katovenus [111]
White chicks is a good one
5 0
3 years ago
Read 2 more answers
Helen has no experience in security. She would like to earn a certification that demonstrates that she has the basic knowledge n
rewona [7]

Answer:

Option C. Security+ is the correct answer.

Explanation:

8 0
3 years ago
Http://moomoo.io/?server=8:16:0
love history [14]

Explanation:

noooooooooooooooooooooooooooooooooo

5 0
3 years ago
Read 2 more answers
Other questions:
  • You work for a large enterprise company that handles time-sensitive information. Your supervisor has asked that you set up a con
    8·1 answer
  • What microsoft operating systems started the process of authenticating using password and username
    14·1 answer
  • You’ve received a tarball called data79.tar from a colleague, but you want to check the names of the files it contains before ex
    15·1 answer
  • In this program, you will create an object and display it. Create a class nerf Gun that includes data members model (string), ra
    5·1 answer
  • Which of the following terms means that the system changes based on
    14·1 answer
  • )What is proceduralabstraction, and why is it important inComputer Science
    14·1 answer
  • How can parents be health educators in family​
    13·1 answer
  • Lisa has a section of her document that she would like to include in the index. Which option should Lisa choose?
    5·2 answers
  • What color mode would you use when designing for web & devices?
    9·1 answer
  • If you walked into a room containing three computers and were told one of them was infected with malware, how would you determin
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!