1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
pishuonlain [190]
3 years ago
7

Private sharing model on Opportunities. Leadership has asked the Administrator to create a new custom object that will track cus

tomer payment information and will link to the Opportunity. Only those users with access to the Opportunity should be able to see the records on the new object.
Computers and Technology
1 answer:
Artemon [7]3 years ago
4 0

Answer:

The answer is "Creates a profile, that permits master-detail relationship".

Explanation:

This relationship provides the relationship between parent and child when masters describe as a parent and information describes a child by which the main item controls the actions of the object of the detail.  

  • In this relationship, the main object history is destroyed, the detailed object associated with it will also be lost.
  • It lists all related information on the details page of the database, and other choices were wrong which can't be defined in the given senior.
You might be interested in
Which term refers to a type of an attack in which an attacker makes his data look like it is coming from a different source addr
Andrew [12]

<u>Man-in-the-middle attack</u> refers to a type of an attack in which an attacker makes his data look like it is coming from a different source address, and is able to intercept information transferred between two computers.

<u>Explanation:</u>

A man-in-the-middle attack (MITM) is an assault where the aggressor furtively transfers and potentially changes the correspondences between two gatherings who accept that they are straightforwardly speaking with one another. This happens when the assailant catches a segment of a correspondence between two gatherings and retransmits it sometime in the future. The assailant would then be able to screen and perhaps change the substance of messages. The utilization of such encoded burrows makes extra secure layers when you get to your organization's secret systems over connections like Wi-Fi.

8 0
3 years ago
We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 a
dezoksy [38]

Answer:

We use a cubic equation in which the variables and coefficients all take on values in the set of integers from 0 through p - 1 and in which calculations are performed modulo p for a __Prime Curve_ over Zp.

Explanation:

Two families of elliptic curves are used in cryptographic applications

  1. Binary curves over GF(2m):
  2. Prime Curves over Zp.
4 0
3 years ago
Block elements start a new line when rendering? (true or false)
bekas [8.4K]

Answer:true

Explanation:

3 0
3 years ago
The right of workers to seek safety and health on the job without fear of punishment is spelled out in:
mr Goodwill [35]
The answer to the question is C.
3 0
3 years ago
Discribe two ways you can zoom in and out from an image
krek1111 [17]

Answer:

Select the Zoom tool, and then do any of the following:

<h2>#1. </h2>

Click and hold in the image to zoom in. Press Alt (Windows) or Option (Mac OS) to zoom out.

<h2>#2!</h2>

In the options bar, select Scrubby Zoom. Then drag to the left in the image to zoom out, or to the right to zoom in.

<h2>psst! pls, brailiest!</h2>
3 0
3 years ago
Read 2 more answers
Other questions:
  • Which of the following is true? A)Checks and Debit Cards both withdraw money directly from a bank account. B)Checks are the most
    13·2 answers
  • Which of the following statements is correct?
    11·1 answer
  • What are the correct answers?
    11·1 answer
  • REPORT THIS USER. HE'S SHOWING HIS YK WHAT TO EVERYONE INCLUDING ME. HIS ACCOUNT PROFILE IS IN THE PICTURE BELOW
    14·1 answer
  • What is media ethics. Explain two forms of maintaining media ethics with examples​
    13·1 answer
  • What is connected to the base unit in Desktop PC?
    14·1 answer
  • 50 ) What is the cell address of 4th row and 4th column? A) 4D B) E4 оооо C) 04 D) B4​
    9·1 answer
  • If a company saw an online photo of you playing basketball, it might try to sell
    5·1 answer
  • Which one did I buy the iPhone 13 or the Samsung S22 Ultra?
    14·2 answers
  • What type of an attack is being executed if an attacker substituted an invalid mac address for the network gateway so no users c
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!