1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Damm [24]
3 years ago
11

Universal containers has two teams: Sales and Services. Both teams interact with the same records. Sales users use ten fields on

the Account Record. Services users use three of the same fields as the Sales team, but also have five of their own, which the sales team does not use .What is the minimum configuration necessary to meet this requirement?
Computers and Technology
1 answer:
Oxana [17]3 years ago
6 0

Answer:

Two profiles, one record type, two page layouts.

Explanation:

Record types and functions allow you to present forward different business processes, pick-list values, as well as page layouts to diverse range of users based on their profiles.

Going by the question, we can conclude that the minimum necessary configuration in order to meet the requirement in the question above are:Two profiles, one record type, two page layouts.

You might be interested in
Using the flowchart diagram, identify the decision point of this solution. Identify vendors. Calculate amount due. Determine dat
andreev551 [17]

Answer:

answer is "is there an early pay discount"

Explanation:

3 0
4 years ago
Read 2 more answers
PLS HELP ASAP ILL GIVE BRAINLKEST PLS THANKS 20 POINTS
OLga [1]

Answer:

#1?

Explanation:

Might be wrong..

5 0
2 years ago
Read 2 more answers
Different between anlog and digital computer?​
sp2606 [1]

Explanation:

Analog computer:

It works with naturaland physical values

It works upon continuous data.

Its accuracy is low.

Digital computer:

It works with digits.

It works upon discrete data.

Its accuracy is high

3 0
3 years ago
Which design principle will help me add an element of interest in my poster by avoiding confusion and monotony?
Rasek [7]

Answer:

You could add pictures to help convey the viewer, while capturing their attention. It will provide great interest as well.

Explanation:

Me being a viewer, I love to see pictures. They help explain the topic, while keeping my attention.

7 0
3 years ago
Classify each of the following acts as a violation of confidentiality, of data integrity, source integrity, or availability, or
AlexFokin [52]

Answer:

A) Violation of Confidentiality and Source Integrity:

Passwords are very confidential information and are usually protected by both the owner and the ower of the system (which in this case is Yahoo). To obtain the passwords, the hacker had to illegally gain access to the source of the data which is on Yahoo servers. Hence a breach of confidentiality and lack of adequate integrity on the part of Yahoo.

B) Source Integrity: Anthony accidentally cuts the electricity from the server room. Why would he be able to do that? how did he gain access into the server room? This speaks to source integrity. People should not be able to access the server room except they are authorised.

C) Source Integrity and Confidentiality: NSA finds an efficient method to break AES. AES refers to the Advanced Encryption Standard. AES is a symmetric encryption technology known as a block cipher.

It is used by the United States Government for the classification of information. Their ability to break this code speaks to Violation of Source Integrity. In this case, they haven't exactly hacked any document. However, any document that was encrypted using this technology is already compromised at the source.

D)   Anna registers the domain name, "JohnSmith" and refuses to let John Smith buy or use the domain name: Violation of Availability.

It is assumed here that John Smith was the original owner of the domain but it was highjacked at expiration and registered by Anna. This kind of breach is called Violation of Availability of the domain name.

E) Some malware encrypts the victim’s hard drive with a secret key and a criminal asks for a ransom to decrypt.

This move is called the Ransomeware attack. The Integrity of the source of information (which is the hard drive) is already compromised. This is a combination of Source Integrity or availability and confidentiality violation.

F) The wiretapping of a cell phone is a breach of confidentiality and data integrity.

G) when there is a vulnerability in a system or software that is unknown to those who should be interested, it is called a Zero-Day vulnerability. Where there is a Zero-Day vulnerability there could be a violation of confidentiality, data integrity, source data and or it's availability.

Cheers!

4 0
3 years ago
Other questions:
  • This is a broad category of applications and technologies for gathering, storing, analyzing, and providing access to data to hel
    12·1 answer
  • Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Granite Sales C
    12·1 answer
  • Python program: Develop a program that will keep track of inventory for a local retail store. Fortunately, the store only offers
    7·2 answers
  • What are the useful techniques in program design?
    12·1 answer
  • The _____ feature automatically corrects typing, spelling, capitalization, or grammar errors as you type them.
    13·1 answer
  • I have this assignment due TONIGHT BEFORE 10PM! Please help. 50 points for whoever will help!! Here is the assignment.
    7·1 answer
  • What specific record type is found in every zone and contains information that identifies the server primarily responsible for t
    10·1 answer
  • after entering backstage view, and clicking account settings, what are the steps for creating a delegate for an outlook folder
    6·1 answer
  • Your agile team only has one database developer. So the other developers finish their tasks and then wait for their work to be I
    6·1 answer
  • What is a phone made out of dna
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!