1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
4 years ago
11

An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the

administrator ensure that the field-level security that was tested and approved in the sandbox environment is maintained as part of the deployment? a) Create a change set that includes the custom object and all custom fields b) Create a change set that includes the custom object and all profiles c) Create a change set that includes the custom object, check the retain field-level security option d) Create a change set for the custom object; use Data Loader to transfer field-level security
Computers and Technology
1 answer:
Vesnalui [34]4 years ago
5 0

Answer:

Option D

Explanation:

Option A is rejected because adding a custom object will cost both in memory and computation power. Consider that you have 1 million users, than there will be 1 million custom objects in the memory for checking the security which is not good.

Option B is not answer because again making a custom object will cost in memory and computation power.

Option C is not good because it also makes the custom object.

Option D is selected because change sets can be made which will not cost as much as the other options are costing. Also Data Loader can have come credentials defined in it which we can use to check if the user activities are according to the rules at each level.These days these data loader object technique is used because there will be static change sets for the class of users to check security.

You might be interested in
Methods inherited from the base/super class can be overridden. This means changing their implementation; the original source cod
Inessa05 [86]

Answer:

False

Explanation:

Methods inherited from the base/super class can be overridden only if behvior is close enough. The overridding method should have same name, type and number of parameters and same return type.

6 0
3 years ago
Why are user application configuration files saved in the user’s home directory and not under /etc with all the other system-wid
kodGreya [7K]

Explanation:

The main reason why is because regular users don't have permission to write to /etc. Assuming this is Linux, it is a multi-user operating system. Meaning if there are user-application configuration files within /etc, it would prevent users from being able to customize their applications.

6 0
4 years ago
Which of the following is an example of synchronous communication?
kirza4 [7]

The answer is D) on Oddessey Ware

4 0
3 years ago
A___________is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its
Molodets [167]

Answer: rootkit

Explanation:

Hi, A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed (for example, to an unauthorized user) and often masks its existence or the existence of other software.

A rootkit provides continued privileged access to a computer while hiding its presence. Because of this hiding characteristic it is very difficult to detect.

Once a rootkit has been installed, it allows someone to have total remote control of a computer and do things such as files executions and system changes.

4 0
3 years ago
HELP PLEASE!!!!
denis23 [38]

Answer:

1100 ; 11000 ; 110000 ; 1100000

Explanation:

Converting the following decimals to binary :

2__12

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

12 = 1100 base 2

2.)

2__24

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

24 = 11000 base 2

2__48

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

48 = 110000 base 2

2__96

2__48 r 0

2__24 r 0

2__12 r 0

2__6 r 0

2__3 r 0

2__1 r 1

___0 r 1

96 = 1100000 base 2

5 0
3 years ago
Other questions:
  • What is another way to use the Help feature in Access 2016?
    15·2 answers
  • Which View option allows you to view your document as it would appear when posted online?
    8·1 answer
  • According to Google data, among consumers who conduct a local search on their smartphone, how many then visit a store within a d
    7·1 answer
  • Suppose that you have created a program with only the following variables.int age = 34;int weight = 180;double height = 5.9;Supp
    7·1 answer
  • C++
    11·2 answers
  • _________________________ was designed to provide devices with a method for notifying each other that a link is experiencing con
    15·1 answer
  • HI PLZ HELP 11 POINTS!!!
    12·2 answers
  • No careers combine more than one value
    7·1 answer
  • True or False: Mapping annotations are exclusive - an annotated method will only be accessible to requests sent to a matching UR
    14·1 answer
  • What are the main dimensions of information system and their components
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!