1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vampirchik [111]
4 years ago
11

An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the

administrator ensure that the field-level security that was tested and approved in the sandbox environment is maintained as part of the deployment? a) Create a change set that includes the custom object and all custom fields b) Create a change set that includes the custom object and all profiles c) Create a change set that includes the custom object, check the retain field-level security option d) Create a change set for the custom object; use Data Loader to transfer field-level security
Computers and Technology
1 answer:
Vesnalui [34]4 years ago
5 0

Answer:

Option D

Explanation:

Option A is rejected because adding a custom object will cost both in memory and computation power. Consider that you have 1 million users, than there will be 1 million custom objects in the memory for checking the security which is not good.

Option B is not answer because again making a custom object will cost in memory and computation power.

Option C is not good because it also makes the custom object.

Option D is selected because change sets can be made which will not cost as much as the other options are costing. Also Data Loader can have come credentials defined in it which we can use to check if the user activities are according to the rules at each level.These days these data loader object technique is used because there will be static change sets for the class of users to check security.

You might be interested in
Which data type does not allow duplicate values-python
kkurt [141]

Answer:

Set

Explanation:

A set is unique in Python. It does not allow duplicates

6 0
2 years ago
How long does it take rblx to re open deleted acc
dedylja [7]

Answer:

(Probably) unknown

Explanation:

First off, you have to get rblx to agree to re-open a deleted, which I can imagine would take a herculean effort and most likely a stream of emails and phone calls. If they happen to archive deleted accounts, they may be able to recover it, but this is done by humans, so there is no definitive way to find out how long it would take a human to do this. If deleted accounts aren't archived, then you're outta luck because they won't be able to get it back.

4 0
3 years ago
Read 2 more answers
Sidney works in the accounting department. His boss just assigned him a task that involves creating budget formulas for the comp
Molodets [167]
The answer is a A. - Excel performs operations based on the order of Precedence
4 0
3 years ago
Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(
Alborosie

Answer:

1.ClassName and . operator

2. ClassName and [] operator

Explanation:

There are two ways to get the members of a class first one is by using dot(.) operator.

Example : with assumption that person is a class object and age is the member in it we can use it as:

person.age

Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.

Example : person["age"]

5 0
4 years ago
Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex:
aleksley [76]

Answer:

Explanation:

The following is written in Java and prints out the pattern to and from the first num parameter that is passed to the function. Meaning it goes from num1 to 0 and then from 0 to num1 again. It prints all of the values in a single line seperated by a space and a test case was used using the values provided in the question. The output can be seen in the attached picture below.

static void printNumPattern(int n1,int n2){

       System.out.print(n1 + " ");

       if(n1<=0) {

           return;

       } else {

           printNumPattern(n1-n2,n2);

       }

       System.out.print(n1 + " ");

   }

6 0
3 years ago
Other questions:
  • Which statement about word processing software is true? A)You can use it to perform mathematical calculations.B) You can use it
    6·2 answers
  • A digital footprint is all of the information on-line about a person posted by that person or others, ____________. intentionall
    14·1 answer
  • How do say phone in French?
    10·2 answers
  • The process of _____ determines what volume a system can handle by comparing its performance to standards in the industry.
    7·1 answer
  • What are the basic components of a Production System?
    6·1 answer
  • What is the purpose of a diode in a cordless drill or power screwdriver?
    14·1 answer
  • How does color affect your mood?
    11·2 answers
  • A common approach of networking multiple computers as opposed to a single computer is? called:
    14·1 answer
  • What Information Technology is Walt Thomas responsible for?
    13·2 answers
  • Which of the expressions is false? when a = 10 and b = 4
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!