1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Tems11 [23]
4 years ago
10

Universal Containers would like to create a custom team solution that can be used on a custom Loan object. The following require

ments must be met: • The loan custom object should be set to Private in the Org-Wide Defaults • Any user added to the Custom Team Object should have Read Only Access to the corresponding Loan record • If the Custom Team record is marked as "Primary" then the corresponding user should have Read/Edit access to the corresponding Loan record. Which two methods will allow the Architect to meet these requirements?
Computers and Technology
1 answer:
riadik2000 [5.3K]4 years ago
4 0

Answer / Explanation:

The two method that can be used to generate optimum success is to

1) Create a lookup relationship from the Loan object to the User object.

2)  Use a trigger on the Loan object to create the corresponding record in the Loan_share object.

This way, any user added to the custom team object will have a read only access to the corresponding load record. That way double control is achieved in the process of trying Universal container trying to set up a custom team solution that can be used on a custom loan object.

Defining Double Control: This is simply the process of increasing the integrity measure assigned to  a particular process. It is a process whereby limited access is granted to the full coordination of a single process.

You might be interested in
Anybody know this question???
vlada-n [284]

i believe the choice you are ooking fo

4 0
4 years ago
Which element of the MakeCode Arcade interface represents an individual
Vlad [161]
I believe a block. I think that is the thing that can be repeated though the different parts of the code.
3 0
3 years ago
Ok for whoever answers this, Ill wager 20 points...
Novosadov [1.4K]

Answer:

The display will be 17.

Explanation:

Tracing through the program:

At first, math is called and sent 1 and 2 - so 1 is stored to ans1 and 2 is stored to ans2.

If the user inputs 3 for a and 4 for b, the program then calls function math2 and passed values of 3 and 4.

So now inside of math2, 3 is stored to res1 and 4 is stored to res3. Inside of this function, res1 and res2 are added together - so then 7 is stored to d and then returned back to the original function.

So now 7 was stored back to the variable c. Then a and ans1 are added together (3 + 1 = 4) and b and ans2 are added together (4 + 2 = 6). Each of these values are stored back to e and f.

Then those values, e and f (4 and 6) are again sent to math2, which simply adds the values together and returns it back to the function. So 10 is sent back to math and stored to the value of g.

Then c (7) and g (10) are added together and displayed.

8 0
3 years ago
Read 2 more answers
A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
xz_007 [3.2K]

Answer:

access control list (ACL)

Explanation:

An access control list (ACL) is a list of authorization rights attached to an object - in other words, who can access that device or application and what can they do with it.

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a file.

3 0
3 years ago
What are those jackets called the ones with lots of straps inside, like in movies where they store there ammo etc?
sesenic [268]

Answer:

Tactical Vest | Tactical Ammo Vest.

Explanation:

6 0
3 years ago
Other questions:
  • What bug was supposed to start affecting computers on january 1 2000
    9·1 answer
  • What is heat sink?what is its use?If it is not in the system what will happen?
    12·1 answer
  • If a local DNS server cannot find an IP address for a specified URL, it does this.
    9·1 answer
  • Sizing handles are used in Microsoft® Word® to _____.
    13·1 answer
  • A _____________ is some text or data that is stored on your computer and used by a website to track how you use that site. quest
    8·2 answers
  • Write the java statement to creat an object mp4 class digital​
    8·1 answer
  • Explain the term DNS(Domain Name System) and why it is used.
    9·1 answer
  • A​ _______ variable is a variable that has a single numerical​ value, determined by​ chance, for each outcome of a procedure.
    7·1 answer
  • Once you record your audio and click ok to save it what happens to the recording?
    9·1 answer
  • ____ is an approach to boundary spanning which results from using sophisticated software to search through large amounts of inte
    5·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!