1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
6

Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should

be able to view and edit job records are the user who owns the record and all users in the Delivery profile.Which three platform sharing tools are required to support the above requirements? A. "Modify All" permission for Job Object on the Delivery Profile
B. "View All Data" profile permission on the Delivery Profile
C. Grant Access Using Hierarchy sharing setting on the Job Object set to false
D. Criteria-Based sharing rule for the Delivery Profile on the Job Object
E. Organization-Wide Default sharing setting of Private on the Job Object
Computers and Technology
1 answer:
Elenna [48]3 years ago
7 0

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

You might be interested in
Suppose that sum is an int variable. The statement sum += 7; is equivalent to the statement sum = sum + 7;
ivanzaharov [21]
That's correct.

Same goes for -=  *=  and  /=

It essentially just means "Do this, to this variable".


sum += 7  "Add 7 to sum"
result *= 10  "Multiply result by 10"
So on, and so forth.
4 0
3 years ago
The set of folders and subfolders that MATLAB searches through to locate a command or M-file is called the ___________.(fill in
Oduvanchick [21]

Answer:

<u>path</u>

Explanation:

The sub-folders and folders set that MATLAB searches through in order to locate M-file or a command is known as the path.

These files are stored in the user path which is stored in the user path directory in it.

We usually run the function , i.e., user path function in order to know the location of the folder stored or command or the M-file.

7 0
3 years ago
Which option identifies what the computer will yield in the following scenario?
dolphi86 [110]
I think it would be the computer program will create a design with the exact dimensions
6 0
3 years ago
​Microsoft claims that the microsoft project software can _____.
Lina20 [59]
The Microsoft project software is designed in assisting the project manager in formulating plans, distributing resources to certain tasks, progress monitoring, budget management and analysis of workloads.

I hope I was able to help you. Thank you for posting your question here at Brainly.
8 0
3 years ago
I will give brainliest!!!!! I NEED HELP ASAP!!!!!!!
klemol [59]

Answer:

I'm pretty sure it's the first answer.

4 0
3 years ago
Other questions:
  • Abigail is interested in connecting her tablet that usually connects to a wireless network, to her personal computer that usuall
    11·2 answers
  • Christine wants to send a quick communication to all department managers. She should send a _____. report
    13·2 answers
  • What is infinite recursion?
    7·1 answer
  • Which of these jobs would be most appropriate for someone who majors in information technology? A)developing new computing techn
    5·2 answers
  • To display the Color gallery, with the graphic selected, click the Color button in the ____ group on the PICTURE TOOLS FORMAT ta
    14·1 answer
  • ​Client/server computing is​ a: A. network that connects sensors to desktop computers. B. distributed computing model where clie
    12·1 answer
  • The best way to help prevent a system from a worm attack is to use anti-virus software anti-malware software a firewall a router
    12·1 answer
  • The hexadecimal eqquivalent of (80)10 is
    11·1 answer
  • Buying a home security system is an example of protecting your home against________.
    5·1 answer
  • Assume that the Vehicle class contains a virtual method named CalculateMaxSpeed(). Assume that both the MotorVehicle and Automob
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!