1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kotykmax [81]
3 years ago
6

Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should

be able to view and edit job records are the user who owns the record and all users in the Delivery profile.Which three platform sharing tools are required to support the above requirements? A. "Modify All" permission for Job Object on the Delivery Profile
B. "View All Data" profile permission on the Delivery Profile
C. Grant Access Using Hierarchy sharing setting on the Job Object set to false
D. Criteria-Based sharing rule for the Delivery Profile on the Job Object
E. Organization-Wide Default sharing setting of Private on the Job Object
Computers and Technology
1 answer:
Elenna [48]3 years ago
7 0

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.

You might be interested in
How many times is the second for loop going to loop in this block of code? Write your answer in numeric form in the box provided
pantera1 [17]

Explanation:

The second for loop does 1 of 4 iterations for every 1 of 5 iterations of the parent loop. meaning it is 4 x 5 which is 20.

8 0
2 years ago
The photographer for "The Migrant Mother" photograph used _______________, which is a technique that would be considered unethic
d1i1m1o1n [39]

Answer:

The technique used by the photographer which would be considered unethical today is:

Stage Managing

Explanation:

  • The Migrant Mother is a famous that was captured by the photographer named Dorothea Lange. This photograph was taken during the era of great depression that shows the misery of a women as well as her courage.
  • The photographer used the stage managing technique because the women in the photograph purposefully posed for the picture in order to let others know about their plight. She wanted to develop awareness as well as wanted the Government to help farmers.
  • The name of the women in the picture is Florence Owens Thompson and she was a mother of seven children. She lived in California.

8 0
3 years ago
Read 2 more answers
Implement the function couple, which takes in two lists and returns a list that contains lists with i-th elements of two sequenc
In-s [12.5K]

Answer:

couple.py

def couple(s1,s2):

  newlist = []

  for i in range(len(s1)):

      newlist.append([s1[i],s2[i]])

  return newlist

s1=[1,2,3]

s2=[4,5,6]

print(couple(s1,s2))

enum.py

def couple(s1,s2):

  newlist = []

  for i in range(len(s1)):

      newlist.append([s1[i],s2[i]])

  return newlist

def enumerate(s,start=0):

  number_Array=[ i for i in range(start,start+len(s))]

  return couple(number_Array,s)

s=[6,1,'a']

print(enumerate(s))

print(enumerate('five',5))

Explanation:

7 0
3 years ago
What is responsible for what u see on a computer monitor?
zhuklara [117]
What is responsible or who is responsible?
3 0
4 years ago
HELPPPPPPPP
Reika [66]
The answer is visual hierarchy :)
4 0
3 years ago
Read 2 more answers
Other questions:
  • Electrical pressure is also called
    5·2 answers
  • Which type of wireless network is<br> controlled through a wireless<br> access point?
    7·1 answer
  • Some cars are 100 percent efficient at converting energy from gasoline to energy of motion.
    11·2 answers
  • _______ allow(s) you to apply colorful, eye catching designs to a presentation all at once. A. Themes B. Slide orientation C. Th
    10·2 answers
  • vulnerability is a feebleness which allows an attacker to condense a system's information assurance to security,is it true or fa
    14·1 answer
  • Write assembly programs with the following I/O
    15·1 answer
  • Coment on this if your user starts with dida
    5·1 answer
  • Which of the following tools enables a production mixer to sync audio and video?
    7·1 answer
  • The Circle and CircleTester have been created, but they have errors. The public and private settings for variables and methods a
    8·1 answer
  • As part of their extensive kitchen remodel, the Lees told their electrical contractors that they would need plenty of outlets fo
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!