1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
12

334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t

o display the account credit status on opportunities. Which feature should a system administrator use to meet this requiremen
Computers and Technology
1 answer:
fiasKO [112]3 years ago
3 0

Answer:

D) Cross-object formula field

Explanation:

These are the options for the question

A) Look-up Field

B) Roll-up summary field

C) Workflow field update

D) Cross-object formula field

From the question we are informed about a Universal Containers which uses a custom field on the account object to capture the account credit status. The sales team wants to display the account credit status on opportunities. In this case the feature that a system administrator should use to meet this requirement is Cross-object formula field. Cross-object formula can be regarded as a formula that involves spanning of two objects that are related, and perform a reference merge field on them. reference merge fields can be performed by cross object formula from a master object known as parent object provided that the object fall on detail side in which the master-detail relationship belong

You might be interested in
What is the name of the virus that appears to be a legitimate program?
timurjin [86]
A virus or malware appearing/pretending to be a legitimate program is called a Trojan. 
3 0
3 years ago
Which statement best describes the computers all around us?
Advocard [28]

Answer:

B

Explanation:

we are in a digital generation, where by technology is gradually taking over the world. Almost all business, schools, company, etc make use of computer.

8 0
1 year ago
Write a MIPS assembly language program that prompts for a user to enter a series of floating point numbers and calls read_float
LenaWriter [7]

Explanation:

Here if the value in the register $f2 is equals to the value in $f4, it jumps to the Label1. If it should jump when the value in the register $f2 is NOT equals to the value in $f4, then it should be

4 0
3 years ago
Congress are smart becuase.....
spin [16.1K]

Answer:

If we are talking about government then they are smart bc of there two house policies, both are equal yet super unique. They make sure each state has an equal voice in the senate.

5 0
2 years ago
1. It is a requirement to install a routing protocol that monitors the network for routers that have changed their link state. T
Nady [450]

Answer:

1. Open Shortest Path First (OSPF)

2. Border Gateway Protocol (BGP)

3. Routing and Remote Access Service (RRAS)

4. Frame relay

5. Synchronous

6. Virtual

7. Committed Information Rate (CIR)

8. Integrated Services Digital Network (ISDN)

9. Asynchronous Transfer Mode (ATM)

10. Basic Rate Interface (BRI).

8 0
3 years ago
Other questions:
  • Samantha has to create a video for her science project on the blossoming of a flower from a bud to one with fully opened petals.
    5·2 answers
  • Calculate the change in RGDP if the MPC is .6 and initial spending is $500,000.
    8·1 answer
  • What is SEO?<br> Training Live Online Instructor-Led Learning, https://www.peoplentech.com.bd/<br> ,
    9·1 answer
  • Implementations <br> in c++ programming when finding lcm and gcd in c++​
    12·1 answer
  • Need help asap<br> give the correct answer!!
    15·2 answers
  • Write a Python program that inputs an integer between 0 and 1000 and adds all the digits in the integer. For example, if integer
    6·1 answer
  • which of the following protocols allows hosts to exchange messages to indicate problems with packet delivery?
    14·1 answer
  • What do we call the software which programmers use to program?​
    6·1 answer
  • Difference between hacking and cracking not hackers and crackers ​
    10·1 answer
  • You would like to help guide your company in choosing between valuing privacy and increasing the company's bottom line. What is
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!