1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
12

334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t

o display the account credit status on opportunities. Which feature should a system administrator use to meet this requiremen
Computers and Technology
1 answer:
fiasKO [112]3 years ago
3 0

Answer:

D) Cross-object formula field

Explanation:

These are the options for the question

A) Look-up Field

B) Roll-up summary field

C) Workflow field update

D) Cross-object formula field

From the question we are informed about a Universal Containers which uses a custom field on the account object to capture the account credit status. The sales team wants to display the account credit status on opportunities. In this case the feature that a system administrator should use to meet this requirement is Cross-object formula field. Cross-object formula can be regarded as a formula that involves spanning of two objects that are related, and perform a reference merge field on them. reference merge fields can be performed by cross object formula from a master object known as parent object provided that the object fall on detail side in which the master-detail relationship belong

You might be interested in
E-banking is also called: [1]
DENIUS [597]
Answer 1 it’s online banking
3 0
2 years ago
The _______ "represents a set of features that enables the user to inform himself whether a security feature is in operation or
quester [9]

Answer:

Visibility and configuration of security.

Explanation:

The visibility and configuration of security represents a set of features that enables the user to inform himself whether a security feature is in operation or not and whether the use and provision of services should depend on the security feature.

4 0
3 years ago
Which technology can allow a single ground-based telescope to achieve images as sharp as those from the Hubble Space Telescope?
Ganezh [65]

Answer:

The correct answer to the following question will be "Adaptive Optics".

Explanation:

  • AO (Adaptive Optics) is a technique used to enhance optical system performance by reducing the impact of incoming gravitational wave distortions by compressing a mirror to compensate for the distortion.
  • It operates by calculating and compensating for defects in a wave-front with a system that corrects these errors as a deformable mirror or even a liquid crystal collection.
  • It is a technique that can make it possible for a single ground-based telescope to get images as clear as that of the Hubble Space Telescope.
  • Certain methods can achieve power resolution that exceeds the limit set by atmospheric distortion, for example, Aperture synthesis, Lucky imaging, and Speckle imaging.

Therefore, Adaptive Optics is the right answer.

7 0
3 years ago
Which type of data is most sensitive and should be protected from malware?
Dennis_Churaev [7]
The correct answer is “C. The credit card number that you use to make an online purchase”
5 0
2 years ago
Write down the appropriate technical term of following statements.​
MrRa [10]

Answer:

it is not seeing full. please give full

8 0
3 years ago
Other questions:
  • If an occupation is projected to grow by 13% over the next 10 years, how would you rate the job outlook?
    7·2 answers
  • 9. In Electronic Codebook (ECB): a. The message is broken into independent blocks which are encrypted b. The message is broken i
    6·1 answer
  • Click _______ to view each individual record of a mail merge document.
    5·2 answers
  • Fair Use means a teacher can take the contents of a web activity page and repost it in your school's web site because it is for
    7·1 answer
  • Please help me willgive u brainliest​
    14·1 answer
  • What factors do network consultants consider when determining the network needs of a business? Use the space provided below to a
    6·1 answer
  • Select the correct answer.
    5·1 answer
  • Describe risk avoidance. Name three common methods of risk avoidance.
    5·1 answer
  • processing C. have only one function, e.g. control traffic lights in a town, games machines 7 To create a formula, you first: A.
    13·1 answer
  • Question 7 Consider the following code:
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!