1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
creativ13 [48]
3 years ago
12

334. Universal Containers uses a custom field on the account object to capture the account credit status. The sales team wants t

o display the account credit status on opportunities. Which feature should a system administrator use to meet this requiremen
Computers and Technology
1 answer:
fiasKO [112]3 years ago
3 0

Answer:

D) Cross-object formula field

Explanation:

These are the options for the question

A) Look-up Field

B) Roll-up summary field

C) Workflow field update

D) Cross-object formula field

From the question we are informed about a Universal Containers which uses a custom field on the account object to capture the account credit status. The sales team wants to display the account credit status on opportunities. In this case the feature that a system administrator should use to meet this requirement is Cross-object formula field. Cross-object formula can be regarded as a formula that involves spanning of two objects that are related, and perform a reference merge field on them. reference merge fields can be performed by cross object formula from a master object known as parent object provided that the object fall on detail side in which the master-detail relationship belong

You might be interested in
Write a public static method called getPIDs that has a parameter of type Map called nameToPID (keys are student names and values
Rasek [7]

Answer:

Java program is explained below

Explanation:

import java.util.HashSet;

import java.util.Map;

import java.util.TreeMap;

public class TruckRace1 {

   public static HashSet<String> getPIDs (Map<String,String>nameToPID ){

       HashSet<String> pidSet = new HashSet<>();

       for(String ids: nameToPID.values()){

           pidSet.add(ids);

       }

       return pidSet;

   }

   public static void main(String[] args) {

       Map<String,String> pids = new TreeMap<>();

       pids.put("John","123");

       pids.put("Jason","124");

       pids.put("Peter","125");

       pids.put("Alice","126");

       pids.put("Peny","129");

       HashSet<String> ids = getPIDs(pids);

       for(String id:ids){

           System.out.println(id);

       }

   }

}

4 0
3 years ago
How has the shift to locally grown produce decreased greenhouse emissions?
Katen [24]

Answer:

How has the shift to locally grown produce decreased greenhouse emissions? 1 Large farms often create greenhouse emissions by poor farming practices. 2 Locally grown produce allows fewer dangerous toxins to seep into the soil and the atmosphere.

3 0
3 years ago
Which one of these is the most commonly used hardware interface for attaching peripherals to a microcomputer?
Tanzania [10]
Hey there!

The most commonly used hardware interface for attaching peripherals to a microcomputer is the universal series bus, or USB, port. Many computers have at least 2 to 4 USB ports that allow for multiple devices to be plugged in at once. In terms of wired devices as opposed to wireless, this is the main way that a mouse, a keyboard, a smartphone (for charging and syncing information), and many other devices are connected to computers. 

Hope this helped you out! :-)
4 0
3 years ago
Henry is designing a document for his architecture project. In which order should Henry preform the different tasks that are req
nadezda [96]

It is

Select an appropriate layout

Decide which current format...

Import or compose...

Proofread...

Check the print preview..

4 0
3 years ago
List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
Nitella [24]

Answer:

Cyber security can be used for good but nevertheless some people will find ways to do bad things. Basically the negative impacts of cyber security is the opposite to the good type of cyber security they take advantage of it and exploit computer system to do what they want. An example to this is planting a malware on the victim's computer or using a DDOS attack on a WiFi router the possibility are endless.

5 0
3 years ago
Other questions:
  • Random-access memory (RAM) is able to quickly access data because it is arranged in which of the following configurations?
    8·2 answers
  • What tool do you use to secure remote access by users who utilize the internet??
    7·1 answer
  • Write a new program indent.cpp that enhances the program from the previous task. As it reads the input line by line, it should a
    10·1 answer
  • Match each proofreading mark to the expected result.
    10·1 answer
  • What is it called when you remove some information from a file or remove a file from the disk ? A) save b) delete c) edit d) rem
    5·1 answer
  • What is one reason why a business may want to move entirely online?
    12·1 answer
  • Implement the Tollable interface. It provides one method, pay, that accepts an int (how many dollars to pay), and returns an int
    8·1 answer
  • Who is he can anyone help me​
    14·2 answers
  • Is spin to win paying or is a scam app​
    6·2 answers
  • Location of a video or photoshoot is not important when it comes to preplanning the shoot.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!