1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mademuasel [1]
2 years ago
12

Question # 4

Computers and Technology
1 answer:
arlik [135]2 years ago
4 0

Answer:

Explanatio Morse code

You might be interested in
The Leal button is located in the
Fed [463]
The button is located on the left side of the gear shift right under the main shift button
7 0
2 years ago
This is an example of what type of formula?
Sidana [21]

The type of formula that is represented by the given example =(D1+D17) in excel is known as; The SUM Formula function

What are functions in excel?

There are different types of formula functions in excel such as;

SUM

COUNT

COUNTA

IF

TRIM

MAX & MIN

Now, in this question, the formula we are given is =(D1+D17) and the example it represents is the SUM formula function.

5 0
1 year ago
Which statement best justifies the use of a high-speed cache in a CPU?
crimeas [40]

Cache memory is a high-speed memory that stores the instructions and data that have been frequently accessed.  It decreases the time it takes to decode the instructions stored in the instruction pipeline.

A.  It decreases the time it takes to decode instructions stored in the instruction pipeline.

<u>Explanation:</u>

Whenever an instruction is invoked or some data is accessed, the CPU looks for it in the cache memory before accessing the main memory.

If the content is found in the cache memory, it accessed from there and then and hence the access time and decode time is reduced as there were no main memory lockups.

6 0
3 years ago
Universal Containers is designing a new community using the Customer Community license type. They would like to have the users c
motikmotik

Answer:

The correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Explanation:

Note: This question is not complete as the options are not included. The complete question with the options is therefore provided before answering the question as follows:

Universal Containers is designing a new community using the Customer Community license type. They would like to have the users complete survey questions through the community interface and store the responses in a Custom Object that has a lookup to the account object. Any internal user who has access to the account should be able to see all survey responses. All Customer Community users should be able to see surveys filled in by other users for their company, but not surveys for other companies. What are the correct security settings to achieve this?

A. Set all Organization-Wide Default security to be "Public Read/Write" for internal users and "Private" for external users.

B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access

C. Set all Organization-Wide Default settings to be "Public Read/Write" for both internal and external users.

D. Set the custom object to be master-detail to the Account and leave the Organization-Wide Default settings as their default values.

The explanation of the answer is now provided as follows:

Organization Wide Default security refers to settings that provides most restrictive settings that may be opened up by Role Hierarchy and Role hierarchy can be opened by Sharing rules. And the visibility of records at the record level is determined by all of these factors. Private, Public Read, Read/Write, and Read/Write & Transfer are the four permissions available in Sharing Rules.

The rules that are used to offer sharing access to users in public groups, roles, or territories are referred to as sharing rules. By introducing automatic exceptions to your org-wide sharing policies, sharing rules allow certain users more access.

By implication, the correct security settings to achieve the objective stated in the question is to set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

Therefore, the correct option is B. Set all Organization-Wide Default security to be "Private" for both internal and external users and use Sharing Rules to grant the desired access.

5 0
3 years ago
When are computers most vulnerable to threats or damage?
valentinak56 [21]
With virus protection
8 0
3 years ago
Other questions:
  • You have implemented a network where hosts are assigned specific roles, such as for file sharing and printing. Other hosts acces
    7·1 answer
  • // PrintStrings // Traverse the 2D character array "strings" and print each of the contained strings.// See the example outputs
    10·1 answer
  • What is the most consistent item regardless of the software used in BI?
    5·1 answer
  • 110101111.11011 to decimal (base 10)
    6·1 answer
  • Outcomes resulting from using incorect requirement specification during system development​
    11·1 answer
  • Hypertext Markup language (HTML) version _____ added support for style sheets to give web designers greater control over page la
    12·1 answer
  • In this problem, we explore some of the properties of the CRC. For the generator G (=1001) given in Section 5.2.3, answer the fo
    6·1 answer
  • You work on the marketing team for a software company. You do not work closely with the development team; however, you need to k
    8·1 answer
  • Which tab do you open to access the Comments feature?
    11·1 answer
  • When conducting memory and recall tests, some people make an effort to normalize memories by not reporting extreme cases. this l
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!