1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ahat [919]
3 years ago
7

Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship betw

een Accounts and the Orders object (one-to-many relationship) leveraging a key field for account which is on both external object and Account. Which relationship do you create?
Computers and Technology
1 answer:
KIM [24]3 years ago
5 0

Answer:

Indirect Lookup Relationship

Explanation:

We can use Indirect Lookup Relationship, where there are external data without ID, en Salesforce.

Make sure the field can distinguish between uppercase and lowercase When defining the custom field of the main object.

For example:

We have contact records with the main object, and we have a list related to social media in the external object with matching social bookmarks.

You might be interested in
Remember that kid who would always ask you for your food, even though he packed his own lunch.
Verizon [17]

Answer:

ye ye

Explanation:

7 0
2 years ago
Read 2 more answers
Indicate whether the following statements are true or false:
postnew [5]

Answer:C

Explanation:I got it correct on the computer

7 0
3 years ago
Read 2 more answers
A department manager would like to choose an access control model in which the owner of a resource decides who may modify permis
Hoochie [10]

Answer: Discretionary access control (DAC)

Explanation: Discretionary access control is the control system that is imposed over the information system. The information systems contains different objects and subjects that gets the permission to do the operations.

The operation which the components can do are sharing the data to other object or subjects, privilege providence, change in the rules for the access, security entities getting changed etc.

4 0
3 years ago
Five programs are currently being run in a computer. Program 1 is using 10 GiB of RAM, program 2 is using 5 GiB of RAM, program
muminat

Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

<h3>How is virtual memory used instead of RAM?</h3>

A system is known to make use of a virtual memory and this is one that tend to make use of a section of the hard drive to act like the RAM.

With the use of virtual memory, a system can be able to load bigger or a lot of programs running at the same time, and this is one that tends to hep one to work as if it has more space, without having to buy more RAM.

Therefore, Virtual memory could be used to allow program 5 to access RAM without any of the data from the other four programs being lost because it is one that tend to allows the system to give all of the process its own memory space that is said to be  isolated from the other processes.

Learn more about virtual memory from

brainly.com/question/13088640

#SPJ1

6 0
1 year ago
What percent<br> of students in<br> the US are<br> considered<br> ESL<br> students?
mariarad [96]

Answer: 9.5%

Explanation: There were nearly 5 million English language learners in U.S. public schools in fall 2015, according to the most recent available data from the National Center for Education Statistics. This represented 9.5% of U.S. public school enrollees, an increase from 8.1% in 2000

5 0
2 years ago
Other questions:
  • To become a news anchor, you should get a Bachelor's degree in:
    11·2 answers
  • Who's better Kapkan or Tachanka?
    6·1 answer
  • Every time you are asked to work with others, you are being asked to:
    6·2 answers
  • Help PLEASE (in attachment)
    8·1 answer
  • What are the major functions of a computer
    7·1 answer
  • Suppose that a computer can read or write a memory word in 5 nsec. Also suppose that when an interrupt occurs, all 32 CPU regist
    10·2 answers
  • Use the _______ to add a line or circle to your presentation.
    8·1 answer
  • The data type of 17.3 should be ________________.
    12·2 answers
  • Why does the peot use a simular pharase at the beggining of each stanza
    8·1 answer
  • Which type of evidence should victims collect to help officials catch cyber bullies?home addressesbirthdayssocial media username
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!