1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
natita [175]
3 years ago
14

An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the f

low for editing, the Flow Bunder toolbox offers only four elements: Assignment, Decision, Get Records, and Loop. What would cause this
Computers and Technology
1 answer:
Luba_88 [7]3 years ago
4 0

There are steps to take so as to update a flow that was created as part in recent update. What would cause the said action is that  the flow Is a before save flow.

<h3>What is a flow</h3><h3 />
  • A flow in this scenario is known to makes before-save updates and it is known to be quite similar to a before trigger.

The Before-save Flow is known to be a trigger that is done before a given operation.

See full question below

An administrator has been asked to update a flow that was created as part of a recent update. When the administrator opens the flow for edtting, the Flow Bunder toolbox offers only four elements: Assignment, Decision, Get Records, and Loop.

What would cause this?

A . The flow Is a before save flow.

B . The flow Is a screen flow.

C . The version of the flow is activate.

D . The version of the flow is inactive.

Learn more about Flow from

brainly.com/question/6532130

You might be interested in
10(            )  8(532.2 )                         
blagie [28]

Answer:

346.30

Explanation:

7 0
3 years ago
The method of loci, peg-word system, substitute word system, and method of word association are all examples of _____.
Yakvenalex [24]
The answer is Mnemonic devices

Mnemonics enable us remember things more easily and often refer to such internal strategies like reciting a rhythm or reciting the order of colors of the rainbow. In cognitive psychology of memory, peg-word method, keyword method, and the method of loci are discussed as formal mnemonic techniques.



5 0
3 years ago
What technique is most commonly associated with the use of malicious flash drives by penetration testers
nasty-shy [4]

Answer: Distributing malicious flash drives in a parking lot or other high-traffic area, often with a label that will tempt the person who finds it into plugging it in, is a technique used by penetration testers.

Explanation:

4 0
2 years ago
How will I go about conducting the investigation on fake news
Leno4ka [110]

Answer:

You can begin your report, and write about CNN, BBC, or any other liberal news network.

Explanation:

5 0
3 years ago
Which RFC reserves three ranges of IP addresses for private use - a single Class A (10.0.0.0-10.255.255.255), 16 Class Bs (172.1
erica [24]

Answer:

The answer is "1918".

Explanation:

The RFC stands for "remote function call", it is also known as an abbreviated form. It is an application, that responses in a technical online design Task Force, it is also known as a document, which was prepared for review by shareholders to collects some information.  

The RFC reverses is also known as an idea, that uses IP version 4 to reverse the IP address, this process is done by TCP/IP protocol, which is defined under RFC 1918.  

4 0
3 years ago
Other questions:
  • What is computer ????
    11·1 answer
  • How to use javascript libraries in javascript code?
    9·1 answer
  • Write a Python program that gets a single character from the user and writes out a congratulatory message if the character is a
    9·1 answer
  • How read binary file in c++
    7·1 answer
  • How many mustangs are built every day
    13·2 answers
  • Given two variables , first_place_winner and second_place_winner, write some code that swaps their associated values. use any ad
    12·1 answer
  • what are the benefits of VolP? select all that apply. A:cheaper printings B:clearer calls C: faster download D: increased effici
    11·2 answers
  • What is the best stratiget to avoid paying intrest in your credit cared
    13·1 answer
  • Data frames can be subset by a chosen value using ==.
    14·1 answer
  • Does the source MAC address match your PC interface?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!