select the correct term to fill in the blank: in salesforce, database tables are referred to as

Answers

Answer 1

In Salesforce, database tables are referred to as objects. Objects are used to store data in a structured format and have a set of fields and related records.

Salesforce utilizes a unique terminology for its platform components. In the Salesforce ecosystem, database tables that store data are called "Objects." These Objects can be standard (pre-built by Salesforce) or custom (created by users to meet specific needs). Each Object consists of fields (similar to columns in traditional databases) that store individual pieces of data.

Objects can be customized or standard, and they are essential for building applications and automating business processes in Salesforce.

To know more about Salesforce visit:-
https://brainly.com/question/28347588

#SPJ11


Related Questions

True or false. The PIC is an inter grated circuit in which the microprocessor architecture, along with read only memory (ROM) and random access memory (RAM), are all placed into one integrated circuit that may be reprogrammed; the microprocessor cannot.

Answers

Answer:

your partner in crime can not ROM around without a RAM.

Explanation:

so it would be false.

Complete the missing part of the line to allow you to read the contents of the file.
inFile = ____ ('pets.txt','r')

Answers

Answer: Sorry I’m late but the answer is open

Explanation: Edge 2021

The missing part of the line allows you to read the contents of the file. inFile = Open ('pets.txt','r').

What is the file format?

The term file format refers to that, A standard way the information is encoded for storage in a computer file. It specifies how bits are used to encode information in a digital storage medium. File formats may be either proprietary or free.

The file format is the structure of that file, Which runs a program and displays the contents. As there are many examples like a Microsoft Word document saved in the. DOC file format is best viewed in Microsoft Word. Even if another program can open the file.

Therefore, By the File format allows you to read content and can open up the file format.

Learn more about  file format here:

https://brainly.com/question/1856005

#SPJ2

2. Media sharing websites let you post photos and videos to share with other people. What are the benefits and drawbacks of using these websites?

Answers

Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

What is company's website?

The website of the company is all web sites which is operated by any occupied company or via any occupied company conducts the business. Any business website is a website that is designed in such a way that it can represent the identity of a business on the internet.

Company's name and fame id totally depends upon advertisement and its products and websites play an important role in order to make company popular and due to this reason company used the website or designed the website in unique and knowledgeable manner.

Therefore, Media sharing websites let you post photos and videos to share with other people. The benefit is that we are up to date and get all the news as well as information worldwide.

Learn more about website here:

https://brainly.com/question/19459381

#SPJ2

which will touch the ground first an elephant or a rock?

Answers

Answer:

rock!

Explanation:

the rock is lighter so it will fall faster, hope this helps :)

Answer: Elephant.

Explanation:

A rock is lighter so it won't fall as easily!

An access point that conforms to the IEEE 802.11b standard behaves similarly to what other network device? a. Router b. Gateway c. Hub d. Terminal

Answers

The other network device is an access point that complies with IEEE 802.11b standards and functions similarly to Hub.

A network is a grouping of computers, servers, mainframes, network devices, peripherals, or other linked devices that enable data sharing. The Internet, which links millions of individuals worldwide, is an illustration of a network. An illustration of a home network with many linked computers and other network devices can be seen on the right.

The link between connected devices is referred to as network topology and is represented as a geometric graph. On the graph, devices are represented as vertices, and the connections between them are shown as edges. It explains the number, hierarchy, and order of connections that each device possesses.

Bus topology, mesh topology, ring topology, star topology, tree topology, and hybrid topology are examples of typical network configurations.

Learn more about network here:

https://brainly.com/question/14276789

#SPJ4

what will happen if you try to store duplicate data in a primary key column?

Answers

A primary key column is a type of column in a database table that has a unique value for every row in the table. It's used to one row from another, and it can't contain any duplicate data. When duplicate data is stored in a primary key column, it can cause various problems that can negatively impact the database's performance and functionality.

Duplicate data in a primary key column can cause several issues. The first and most obvious issue is that it violates the uniqueness constraint of a primary key. Primary keys are used to uniquely identify rows in a table, and if there are two or more rows with the same primary key value, it becomes impossible to distinguish between them. This can cause data integrity issues because it's difficult to tell which row is the correct one if there are multiple rows with the same primary key value.Duplicate data in a primary key column can also impact the database's performance. When a table has a primary key, the database creates an index on the primary key column. This index helps the database quickly locate and retrieve rows based on their primary key value. However, if there are duplicate values in the primary key column, the database has to search through all the rows that have the same primary key value. This can slow down the database's performance and make it more difficult to retrieve data.Another issue with duplicate data in a primary key column is that it can cause problems when inserting or updating data in the table. If you try to insert or update a row with a primary key value that already exists in the table, the database will throw an error. This can cause data inconsistencies and make it difficult to maintain the database's integrity.In conclusion, storing duplicate data in a primary key column can cause various issues, including data integrity issues, performance issues, and problems with inserting or updating data. Therefore, it's essential to ensure that a primary key column contains only unique values and doesn't have any duplicate data.

To know more about database  visit :

https://brainly.com/question/30163202

#SPJ11

you are developing javascript code for a power apps app. the code must display a message when the system saves a new record. you need to upload the code to the app. where should you attach the web resource?

Answers

Business rules are essentially used at every level to start some actions, such as showing or hiding something, requiring a field, etc. The chosen item will be an automated process, so in this instance we require that a message be displayed when a record is saved.

What is Javascript?

Every time a web page does more than simply sit there and display static information for you to look at displaying timely content updates, interactive maps, animated 2D/3D graphics, scrolling video jukeboxes, etc. you can bet that JavaScript is probably involved. JavaScript is a scripting or programming language that enables you to implement complex features on web pages. It is the third layer of the layer cake made up of common web technologies, the first two (HTML and CSS) of which we have already covered in great detail in other sections of the Learning Area.

To know more about Javascript, check out:

https://brainly.com/question/16698901

#SPJ1

When do we want to use correlation rather than using anova? please provide an example

Answers

Correlation and ANOVA (Analysis of Variance) are both statistical methods used to analyze relationships between variables. However, they are used in different situations.

Correlation is used when you want to measure the strength and direction of the linear relationship between two continuous variables. It helps to determine if there is a relationship and the degree to which the variables vary together.

Correlation is typically measured using the Pearson correlation coefficient, which ranges from -1 to 1.
On the other hand, ANOVA is used when you want to compare means between two or more groups. It helps to determine if there are any significant differences among the groups being compared.

ANOVA analyzes categorical independent variables (groups) and a continuous dependent variable.
In summary, you would use correlation when you want to measure the relationship between two continuous variables, while ANOVA is used when comparing means among different groups. Here's an example:
Let's say you are studying the relationship between hours of study (continuous variable) and exam scores (continuous variable). To understand if there is a linear relationship between these two variables, you would use correlation. On the other hand, if you wanted to compare the mean exam scores of students who study different amounts (e.g., less than 5 hours, 5-10 hours, more than 10 hours), you would use ANOVA.

For more such questions variables,Click on

https://brainly.com/question/30317504

#SPJ8

What are scientists going to explore next on Kepler-186f? A) evidence of the existence of life B) types of plant life that exist C) evidence of volcanic activity D) evidence of volcanic activity

Answers

Answer:

the answer is  a)

Explanation:

Answer:

the answer is a

Explanation:

can you imagine what life might have been like before the internet laptops and smartphones were part of everyday life what are some ways thst life was better, worse, or just different​

Answers

Answer:

no

Explanation:

it does not matches me

The communication would be different

compute the distance between the positions of the first and last zero element in the given array. for example, if the array is 3 0 1 0 4 9 5 0 6 your algorithm should yield 7 - 1

Answers

The distance between the first and last zero elements in the given array {`3 0 1 0 4 9 5 0 6`} is `7`.

To compute the distance between the positions of the first and last zero elements in the given array, we can follow the below approach.

1. Initialize two integer variables `first_zero` and `last_zero` to -1.

2. Iterate through the array of elements from start to end.

3. If the current element is zero and `first_zero` is still -1, then assign the index of the current element to the variable `first_zero`.

4. If the current element is zero and `first_zero` is not -1, then assign the index of the current element to the variable `last_zero`.

5. Once the iteration is done, compute the distance between the `first_zero` and `last_zero` by subtracting the index of `first_zero` from the index of `last_zero`.

6. The result obtained from step 5 is the distance between the positions of the first and last zero elements.

Let's apply the above approach to the given array.

Array Elements: `3 0 1 0 4 9 5 0 6`

Index: `0 1 2 3 4 5 6 7 8`

1. `first_zero` and `last_zero` are both initialized to -1.

2. Index 0: `3` is a non-zero element.

3. Index 1: `0` is a zero element, so assign the index 1 to `first_zero`.

4. Index 2: `1` is a non-zero element.

5. Index 3: `0` is a zero element, so assign index 3 to `last_zero`.

6. Index 4 to 8: All elements are non-zero.

7. Now, we have the `first_zero` index as 1 and the `last_zero` index as 3.

8. Therefore, the distance between the positions of the first and last zero elements is `last_zero - first_zero = 3 - 1 = 2`.

In conclusion, the distance between the positions of the first and last zero elements in the given array {`3 0 1 0 4 9 5 0 6`} is `7`. We achieved this by iterating through the array and finding the index positions of the first and last zero elements and then computing the distance.

To know more about array, visit:

https://brainly.com/question/16283725

#SPJ11

The distance between the positions of the first and last zero elements in the given array is 6.

Given an array 3, 0, 1, 0, 4, 9, 5, 0, 6. We need to compute the distance between the positions of the first and last zero element. The algorithm for the same will be as follows: Step-by-step solution:

We are given an array3 0 1 0 4 9 5 0 6

The first step is to find the index of the first occurrence of the zero elements in the array. Here, the first occurrence of the zero element is at index 1. So, the index of the first zero elements is 1. Next, we need to find the index of the last occurrence of the zero element in the array. Here, the last occurrence of the zero elements is at index 7. So, the index of the last zero element is 7. Now, we can compute the distance between the positions of the first and last zero element by taking the difference of their indices.

Thus, the distance between the positions of the first and last zero element is given by:

Distance = Index of last zero element - Index of first zero elementDistance = 7 - 1 = 6

Therefore, the distance between the positions of the first and last zero element in the given array is 6.

To know more about array refer for :

https://brainly.com/question/28061186

#SPJ11

write a program that allows the user to enter 10 songs and their artists into a playlist and will sort the entries by artist order. the program should use a 10 element array of structure objects that holds two string variables: artist and title. once the data has been read in and stored, it should sort the entries in ascending order by artist. it should then display the sorted array with appropriate headings.

Answers

Here's an example program in C++ that allows the user to enter 10 songs and their artists into a playlist, sorts the entries by artist order, and displays the sorted array:

#include <iostream>

#include <algorithm>

#include <string>

using namespace std;

// Define a structure to hold song data

struct Song {

   string artist;

   string title;

};

int main() {

   // Define an array of 10 Song objects

   Song playlist[10];

   // Prompt the user to enter the song and artist for each playlist entry

   for (int i = 0; i < 10; i++) {

       cout << "Enter artist for song " << i + 1 << ": ";

       getline(cin, playlist[i].artist);

       cout << "Enter title for song " << i + 1 << ": ";

       getline(cin, playlist[i].title);

   }

   // Sort the playlist entries by artist in ascending order

   sort(playlist, playlist + 10, [](const Song& s1, const Song& s2) {

       return s1.artist < s2.artist;

   });

   // Display the sorted playlist with appropriate headings

   cout << "\nSorted Playlist by Artist\n";

   cout << "-------------------------\n";

   for (int i = 0; i < 10; i++) {

       cout << "Artist: " << playlist[i].artist << endl;

       cout << "Title: " << playlist[i].title << endl;

       cout << "-------------------------\n";

   }

   return 0;

}

In this program, we first define a Song structure to hold the artist and title for each playlist entry. We then define an array of 10 Song objects to store the playlist entries.

We prompt the user to enter the song and artist for each playlist entry using a loop that iterates 10 times. We use the getline() function to read in the user input as a string.

Next, we use the sort() function from the <algorithm> library to sort the playlist entries by artist in ascending order. We use a lambda function as the third argument to the sort() function to specify the comparison logic for sorting the Song objects by artist.

Finally, we display the sorted playlist with appropriate headings using another loop that iterates 10 times. We output each Song object's artist and title fields and a separator to visually distinguish each playlist entry.

For more question on program click on

https://brainly.com/question/23275071

#SPJ11

a nat router connects a private network to the internet and uses global ip address . host on the private network sends an ip packet to a server at .

Answers

After leaving the sending host on the private network, source IP= 10.0.0.2 , and destination IP= 70.70.70.70, When the server's response leaves the server, source IP= 70.70.70.70, and destination IP= 60.60.60.60, When the server's response leaves the NAT router to go back to the private network source IP=  60.60.60.60, and destination IP= 10.0.0.2.

a.

When the IP packet leaves the sending host (10.0.0.2) on the private network, the source IP address in the packet header remains the same, which is 10.0.0.2.

The destination IP address is set to the IP address of the server, which is 70.70.70.70. This is because the private network uses its own private IP address range, and the NAT router will handle the translation of IP addresses.

Source IP 10.0.0.2

Destination IP 70.70.70.70

b.

As the server responds to the request, the source IP address in the packet header will be the IP address of the server, which is 70.70.70.70. The destination IP address will be the global IP address of the NAT router, which is 60.60.60.60.

This ensures that the response from the server is directed back to the NAT router.

Source IP 70.70.70.70

Destination IP 60.60.60.60

c.

When the server's response reaches the NAT router, it needs to be forwarded back to the original host (10.0.0.2) on the private network. The source IP address in the packet header will be the global IP address of the NAT router, which is 60.60.60.60.

The destination IP address will be the IP address of the original sending host on the private network, which is 10.0.0.2.

Source IP 60.60.60.60

Destination IP 10.0.0.2

The question should be:

1.  A NAT router connects a private network to the Internet and uses global IP address 60.60.60.60. Host 10.0.0.2 on the private network sends an IP packet to a server at 70.70.70.70.

a. What will be the source and destination IP addresses in the packet header after it leaves the sending host on the private network?

Source IP _______________________________________

Destination IP ________________________________________

b. What will be the source and destination IP addresses in the packet header when the server’s response leaves the server?

Source IP _______________________________________

Destination IP ________________________________________

c. What will be the source and destination IP addresses in the packet header when the server’s response leaves the NAT router to go on to the private network?

Source IP _______________________________________

Destination IP ________________________________________

To learn more about IP address: https://brainly.com/question/14219853

#SPJ11

Gve an example of where data collection may become an issue
regarding ethics for a certified fraud examiner?

Answers

Answer:

Explanation:

One example where data collection may become an ethical issue for a certified fraud examiner is when gathering personal information about individuals who are not directly involved in a fraud investigation but have incidental involvement or peripheral association.

In the process of investigating fraud, certified fraud examiners may need to collect and analyze various types of data, including financial records, transactional data, and personal information. While collecting data directly related to the fraud case is generally considered necessary and legitimate, collecting excessive or unnecessary personal information about individuals who are not directly implicated in the fraud can raise ethical concerns.

For example, if a certified fraud examiner is investigating a case of embezzlement in a company, they may collect financial records and transactional data of the suspected employee. However, if during the investigation, they start gathering personal information about the suspect's family members, friends, or colleagues who are not implicated in the fraud, it could be considered an invasion of privacy and unethical.

Ethical guidelines for certified fraud examiners emphasize the importance of collecting and using only relevant and necessary information for the purpose of the investigation. Excessive data collection, especially when it involves personal and sensitive information, can infringe on individuals' privacy rights and potentially harm their reputation.

To maintain ethical standards, certified fraud examiners should focus on data collection that is directly relevant to the fraud investigation and limit the scope of personal information collected to what is strictly necessary. They should also ensure compliance with applicable privacy laws and regulations, and obtain informed consent when necessary.

Overall, ethical considerations in data collection for certified fraud examiners require striking a balance between gathering necessary evidence for the investigation and respecting the privacy and rights of individuals who are not directly involved in the fraud.

learn more about data collection here :

https://brainly.com/question/32370370

#SPJ11

guys do you know any websites that rewrites you text so you don’t get plagiarism?

Answers

it’s called typewrite.com !!!

Which of the following code snippets will select all tags on a page and give them a height of 200 pixels?

tag="img" {
height: 200px;
}
img {
height: 200px;
}
{
height: 200px;
}

Answers

The code snippet that will select all tags on a page and give them a height of 200 pixels is:

**img {

height: 200px;

}**

In CSS, the "img" selector targets all `<img>` tags in the HTML markup. By specifying the desired height of 200 pixels using the "height" property and the unit "px" (pixels), this snippet will apply the height styling to all image tags on the page.

The other two code snippets you provided are not valid CSS syntax. The first snippet ("tag="img" { height: 200px; }") is incorrect because the "tag" part is not a valid CSS selector. The second snippet ("{ height: 200px; }") is also invalid because it lacks a selector to specify which elements to target.

Lean more about CSS here :

https://brainly.com/question/14152823

#SPJ11

An example of a technological innovation that increased the country’s natural resource base is.

Answers

The oil drill is an illustration of a technological advancement that enhanced the nation's natural resource base.

What does the term "technology innovation" mean?A new or enhanced product or procedure with considerably better technological features is referred to as a technological innovation. New products (product innovations) or processes (process innovations) that have been commercialized constitute technologically implemented product innovations.An expanded definition of innovation is technological innovation. Although innovation is a fairly well-defined notion, many people—especially those in the academic and corporate worlds—understand it to mean different things. Technological breakthroughs including wind turbines, photovoltaic cells, concentrated solar power, geothermal energy, ocean wave power, and many other recent innovations are included in the innovations. Innovation in technology benefits society. By bringing new, better products and services to the populace, it raises productivity and raises the level of living for everyone. Innovation's advantages sometimes take time to manifest. They frequently affect the entire population in a wide sense.

To learn more about technological innovation, refer to:

https://brainly.com/question/19969274

#SPJ4

how do you award a brainliest

Answers

Answer: Usually there has to be 2 answers. When you go to the answers on your question there should be a outlined crown or something like that, then you click that.

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

You created a pivotchart showing sales by quarter by sales rep. How do you remove a sales rep from the chart without deleting the data?.

Answers

To remove a sales rep from the PivotChart without deleting the data, you can follow the given steps:

1. Firstly, you need to open the PivotTable Field List by clicking anywhere inside the chart.

2. Now, on the right side of the window, you will see the PivotTable Fields.

3. In this list, uncheck the sales rep whose data you want to remove.

4. Finally, after unchecking, click on the OK button.

As a result, the sales rep will be removed from the PivotChart.

You can also use the filter option to remove a sales rep from the chart. To do so, follow the given steps:

1. Firstly, click anywhere on the chart and select the Analyze tab from the ribbon.

2. Now, in the filter section, select the sales rep that you want to remove.

3. After selecting, right-click on it and select the Hide option.

4. Finally, the sales rep will be removed from the PivotChart by using the filter option.200 words.

To know more about PivotChart visit:

https://brainly.com/question/28927428

#SPJ11

When I want to view the Internet, I use this tool that converts html code into a visual format for users to view and interact with

URL
search engine
directory
browser

Answers

Answer:

browser

hope this helps

which protocol provides a way to transfer files from one computer to another over any tcp/ip network, such as a lan or the internet?A)IPB)UDPC)FTPD)TCP

Answers

The FTP protocol allows you to transfer files from one computer to another across any TCP/IP network.

What is FTP protocol?

FTP, or File Transfer Protocol, is a standard network protocol used for transferring files between servers and clients on the internet. It was one of the earliest protocols developed for the internet and is still widely used today.

FTP operates on two channels: the control channel for sending commands and responses between the client and server, and the data channel for transferring files. FTP supports various authentication methods, including anonymous access and user authentication via username and password.

While FTP is a reliable and efficient way to transfer files, it is also considered less secure than newer protocols like SFTP and FTPS, which add encryption for data transmission.

To learn more about FTP protocol, visit: https://brainly.com/question/30725806

#SPJ1

What are the differences and similarities between a local area network (LAN) and a wide area network (WAN)?

As the different network types have evolved, careers in the Network Systems pathway have changed over time. Discuss an example of how network system careers have changed and how those changes have impacted society.

What is an Internet Service Provider? Describe at least two types of ISP connections.

Explain two ways that you can stay safe while working in the Network Systems career pathway.

There are many different careers available within the Network Systems career pathway, but they all have some similar characteristics. What are two of these characteristics?

Answers

Local Area Networks (LANs) and Wide Area Networks (WANs) differ in terms of scope, ownership, speed, cost, and security. LANs cover a smaller area, are privately owned, offer higher speeds and greater bandwidth, are cost-effective, and have more control over security.

The  differences and similarities between a local area network (LAN) and a wide area network (WAN)?

On the other hand, WANs span larger distances, involve multiple organizations, may have slower speeds and limited bandwidth, require more infrastructure and connectivity options, and carry higher security risks.

Network system careers have evolved with the rise of cloud computing and virtualization, shifting from traditional networking to managing virtual networks and cloud platforms. This change has enabled more flexible and scalable IT infrastructure, facilitated remote work and collaboration, and promoted the growth of cloud-based services, impacting society positively.

An Internet Service Provider (ISP) is a company that provides internet access. DSL utilizes telephone lines for connectivity, while cable internet uses coaxial cable TV infrastructure. Staying safe in the Network Systems career pathway involves implementing security measures like strong passwords and regular updates, as well as staying informed and educated about security threats and industry trends.

Characteristics of Network Systems careers include technical expertise in areas such as network protocols and troubleshooting, as well as the need for continuous learning and adaptability to keep up with evolving technologies and industry standards.

Read more on WLAN here https://brainly.com/question/27975067

#SPJ1

The physical components of a computer are called hardware

Answers

Answer: Yes

Explanation:

Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. It is very important to have these parts, without them, your computer will not work.

The physical components of a computer are called "hardware."

Computer hardware refers to all the tangible parts of a computer system that you can see and touch. These components work together to process data and perform tasks.

Some common examples of computer hardware include:

1. Central Processing Unit (CPU): The CPU is the "brain" of the computer, responsible for executing instructions and performing calculations.

2. Random Access Memory (RAM): RAM is the temporary memory used to store data and instructions that the CPU is currently processing.

3. Hard Disk Drive (HDD) or Solid-State Drive (SSD): These are storage devices used to store permanent data and files on the computer.

4. Motherboard: The motherboard is the main circuit board that connects and allows communication between various hardware components.

5. Graphics Processing Unit (GPU): The GPU handles graphics and video processing, making it essential for tasks like gaming and video editing.

6. Power Supply Unit (PSU): The PSU supplies power to the various components of the computer.

7. Monitor: The monitor is the display screen that allows users to see the output from the computer.

8. Keyboard and Mouse: Input devices used to interact with the computer and input data.

9. Optical Drives: These devices are used to read and write CDs, DVDs, and Blu-ray discs.

Learn more about computer Hardware here:

https://brainly.com/question/32263857

#SPJ6

The question attached here seems to be incomplete, the complete question is:

The physical components of a computer are called ________.

Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest

Answers

Answer:

Motion sensor.

Explanation:

I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor

HOW MANY PROGRAMMING LANGUAGES SHOULD I LEARN TO MAKE A GAME LIKE AGAR.IO, SLITHER.IO ETC

Answers

Answer:

learn to make slither

Explanation:

it is such a cool game

also please can you heart and like my comment and rate it 5 stars please and give it brainliest pls i beg you thx !!!

Answer:

u could learn one as simple as scratch program language the one with the orange cat

Explanation:

coding is really hard i do not understnad java at all

A pre-deployment message appears at the start of a patch job. You have to create a deployment job for a windows user wherein he will receive a notification message to the user indicating that a reboot is required. What communication option will you select?

Answers

Simply select Deployment Job under Jobs > New Job. You can also select the assets you wish to apply the updates on by going to the Assets page.

Which of the following qualys programmes or services allows for the creation of patch jobs?

Qualys Patch Management effectively associates vulnerabilities with fixes and necessary configuration adjustments, and automatically generates "patch jobs" that are prepared for deployment and may be scheduled and executed automatically.

Which approach to patch deployment is advised?

Patching software called Endpoint Central offers a thorough overview of the network's strong and weak points. Desktop administrators can apply all the missing fixes to a particular group of networked systems by using the system-based deployment option.

To know more about assets visit:-

https://brainly.com/question/14434545

#SPJ1

Which combination of options is the keyboard shortcut to access the find dialog box and search a worksheet for particular values? ctrl h ctrl r ctrl f ctrl e

Answers

A hot key is a key or group of keys on a computer keyboard that, when pressed simultaneously, carry out a task (such launching an application) more quickly than a mouse or other input device.

What is the uses of shortcut keys ?

The Find and Replace dialog box, which enables you to look for a specific value in your worksheet and replace it with another value, is opened by pressing the keyboard shortcut Ctrl + F. Additionally, formatting can be found and changed with this shortcut.The function keys and keyboard shortcuts in Word for Windows are discussed in this article.

The Find tab appears in place of the Replace tab when using the CTRL+H keyboard shortcut or the Replace button on the ribbon to open the Find and Replace dialog box.Pressing Ctrl + R will refresh (reload) the current web page in all popular Internet browsers, including Chrome, Edge, Firefox, and Opera.To choose the search box, use Ctrl + E.

To learn more about shortcut key refer to :

https://brainly.in/question/135577

#SPJ4

a form of database specification that indicates all the parameters for data storage that are then input to database implementation is:

Answers

Physical is a variety of database specification that details every aspect of data storage that will be used to inform database implementation.

What specifies the traits of the data and the linkages between the data collected in the database?

The features of the data and the network of connections that binds the data together in the database are described by the metadata. The DBMS is the sole mechanism to access data stored in a database.

In a DBMS table, which of the following are utilized to represent the attributes?

Elliptical shapes are used in DBMS to represent attributes. Any number of characteristics may be present in an entity, but only one of those attributes is thought to be the primary key attribute. In DBMS, there are various sorts of attributes: straightforward, composite, single-valued Attributes that are multi-valued, stored, derived, key, and complex.

To know more about database specification visit:

https://brainly.com/question/29995583

#SPJ4

1. The correct definition of ergonomics is: (a) The correct way to position your feet when in front of electronic equipment. (b) How to use a computer to view safety software. O (c) The creation and adjustment of products and systems, so that they are comfortable and safe for day to day use. (d) The creation of products and systems that will not be so comfortable so as to cause the user to fall asleep while using it.​

Answers

Answer:

I'd assume it's C.

Explanation:

hope this helps!

Other Questions
The dataset Toyota Corolla.csv contains data on used cars on sale during the late summer of 2004 in the Netherlands. It has 1436 records containing details on 38 attributes, including Price, Age, Kilometers, HP, and other specifications. a. Explore the data using the data visualization capabilities of R.Which of the pairs among the variables seem to be correlated? b. We plan to analyze the data using various data mining techniques described in future chapters. Prepare the data for use as follows: i. The dataset has two categorical attributes, Fuel Type and Metallic. Describe how you would convert these to binary variables. Confirm this using R's functions to transform categorical data into dummies. ii. Prepare the dataset (as factored into dummies) for data mining techniques of supervised learning by creating partitions in R. Select all the variables and use default values for the random seed and partitioning percentages for training (50%), validation (30%), and test (20%) sets. Describe the roles that these partitions will play in modeling. Antiques R Us is a mature manufacturing firm. The company just paid a dividend of $10.15, but management expects to reduce the payout by 4 percent per year indefinitely. If you require a return of 15 percent on this stock, what will you pay for a share today Question 3Which of the following best describes an algebraic expression that contains no like terms and no parentheses?Multiple choice question.cross outA)factoredcross outB)constantcross outC)equivalentcross outD)simplest form Excuse me brainly, May i have your help..? I will give you the brainiest! Determine the equation for the line of best fit to represent the data.scatter plot with points going down from about zero comma 4 to the right to about 7 comma zero y equals two thirds times x plus 4 y equals negative two thirds times x plus 4 y equals negative three halves times x plus 4 y equals negative two thirds times x minus 4 In an interview in July 2020, during the Covid-19 pandemic, Federal Reserve Bank of Dallas President Robert Kaplan stated: "I just don't want to pull out one objective ____pulling out inflation without regard to other considerations, and without regard to the second part of the dual mandate." What was Kaplan referring to as the second part of the dual mandate"? A. Low taxes OB. High employment OC. High exchange rates OD. Low interest rates change 28/2 to a equal fractoin If overhead is underapplied, it means that individual jobs have been charged too much during the year and the cost of goods sold reported is too high. true /false Suppose A, B, and C are independent events. Moreover, P(A) = 0.57, P(B) = 0.78, and P(C) = 0.55. Given that both B and C happen, what is the probability of A happening? 1Who is responsible for writing one of the earliest compendiums of constellations in a book called Almagest?.David AttenboroughB.the Druids in Northern EuropeOC.Roman astronomer PtolemyODthe Maori people of OceaniaResetNext The selling price of a skateboard is 147 $. The store has 75% markup policy. What uis the selling price of the skateboard gumballs instructor has given the class an assignment to briefly describe themselves. the instructions asks gunball to think about personality attributes, physical appearance, abilities U2 - 7Suppose Bank One offers a? risk-free interest rate of 5.5 % on both savings and loans and Bank Enn offers a? risk-free interest rate of 6.0 % on both savings and loans.a. What arbitrage opportunity is? available?student submitted image, transcription available belowb. Which bank would experience a surge in demand for? loans? Which bank would receive a surge in deposits?c. What would you expect to happen to the interest rates the two banks are? offering? 500 word essay about coronavirus 1. A group of 12 students goes on aschool field trip. Of all the studentson the trip, 6 are in third grade.Which fraction is equivalent to?A. 1/3B. 1/4C. 1/6D. 1/2 Gold is frequently used for jewelry or coins where it is melted and cast into forms. Gold has a melting point of 1337.33K and a heat of fusion of 2.99 kcal/mol. Calculate the entropy change for melting one mole of gold. Your friend meets you for coffee one day driving a brand new motor scooter. You immediately fall in love with it and offer them $2,000 for it. Your friend politely declines and states they paid $3,000 but goes on to say i may sell you my scooter, if you pay $2,700. If your friend later refuses to go through on the deal, can you hold them liable for breach of contract?. Paid cach Rs 900 after deducting 10% cash discount I dont know this please help me In the past month, Lisa rented 7 video games and 1 DVD. The rental price for each video game was $2.30. The rental price for the DVD was $3.80. What is the total amount that Lisa spent on video game and DVD rentals in the past month? The biggest threats to christmas island crabs during their annual migration are _______. a. dogs c. automobiles b. cats d. fences please select the best answer from the choices provided a b c d