Universal Containers maintains Job information in a Custom Object that contains sensitive information. The only users who should be able to view and edit job records are the user who owns the record and all users in the Delivery profile.Which three platform sharing tools are required to support the above requirements? A. "Modify All" permission for Job Object on the Delivery Profile
B. "View All Data" profile permission on the Delivery Profile
C. Grant Access Using Hierarchy sharing setting on the Job Object set to false
D. Criteria-Based sharing rule for the Delivery Profile on the Job Object
E. Organization-Wide Default sharing setting of Private on the Job Object

Answers

Answer 1

Answer:

C. Grant Access Using Hierarchy sharing setting on the Job Object set to false.

A. "Modify All" permission for Job Object on the Delivery Profile.

E. Organization-Wide Default sharing setting of Private on the Job Object.

Explanation:

In this example, we are dealing with sensitive information. We learn that because of this, the only users who should be able to view and edit job records are the user who owns the record and all users in the delivery profile. In order to protect the information, it is necessary to have an organization-wide default sharing setting of private. After this, we also need the "modify all" permission for job object on the delivery profile and the Grant Access Using Hierarchy sharing setting to be set to false.


Related Questions

An optimal solution to a linear programming problem MUST lie A. somewere on the line between two corner points. B. somewhere outside of the feasible region. C. somewhere in the interior of the feasible region. D. at the intersection of at least two constraints.

Answers

Answer:

D. at the intersection of at least two constraints.

Explanation:

Linear programming is an optimization technique which is fine for the purpose of getting the best solution such as maximizing profit or certain o 4th era quantities. It is fine by modelling real life problems into mathematical models that have linear relationships or constraints such as in the form of objective functions. In linear programming, an objective function defines the formula for quantity optimization and the goal from this is to determine variable values that maximize or minimize the objective function depending on the problem robbery solved.

A stack is initially empty, then the following commands are performed: push 5, push 7, pop, push 10, push 5, pop, which of the following is the correct stack after those commands (assume the top of the stack is on the left)? A. 5, 10, 7, 5.
B. 5, 10.
C. 7, 5.
D. 10, 5.

Answers

Answer:

d

Explanation:

You have a server with Windows Server 2012 R2 installed on Disk 0, a basic disk. You use the server to store users' documents. You have two more disks that you can install in the server. What should you do if you want to provide fault tolerance for users' documents

Answers

Answer:

Create a RAID 1 volume from Disk 1 and Disk 2.

Explanation:

To provide fault tolerance for users' documents we should create a RAID 1 volume from Disk 1 and Disk 2.

___________provides vital protection and maintenance services for system hardware and software, including enterprise computing systems, networks, transaction processing systems, and corporate IT infrastructure.a. User support
b. Database administration
c. Systems support and security
d. Network administration

Answers

Answer:

C) System support and security.

Explanation:

The aspect of systems support and security in ICT has to do with troubleshooting, fixing and installation of computer system software and hardware of many different types.

It also involves the monitoring and implementation of security measures to protect networks, systems and information.

Also, innovation of security architectural designs and identification and resolution of the causes of security threats and application of effective secured enhancements.

It also has to do with the testing of security softwares for possible breaches and fixing them if found.

System support specialists and security engineers work in these fields and are responsible for these roles. They may work independently or sometimes in groups, brainstorming and contributing creative ideas for their companies.

Windows 10 features a storage solution called Storage Spaces. What is the name of the Storage Spaces feature that allows allocating space for redundant information using options that include two-way mirroring, three-way mirroring, and parity

Answers

Answer:

Data resiliency.

Explanation:

Spaces for storage may involve resilience to the information. Selecting a resiliency solution implies whether they assign capacity towards redundant details. The information resiliency choice regarding storage facilities.

Two-way mirror needs two capacity units or more. The information is engraved on both computers. Two-way mirror enables twice the volume of storage assigned to that of the storage capacity as such system capacity. This choice will prevent you against loss of a specific storage unit.

Assuming that a user enters 5 as the age, what is the output of the following code snippet? int age = 0; Scanner in = new Scanner(System.in); System.out.print("Please enter your age: "); age = in.nextInt(); if (age < 10) { System.out.println("Kid"); } if (age < 30) { System.out.print("Young"); } if (age < 70) { System.out.print("Aged"); } if (age < 100) { System.out.print("Old"); }

Answers

Kid
YoungAgedOld

It will print out this way because the code uses if statements, rather than else if statements. As written, every single if statement will be triggered because each expression will evaluate to true. If there were else statements involved, then only the first one that is triggered will print out, and the rest will be ignored.

The reason for the weird formatting/spacing is because only the first print statement is println which adds a new line after printing. The other statements are just print, which does not add a new line or a space.

A website that sells high-end ties notices that its ads are showing up for searches that include "cheap". Because its ties are expensive, it does not want its ads to show up for searchers using the word "cheap". What should this advertiser do?

Answers

Answer: Add "cheap" to the negative keyword list.

Explanation: Pretty self explanatory, by adding a negative keyword It should not use that word if searched to find people to advertise to.

What happened if the offshore team members are not able to participate in the iterations demo due to timezone/infrastructure issues?



a) No issues. Onsite members can have the iteration demo with the product owner; it a single team anyway.



b) Offshore members will miss the opportunity to interact with product owner and get the direct feedback about the increment they created.



c) No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.



d) It is a loss as the offshore members will not be able to contribute to the ideas releated way of working

Answers

What happened if the offshore team members are not able to participate in the iterations demo due to timezone/infrastructure issues-(c) No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.

Explanation:

No Major issue. Since offshore lead and onsite members participate in the demo with the product owner, they can cascade the feedback back to the offshore members.

From the above statement it is clear that in case the offshore team members are not able to participate in the demo with the product owner due to timezone/infrastructure issues it want be a big issue since the onsite members of the team will participate in the demo and they can give all the valuable knowledge and feedback to the offshore members.As they all are part of the very same team

Hence the option(3) is the correct option

Of the measures of feasibility in the accompanying figure, ____ considers points such as "Does the proposed platform have sufficient capacity for future needs?" and "Will the hardware and software environment be reliable?"
a. schedule feasibility
b. technical feasibility
c. economic feasibility
d. operational feasibility

Answers

Answer:b. technical feasibility

Explanation: Technical feasibility is an important tool for both troubleshooting and maintenance,it is the process through which an expert evaluates a process or a product in order to determine what can either be achieved or to the extent to which a certain action will lead to a tangible result.

Technical Feasibility is one of the most important factor when making decisions on the use of materials or equipments in a particular environment or condition.

The computer program that Josh is working on presents him with a sentence in which a word has been underlined. Josh has to indicate the part of speech represented by the underlined word. After receiving feedback about the correctness of his response, Josh is given another sentence with an underlined word. This description best illustrates what type of computer-based instruction (CBI) program?

Answers

Answer:

Drill and practice.

Explanation:

That system program for which Josh works provides himself with such a sentence stressing a phrase. He must signify that portion of speech described by that of the term that has been emphasized.  

He being provided a further statement with such an underlined term while getting suggestions regarding the current consistency for his answer This definition is the best demonstration of CBI system Drill and practice.

A recent antivirus scan on a server detected a Trojan. A technician removed the Trojan, but a security administrator expressed concern that unauthorized personnel might be able to access data on the server. The security administrator decided to check the server further. Of the following choices, what is the administrator MOST likely looking for on this server?
a. Trojan
b. spyware
c. adware
d. ransomware

Answers

Answer:

B. Spyware

Explanation:

Spywares are silent software that steals sensitive information such as internet or company data, and other similar information. They are oftentimes unnoticed and supply stolen data to external users, data centers or advertisement companies.

Sophisticated spyware can go as far as installing software to manipulate your settings or use passwords on your behalf.

Even though the Trojan was detected in our scenario, The Trojan would have created a backdoor to allow spyware in. This spyware will not be easily noticed by the technician or the antivirus, however, it could be more devastating than the Trojan.

That is why the security administration expresses concern over a breach despite the removal of the Trojan.

You place a new disc in an optical drive, and then double-click the drive in the operating system's file browser interface. An error message appears stating that the drive is not accessible. What should you do

Answers

Answer:

Wait. Then you try it again

Explanation:

You wait and try again later and if this still persists, you may have to check the optical drive from the drive manager peradventure there is an issue there probably a software issue, also you may have to clean the optical drive using the cleaner disc, likewise you may need to test an old disc on the optical drive to be sure the fault is not from the disc you inserted.

Nielsen purchases scanner data from retail transactions to track the sales of consumer packaged goods, gathered at the point of sale in retail stores of all types and sizes. Scanner data is an example of:

Answers

Answer: syndicated external data.

Explanation: This brings us to the definition of syndicated data :-

Syndicated data refers to general market data that is not specific to any particular client, rather a compilation of retailer and product data, syndicated data is generally collected by market research firms and then bought by businesses who have developed interest in the market.

Samantha was hired to perform an internal security test of company XYZ. She quickly found that all networks are making use of switches instead of traditional hubs. This greatly limit her ability to perform network sniffing for information gathering. Which of the following techniques could she use use to gather information from the switched network or to disable some of the traffic isolation feature of the swtich?a. sniff in promiscuous mode b. ethernet zapping c. ARP spoofing d. TCP session hijacking

Answers

Answer:sws

Explanation:swwswswsswswsw

You are flying on an ifr flight plan at 5500 feet with a vfr on top clearance when you encounter icing. you know there is clear air above and you request 9500 feet from atc they deny the request. A. Yes, you are still IFR with a VFR-on-top clearance.
B. No, you are now VFR.
C. No, your VFR-on-top clearance has been canceled.

Answers

Answer:

A. Yes, you are still IFR with VFR-on-top clearance

Explanation:

Instrument Flight Rules (IFR) and Visual Flight Rules (VFR) are regulations controlling the operations of civil aviation. Pilots use these terms as well to describe their flight plan.

When your request is rejected to fly 9500 feet from atc, your VFR-on-top clearance is still active and you are still IFR.

Microsoft ____________________ is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.

Answers

Answer:

Internet Security & Acceleration Server (ISA)

Explanation:

Fill in the blanks

Microsoft Internet Security & Acceleration Server (ISA) is a complex, full-featured firewall that includes stateful packet filtering as well as proxy services, NAT, and intrusion detection.

You are tasked with accumulating survey data on a web page and are responsible for it being free from dirty data once you close the survey and get the data to the researching team. Which is the best way to handle the possibility of dirty data?

Answers

Answer:

Build a website that validates data as the survey participant takes the survey.

Explanation:

Whenever a user is charged towards gathering survey information on such a webpage and seems to be liable for freeing this against bad data when the survey is closed as well as the data will be sent to the testing group.

Creating a platform that validates information is just the easiest approach to tackle the risk of bad results as when the research user completes the test.

The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make use of the four-model approach, which of the following is a likely outcome?
A. It will not be possible to get ac clear picture of the current system functions before modifications are made.
B. Time taken to develop the model increases.
C. The requirements of a new information system will always be different from the current information system.
D. Costs need to develop a logical and physical model of the current system will be less.

Answers

Answer:

B

Explanation:

...if they make use of the four-model approach, the time taken to develop the model would increase.

Cheers

Which collaboration technology is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies?

a) Intranet
b) Wikis
c) VoIP
d) Social networking sites
e) Unified communications

Answers

Answer:

d) Social networking sites

Explanation:

-Intranet is a network that is created by an organization to share information, tools and different services inside the company.

-Wikis are websites used to share content and knowledge and different users can modify the information.

-VoIP is a technology that allows you to make calls over the internet.

-Social networking sites are online platforms that allow people to connect with organizations and other people, create communities online and share different types of information.

-Unified communications is a system that has different communication methods through a single application.

According to this, the collaboration technology that is becoming more and more popular within organizations because it provides a means for forming ad hoc groups, networking and locating potential business allies is social networking sites.

Suppose the beta of Microsoft is 1.13, the risk-free rate is 3 percent, and the market risk premium is 8 percent. Calculate the expected return for Microsoft.

Answers

Answer:

8.65%

Explanation:

Rj = Rf + risk premium.

Rj = Rf + β[E(RM − Rf)].

= 3 + 1.13 (8 - 3)

= 3 + 1.13 x 5

= 3 + 5.65

= 8.65 percent

This relationship between risk and expected return is called the security market line.

The expected return for Microsoft, using CAPM and the given risk-free rate, beta, and market risk premium, is 12.04 percent.

To calculate the expected return for Microsoft, given that the beta of Microsoft is 1.13, the risk-free rate is 3 percent, and the market risk premium is 8 percent, we can use the Capital Asset Pricing Model (CAPM). The CAPM formula is:

Expected Return = Risk-Free Rate + (Beta Times Market Risk Premium)

Plugging in the given values:

Expected Return = 3% + (1.13 Times 8%)

Expected Return = 3% + 9.04%

Expected Return = 12.04%%

Therefore, the expected return for Microsoft is 12.04% percent.

When sending the right email, there are three key things you’ll need to understand: why you are sending that email, your goal, and the value you’re delivering to the person on the other end of the send. This gives you the foundation to __________.

Answers

Answer:

Explanation:

the required expectations with the receiver by setting an

appropriate and contextual goal and then aligning it with information that will

provide the most value

The analysts at Techno Info Systems are considering the four-model approach to system development for a new client. If they make use of the four-model approach, which of the following is a likely outcome?
A. It will not be possible to get ac clear picture of the current system functions before modifications are made.
B. Time taken to develop the model increases.
C. The requirements of a new information system will always be different from the current information system.
D. Costs need to develop a logical and physical model of the current system will be less.

Answers

Answer:

Option B is correct.

Explanation:

Within Techno Info Systems the user has been analyst contemplating that four-model concept towards computer development for such its new customer. When they adopt that four-model method, thus the result seems to be the time taken to implement the rises in the method.

So, therefore the other options are incorrect according to the following scenario.

Final answer:

Using the four-model approach to system design likely leads to an increase in the time taken to develop the model, as it entails creating complex and detailed models to replace the real system for analysis.

Explanation:

If the analysts at Techno Info Systems employ the four-model approach to system development for a new client, a likely outcome is that time taken to develop the model increases. This approach involves creating different models, each with its purpose and complexity. For instance, understanding ecosystem dynamics necessitates analytical and simulation models that can predict the consequences of changes within an ecosystem. Similarly, a four-model approach in system development requires meticulous detail, and this extensive modeling aims to replace the real system with an easier-to-examine version, ultimately providing more reliable predictions and a detailed design.



However, as the complexity of models increases with the aim of better accuracy and understanding, it also often leads to longer development times. While the models serve to understand the system before making modifications, a more detailed four-model approach means investing more time to build and analyze each model. One must balance the drive for comprehensive understanding against the requirement to deliver results in a timely manner.

The next generation of 3-D video will be based on _____ technology, where a viewer will be able to get different views of the scene by moving her head or walking around the display. This will involve dynamic depth cues that result from the viewer’s own motion, not just from the motion of objects in the scene.

Answers

Answer:

Virtual Reality Technology

Explanation:

Virtual reality is a simulation based computer technology which imitates the real world and provides real life like experience. One of the key  applications of virtual reality is 3D video games where users use VR headsets and get immersed into the world of simulated reality. VR technology also incorporates sensory inputs from the user, their physical movement gets translated in real time and they can move around and interact with various features. They can also sense dynamic depth which provides a real world experience.

What is the name of the virus that appears to be a legitimate program but when opened

Answers

Answer: trojan horse virus

Explanation:A trojan horse is a non-replicating program that looks legitimate, but it is actually used to perform malicious and illicit activities when launched. Attackers use trojan horses to steal a user's

personal information like password information, or they may simply use it to destroy programs or data on the hard disk.

You need to connect a workstation to a switch using a regular port on the switch (not an uplink port). The switch does not support auto- MDI. Which type of cable should you use.

Answers

Answer:

The correct answer to the following question will be "Straight-through ".

Explanation:

It's a kind of twisted-pair wire used for interact a device to a networking center like a modem  or router in LAN.

By linking two separate kinds of connected devices, use this cable.This connection is often applied to this as a repaired cable, too.

So, it's the right answer.

Use of the Internet for recruiting is: a. popular with job seekers, but not recruiters. b. the most commonly used search tactic by job seekers and recruiters. c. cheaper and easier, but less effective than other methods. d. popular with recruiters, but not job seekers.

Answers

Answer:

the most commonly used search tactic by job seekers and recruiters.

Explanation:

Internet is used in various ways and both job seekers and recruiters can take advantage of this to look for jobs and hire respectively.  Most business use this platform to help open doors to very many candidates. Almost everything nowadays in most situations is conducted online, from posting job ads, to emailing successful candidates to setting up interviews through video calls. Posting a job ad online widens the radius for interested candidates and most businesses are not constrained while trying to look for the perfect applicant. In America alone, almost 80% of Americans take leverage of the online resources to look for open job positions.

After class, Anita and Bev make plans to study for their psychology exam together but cannot decide on a time or location. In addition, Anita realizes that she left her phone in her apartment. Anita and Bev change their mind and agree that it is easiest simply to meet at Bev's dorm. Bev gives Anita her room number and passcode. Anita likely will be able to retain this information in short-term memory, without additional processing, for:_________.a. a second or lessb. 30 seconds or lessc. about two minutesd. a maximum of five minutes

Answers

Answer:

Option B; 30 SECONDS OR LESS.

Explanation:

Short-term memory, also known as primary or active memory, is the information we are currently aware of or thinking about.

When short-term memories are not rehearsed or actively maintained, they last mere seconds.

Most of the information kept in short-term memory will be stored for less than 30 seconds (approximately 20 to 30 seconds), but it can be just seconds if rehearsal or active maintenance of the information is not done.

Therefore, Anita likely will be able to retain the information in short-term memory, without additional processing, for 30 SECONDS OR LESS.

What does it mean for a wireless network to be operating in "infrastructure mode"? If the network is not in infrastructure mode, what mode of operation is it in, and what is the difference between that mode of operation and infrastructure mode?

Answers

Answer and Explanation:

Within the following operating mode, most of the wireless controller remains linked through the main point (access point) for that broader server. The server runs within ad-hoc modes when this does not run under the following mode. Wireless servers wouldn't have the connectivity to interact within ad-hoc mode.

So, the following statement is correct according to the given scenario of the following mode.

You work as the IT administrator for a small corporate network. One of the company employees needs to add an additional PCI card to the motherboard. When you open the computer, you see that the card purchased will not fit due to the card's height.

Answers

Final answer:

The question involves a compatibility issue with a PCI card's installation in a small corporate network's computer system. It requires an understanding of the technical specifications and form factors of both the motherboard and the PCI card to resolve the problem.

Explanation:

The subject of the question pertains to installing additional hardware in a computer, specifically within the context of Computers and Technology. The scenario at hand deals with a physical compatibility issue between a PCI card and the available space on the motherboard concerning the card's height. It is important to recognize that there are different sizes of PCI cards, including standard and low-profile cards, and they must match the specifications of the available slots to ensure a proper fit. This might require purchasing a different type of PCI card or utilizing a different slot that accommodates the card's dimensions.

Your networking card is crucial for connecting your system to a network but encountering a compatibility issue requires quick problem-solving to maintain productivity in a corporate environment. The key to resolving this issue lies in understanding the technical specifications of the motherboard and the PCI card, and then taking appropriate action either by exchanging the card for one with the correct form factor or modifying the arrangements inside the case if possible and if not against company policy.

You upgrade your network to 1000 Mbps from 100 Mbps. You install a new 1000-Mbps network adapter into your Windows system. You check the device manager and see no errors or warning. You configure the TCP/IP settings to be as they were for the previous network adapter. Upon restarting the computer, you cannot access the network. You ping your IP address locally and receive the error message, "Request timed out." You then ping 127.0.0.1 and receive the same error message. What do you do?

Answers

Answer:

Replace the NIC

Explanation:

A node needs a network connectivity to perform and function well as part of a cluster. If a single network interface is available, the breakdown of the other network interfaces will not cause service interruption but will most likely cause service degradation.

Simple ways to know if you need to change your NIC is to go Click Start and the you right-click on Computer, then you toggle over and click Properties, it will bring a window box and From there, click Device manager. Screen the window to where it says "Network adapters". If there's a question mark or an exclamation there, then you have an ethernet problem that needs troubleshooting; if not then you're OK.

Other Questions
Costa Rica est situada en una zona privilegiada del planeta. Sus atractivos y exuberantes escenarios naturales son un autntico paraso para los (1).Y es que, a pesar de (despite) su pequeo tamao el estado de Kentucky es (2)veces ms grande que Costa Rica, el paisaje de este diminuto pas est repleto de (packed with) (3), reservas biolgicas y zonas protegidasEstos lugares no slo ofrecen plcidos paisajes de sol, arena y mar, o salvajes zonas de densa y abundante vegetacin, sino tambin zonas volcnicas. Costa Rica est situada dentro del llamado (4)del Pacfico,donde se encuentran la mayora de los (5)del mundo.En Costa Rica hay (6)de cien volcanes.No es arriesgado (risky) afirmar, por tanto, que en este pas centroamericano (7)es el sectorde la industria del turismo que crece (grows) ms (8) A box contains 8 red marbles, 9 blue marbles and 11 yellow marbles. What is the probability that a marble chosen randomly from the box is blue? Leave answer as a fraction Find the surface area of number 2 President Reagans use of the term evil empire referred to Two different plants are crossed. One has the genotype tt and the other Tt. What is the genotype ratio for this cross? What is the phenotype ratio? Problems with the join and separate structures, with the start or initial amount unknown, tend to be the hardest for young students to understand and accurately solve. Identify the reason for they are more challenging for young children to use __________.A) Children can model the physical action.B) Children can act out the situation.C) Children cannot use counters for the initial amount.D) Children cannot grasp a quantity represents two things at once. Data for January for Bondi Corporation and its two major business segments, North and South, appear below:Sales revenues, North$587,000Variable expenses, North$340,600Traceable fixed expenses, North$70,200Sales revenues, South$453,200Variable expenses, South$258,600Traceable fixed expenses, South$58,600In addition, common fixed expenses totaled $158,900 and were allocated as follows: $82,500 to the North business segment and $76,400 to the South business segment.A properly constructed segmented income statement in a contribution format would show that the segment margin of the North business segment is:a.$93,700b.$340,600c.$176,200d.$163,900 Which function is shown in the graph below? A) y=(1/2)^x+3 -1B) y=(1/2)^x-3 +1C) y=(1/2)^x-1 +3D) y=(1/2)^x+1 -3 As Michael watches his instructor pass out papers, he suddenly realizes this is the first major exam and he is totally unprepared. Which phase of the GAS is the he most likely experiencing? 5 PointsWhat is the equation of a circle with center (2, -3) and radius 3?O A. (x-2)* - (y +3) - 9O B. (x - 2)* +(y + 3) - 9O C. (x - 2)2 +(y+3)? - 3O D. (x + 2) + (y - 3) - 9 What does Donald Trump's victory in the 2016 presidential election suggest about the power political parties have over their candidates and fellow party members? Quadrilateral ABCD is inscribed in this circle.What is the measure of ZA?Enter your answer in the box. Exercise 06-5 Absorption costing and variable costing income statements LO P2 Rey Companys single product sells at a price of $216 per unit. Data for its single product for its first year of operations follow. Direct materials $ 20 per unit Direct labor $ 28 per unit Overhead costs Variable overhead $ 6 per unit Fixed overhead per year $ 160,000 per year Selling and administrative expenses Variable $ 18 per unit Fixed $ 200,000 per year Units produced and sold 20,000 units 1. Prepare an income statement for the year using absorption costing 2. Prepare an income statement for the year using variable costing. A cylindrical specimen of some metal alloy having an elastic modulus of 129 GPa and an original cross-sectional diameter of 4.4 mm will experience only elastic deformation when a tensile load of 1570 N is applied. Calculate the maximum length of the specimen before deformation if the maximum allowable elongation is 0.48 mm. The curriculum committee at Larchmont High School wants to offer a new elective course next year. They decide to survey Larchmont's 150015001500 students to determine which course students would prefer. The choices are History of Art, Robotics, and Money and You. The distance xm travelled by a particle in time t seconds is described by the equation x = 10 + 12tsquare, Find the average speed of the particle between the time interval t = 2s and t = 5sA. 60 ms-1B. 72 ms-1C. 84 ms-1D. 108 ms-1 So far we have worked on obtaining individual digits from 4 digits of 5 digit numbers. The added them to find the sum of digits. However, now we know about the loop and we can remove the limit of having a specific number of digits. Write a program to print out all Armstrong numbers between 1 and n where n will be an user input. If the sum of cubes of each digit of the number is equal to the number itself, then the number is called an Armstrong number. For example, 153 = (1 * 1* 1)+ ( 5 * 5* 5 ) + ( 3*3*3) In order to solve this problem we will implement the following function: sumDigitCube(): write a function sumDigitCube() that takes a positive integer as a parameter and returns the sum of cube of each digit of the number. Then in the main function, take an integer n as input and generate each number from 1 to n and call the sumDigitCube() function. Based on the returned result, compares it with the value of the generated number and take a decision and print the number if it is Armstrong number The purpose of many business messages is to make a request or to reply to previously received communication. Familiarize yourself with the organization of these messages so you can communicate your purpose and achieve a positive outcome. Read the scenario. Your manager asks you for advice about a request e-mail she is composing to a customer. What advice would you give?A. Give an approximate date for the deadline in the body.B. Place the deadline in the opening.C. Set an end date to take action in the closing. Read the following request message.To: Customer Support From: Helen Martin Subject: Warranty Information for Netbook ComputerRevision A: 1. Where do I find my warranty information?2. How long does the average netbook repair take?3. Do I need to mail in my netbook for repairs or bring it to your local repair shop?Revision B: 1. Where is my warranty information? B. How long does the average repair take? C. Do I have to mail in my netbook?Revision C: Where do I find the information?How long does it take?Can I take it to my local shop?Which of the preceding revisions is the best revision for the body of this message?A. Revision BB. Revision CC. Revision AComplete the following sentence with the drop-down menu.Direct response messages might _______.a. include long, flowery descriptions.b. use the "me" view.c. supply explanations and additional information.Read the scenario: You manage the social media presence of a company that manufactures travel apparel and gear. A customer posts an angry comment about a suitcase that failed to function properly after its first use. This is not the first complaint the product has received. How should you respond to the customer?A. Acknowledge the problem, and let the customer know that the company is working to rectify the situation.B. Document and delete the comment. You dont want news of the flawed product to spread.C. Let the comment stand. No response is necessary. A group of animals that have similar characteristics that they pass to their offspring is called what SecuriCorp operates a fleet of armored cars that make scheduled pickups and deliveries in the Los Angeles area. The company is implementing an activity-based costing system that has four activity cost pools: Travel, Pickup and Delivery, Customer Service, and Other. The activity measures are miles for the Travel cost pool, number of pickups and deliveries for the Pickup and Delivery cost pool, and number of customers for the Customer Service cost pool. The Other cost pool has no activity measure because it is an organization-sustaining activity. The following costs will be assigned using the activity-based costing system: Driver and guard wages $ 960,000 Vehicle operating expense 390,000 Vehicle depreciation 270,000 Customer representative salaries and expenses 300,000 Office expenses 160,000 Administrative expenses 460,000 Total cost $ 2,540,000 The distribution of resource consumption across the activity cost pools is as follows: Travel Pickup and Delivery Customer Service Other Totals Driver and guard wages 50 % 35 % 10 % 5 % 100 % Vehicle operating expense 70 % 5 % 0 % 25 % 100 % Vehicle depreciation 60 % 15 % 0 % 25 % 100 % Customer representative salaries and expenses 0 % 0 % 90 % 10 % 100 % Office expenses 0 % 20 % 30 % 50 % 100 % Administrative expenses 0 % 5 % 60 % 35 % 100 % Required: Complete the first stage allocations of costs to activity cost pools.