Here are the answers to your questions:
-
A. Sales history file
The amount of a certain product sold to a certain customer in a past period can be obtained from the sales history file, which keeps track of sales transactions. -
C. Two
RF communication can typically be classified into two types: analog and digital. -
D. All of the above
The principal electronic payment systems for electronic commerce include credit cards, digital wallets, and electronic cheques. -
D. Intrusion-detection
A honeypot is an example of intrusion-detection software, as it is designed to lure attackers and detect malicious activities. -
D. Shutdown the computer without closing the running applications.
Using "Hibernate" allows the computer to save the current state (including running applications) and power down, so it can resume later without losing work. -
C. Do not respond
If you receive an email offering to remove you from a mailing list, it is safest not to respond, as it could be a phishing attempt. -
D. Application class
The application class is responsible for controlling the data being used by the application in many programming frameworks. -
D. All of the above
Applications of mobile computing can include traveling salesman scenarios, legal purposes, and location-aware services. -
C. It is inexpensive to implement
This statement is false; implementing an ERP system is often quite expensive due to the complexity involved. -
C. Click-and-mortar
Organizations with both physical and online presences are referred to as "click-and-mortar" organizations. -
A. parallel processing
One of the distinguished features of supercomputers over other categories of computers is their ability for parallel processing, which allows them to handle complex computations more efficiently.
Feel free to ask more questions if you have any!