What are the options for this answer?
Answer:
1. volatile data
2. temporary data
3. persistent data
seems like you already got it correct
Explanation:
Answer: Computers as target
Explanation:
Whenever an authorized access is made into a system it is a form of crime and it is called computers as target whereby one is able to access the system and get hands on unauthorized data and can also manipulate various activities which will have many dangerous effects.
Answer: suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.
NB: Don't ever integrate legacy CRM to Salesforce
Explanation:
It should be noted that the best recommendation that could be given in order to keep data in synch b/w Salesforce, legacy CRM and SAP is by suggesting MDM solution and also linking MDM to both the salesforce and sap. More so, integrating SAP with both Salesforce and legacy CRM.
NB: Don't ever integrate legacy CRM to Salesforce
The first e-commerce service would be A)Banking. Hope this helps.