the e-commerce player simulates theoretical questions

上传人:xins****2008 文档编号:114991530 上传时间:2019-11-12 格式:DOC 页数:27 大小:52KB
返回 下载 相关 举报
the e-commerce player simulates theoretical questions_第1页
第1页 / 共27页
the e-commerce player simulates theoretical questions_第2页
第2页 / 共27页
the e-commerce player simulates theoretical questions_第3页
第3页 / 共27页
the e-commerce player simulates theoretical questions_第4页
第4页 / 共27页
the e-commerce player simulates theoretical questions_第5页
第5页 / 共27页
点击查看更多>>
资源描述

《the e-commerce player simulates theoretical questions》由会员分享,可在线阅读,更多相关《the e-commerce player simulates theoretical questions(27页珍藏版)》请在金锄头文库上搜索。

1、The e-commerce player simulates theoretical questions 2The e-commerce player simulates theoretical questions 2One. (60, one point, 60 points.)The arithmetic and controller belong to the computer. C.A. external device b. memoryC.C PU d. system softwareData transmission rate is an important technical

2、indicator of Modem, unit (). A.B/s, b, ytes/sB/S, B/SAccording to the classification of computer software systems, SQL2000 belongs to (). D.A. common software b. operating systemC. language processing system d. database management systemThe actual name of () is called non-volatile random access memo

3、ry (NVRAM), which is characterized by the fact that the data does not disappear when the power is off, so it can be used as an external memory. A.A. memory b. memoryc.r.Most lans use a central node as a central node to connect to each node, which is the () structure of the topology. B.A. ring b. sta

4、rC. linear d. multilateralE-commerce is the e-business between enterprises and enterprises. B.A.B 2C b bC.B 2GThe meaning of EDI is (). B.A. electronic data processing b. electronic data exchangeC. electronic money transfer d. electronic sales systemB2B provides a competitive platform for purchasing

5、 activities. D.Open, fair, high-speed b. fair, open and efficientFair, Shared, effective D. open, fair, and efficient() is a digital document containing the contents of the holder, the personal information, the public key, the certificate number, the validity of the certificate, and the electronic s

6、ignature of the issuing unit. A.A. digital certificate b. digital signatureC. electronic seal, dc A10. For goods online sales, if the price of a product standard is not unified or change often, the customer will realize this price difference, via the Internet and may therefore lead to discontent, em

7、bodies the () of the traditional marketing network marketing. B.A marketing channel impacts B pricing strategyC advertising strategy impact D standardized product impact(1) it refers to the way in which a company can achieve its marketing goal by providing a tangible and intangible product that is s

8、uitable for consumption. D.A pricing strategy B distribution strategyC promotion strategy D product strategyBecause of the Internet marketing (), make it real the whole marketing. B.A growth B is bi-directionalC technical D across time and spaceIn online marketing, it is (). D.A cultural item B gene

9、ral foodC books D MP3Online transactions in e-commerce are the last link. A.A logistics B information flowC business flow D capital flow15. () refers to managers use certain equipment according to certain procedures of information collection, classification, analysis, assessment, and put in a timely

10、 manner to provide accurate information to the decision makers,So they make high-quality logistics decisions. D.A processing information B electronic commerce systemC electronic commerce system D logistics information systemIn the logistics system, the links between each link are communicated throug

11、h (). C.A personnel exchange B dataC message D signalThird party logistics will not bring () D.A cost value B service valueC social value D information valueOn February 18, 1994, our country promulgated (), this is our countrys first computer safety regulation, it is our country computer security wo

12、rk overall program. C.The new criminal law of the Peoples Republic of ChinaThe computer security act of the Peoples Republic of ChinaThe regulations of the Peoples Republic of China on the protection of computer information systemsComputer safety regulations of the Peoples Republic of ChinaUnauthori

13、zed access to access and other peoples authentication information, such as user name and password, is a threat in computer terms (). C.A. tampering with data b. informationC. identity fraud d. denial of serviceThe computer information system is protected by security. The specific measures for the cl

14、assification of safety grades and the protection of safety grades shall be formulated by () in conjunction with the relevant departments. D.A department of education B defense departmentC department of security DIn e-commerce, people need to use () to prove their identity. C.A. email account b. elec

15、tronic fingerprintC. Electronic signature mechanism D.I P addressTypical e-commerce payments should be (). D.A. bank transfer b. telephone paymentC. Goods to DIn the process of online transactions, () is a third-party institution that provides authentication. B.A: B.C AC. Internet bank d. e-commerce platformNo character () Settings are allowed in the format bar of Microsoft FrontPage. C.A. Color b. sizeType-spacing d. fontIn the case of the image hotspot, the correct thin

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 大杂烩/其它

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号