Traditional Culture Encyclopedia - Traditional festivals - Five levels of theoretical problems in e-commerce
Five levels of theoretical problems in e-commerce
Download or run the file. The default security level of this zone is "Medium Low" 12. About using FrontPage to make web pages, the correct statement is (c). (a) You must know the HTML language. (b) With FrontPage, users can only customize tables. (c) You can convert the text on a web page into a table. (d) A webpage can have an unlimited number of frames, which will not affect the downloading time of the webpage. The following are classified according to the mode of infection. (4). (a) Computer virus infected in the boot area of the disk (b) Computer virus infected by the operating system (c) Computer virus infected by general applications (d) Shell virus 14. The statement about computer virus invasion mode is wrong (C). (a) Operating system virus, which can paralyze the whole system; (b) Before compiling the program, insert the source virus into the source program compiled with FORTRAN, C or PASCAL. The virus program that completes this work is generally in the language processing program or connection program; (c) coat virus, which is easy to write but hard to find; (d) Intrusion viruses are generally written for some specific programs. (a) The importance of middlemen has increased. (b) The traditional international distribution network established by multinational corporations will greatly reduce the entry barriers of small competitors. (c) The distributor may no longer undertake after-sales service. (d) Through the Internet, manufacturers can directly contact end users. Internet marketing has had a huge impact on traditional marketing methods, among which (b) is wrong. (a) gradually reflect the individuality of the market, and finally organize production and sales according to the needs of each user. (B) Enterprise competition of network marketing is a form of competition around the market. (C) the implementation of customer relationship management is the key to the success of online marketing. (a) The target market, customer model and product type based on the network era will be very different from before. 17. The influence of online marketing on traditional marketing strategies does not include (d). (1) Impact on traditional product brand strategy (2) Impact on pricing strategy (3) Impact on traditional marketing channels (4) Consolidation of traditional advertising barriers (18) and the impact of online marketing on marketing strategy. The wrong statement is (a). (A) It is more difficult for small enterprises to participate in global competition. (2) The market competition in the Internet era is transparent, and everyone can master the product information and marketing actions of competitors. (3) The cost accounting of global marketing is lower than that of regional marketing, and enterprises will have to enter the era of transnational operation. (d) Not only should we be familiar with the characteristics of customers in multinational markets to win trust and meet their needs, but we should also arrange transnational production, transportation and future services, which are all done through. (1) The first level is free commercial information, mainly social welfare information. (2) The second level is that the fees are low, and only the basic service fees are charged. The third level is the information that charges the standard information fee. (d) The fourth level is the information of high quality and good price. Most business information on the Internet falls into this category. 20. It is incorrect to say that online marketing has eliminated the obstacles of traditional advertising. (2). (a) Cyberspace can be infinitely expanded, so advertisements on the Internet can be less limited by space. (b) Advertisements cannot be selectively displayed according to the characteristics of visitors, such as hardware platform, domain name or search topic when visiting. (C) The rapid improvement of advertising efficiency has also created convenient conditions for online enterprises. (d) Advertisements sent to visitors can change rapidly according to the purchasing behavior of registered users. In order to clearly display the comparison results of various numerical data, (B)(A) pie chart (b) column chart (c) graph (d) area chart 22 can be selected. Company Z wants to collect the quotation information of a brand wine seller, but the following scheme is not feasible (C). (1) Inquire about the quotation on the seller's website (2) Inquire about the price of the government liquor monopoly agency (3) Inquire directly by mail (4) Pricing through business negotiation. The study of marketing factors does not include (a). (a) The market share of our products in the whole market; (b) What is the potential demand of the market; (c) Study on promotion strategy; Price research; 24. Use e-mail to conduct market research; The following statement is incorrect (D). (1) Try to use articles in ASCII plain text format. (b) Deliver the most important information first. (c) Use the title of the document as the subject of the e-mail. (d) The more detailed the email, the longer the better. 25. The following description of news group rating categories is correct. (2). (a) Business (b) Science (c) Computer (d) Miscellaneous. The problems that should be paid attention to in the design of online questionnaire are (a). (1) In the online market survey, the questionnaire sent to the respondents by post consists of four parts: greetings, question list, answer column and code column. (b) induce people to answer. (c) Questions may be biased or misleading. (d) The meaning and scope of the problem need not be clear. 27. The following statement is incorrect about the publishing skills of bulletin board advertisements. (4). (a) write a good title; (b) Keep the content concise; (c) Widely distributed in relevant categories and places; (d) Consider the equipment conditions of service providers.
Technical strength and equipment. The following statements about the efficient management and operation mechanism of newsgroups are correct: (A)(A) users download new titles and articles every time they use newsgroup client software; (b) Access to newsgroups cannot be done at the same time as browsing the home page, sending emails, downloading and FTP uploading files; (c) After being disconnected, users cannot read and reply articles locally. (d) Newsgroup client software can effectively organize all kinds of newsgroup information, which will reduce the efficiency of users in dealing with news. 29. The documents of the online shop are the vouchers for the transactions between merchants and users. The points that need to be paid attention to in the design and the skills that can be adopted are (D). (a) In order to minimize interference, advertisements are always necessary; (two) to explain in detail, not afraid of tolerance. (c) Provide a permanent storage place for customers. (d) Provide visual clues and shopping cart links. The following statement about online shopping cart is wrong. (D)(A) The shopping cart provided by the online store accompanies online consumers to shop, and the store finally determines the customer's order according to the information of the shopping cart. (2) Whether the functions of the shopping cart provided by the online electronic mall are reasonable and complete is very important for the final determination of the customer's order. Shopping cart is very important. (d) Shoppers are prohibited from updating the goods in the shopping cart at any time to prevent customers from deleting the purchased goods. 3 1. The following statement about various states of orders is incorrect (c). (a) Pending: As the order information is unknown, it needs to be confirmed by the customer. (b) Confirmed: it means that the order submitted by the customer is cash on delivery and has been regarded as a valid order by the in-store order handler. Entering the delivery process (c) money has been received, which means that the customer has received the goods ordered by this order. (d) It means that the customer's order has just been submitted and has not been delivered. 32. The principle of digital certificate is correct (B). (a) Each user sets a public key and uses it to decrypt and sign. (2) Digital certificates adopt a public key system, that is, a pair of paired keys are used for encryption and decryption. (c) Set private keys for a group of users, which are used to encrypt and verify signatures. (d) When sending confidential documents, the sender uses the private key of the receiver to encrypt data, and the receiver uses its own private key to decrypt data. (a) consumer (b) offline store (c) acquiring bank (d) certification center (CA) 34. Electronic money is a new payment method compared with traditional money. The following introduction is wrong (b). (a) Electronic money mainly includes payment cards in the form of smart cards (such as Mondex cards) or digital currency documents (such as electronic cards and online money). (2) Electronic money has the characteristics of being widely used, flexible, anonymous, fast and simple. (c) When using electronic money, it can only be operated through direct connection with the bank. (D)Mondex card is used for offline payment and eCard is used for online payment. The following statement is wrong (a). (A) the early popularity of electronic money smoothly, has been widely used. (b) Electronic money does not need to be divided into denominations complementary to cash, and is especially suitable for small-scale business payment. (3) For security reasons, the actual payment is that consumers use secure encryption protocols to encrypt electronic cash and send it to merchants. (d) The difference between electronic money and credit cards is that banks lend money to each cardholder. (a) In the SET transaction, CA issues certificates to cardholders and merchants, but does not issue certificates to banks and gateways that collect money. (b) The B)CA Center issues a digital certificate to each user who uses the public key. The role of the digital certificate is to prove that the users listed in the certificate legally own the public key listed in the certificate. (c) The digital signature of c)CA makes it impossible for attackers to forge and tamper with certificates. (d) As a trusted third party in e-commerce transactions, it undertakes the public key in the public key system. (a) The software running on the bank card holder's side in the SET transaction (b) can't help the cardholder to manage the bank card account used for SET purchase and store the purchase information (c) the cardholder's bank card information and the certificate corresponding to the card are stored in the electronic wallet (d) The electronic wallet is an auxiliary application that works with the browser. 38. The following understanding of the specific use function of electronic wallet in China Bank is correct (D). (a) After modifying the bank card account information, the previous transactions will still be listed under the new card description in the purchase record window. (b) You can change the validity period and other information of those cards with "valid" status, and the status of the applied and installed certificates will not change. (c) The details of the purchase record selected by the electronic wallet are displayed in the higher position of the panel. (d) If the "Certificate Warning" priority option is not activated, even if the bank card used does not have a valid certificate, the e-wallet program will process your purchase record without using the additional protection provided by the certificate. 39.(a) Ensure the secure transmission of information on the Internet; Ensure the participation of electronic commerce.
The mutual exchange of information (c) ensures the real-time performance of online transactions (b) imitates the form of EDI trade and standardizes the protocol and message format. The following is the transaction status (A) of each transaction recorded in the electronic wallet. (a) Success, Order Receipt, Order Rejection and Unfinished (b) Success, Order Receipt and Unfinished (c) Order Receipt, Order Rejection and Unfinished (d) Order Rejection, Unfinished and Successful 1. Some commonly used databases are introduced incorrectly. (AB)(A)SYBASE is a client/server structure introduced by IBM in the United States in the mid-1990s. It is also the first real RDBMS product based on client/server structure in the world. (B)ORACLE is a relational database management system developed by Microsoft for large, medium and micro computers. (C)DB2 is a relational database management system developed by IBM. (D)SQL Server is a relational database management system developed by Microsoft, which uses Transact-SQL as its database query and programming language. 2 The following statement about meta search engine is true (AD). (a) Do not have their own data; (b) the searcher searches the index database according to the query input of the user, and returns the query result to the user; (c) The service mode is full-text search of web pages; (d) The function of meta-search engine cannot be fully utilized, and users need to do more screening; 3. The robot search engine is (ABC). (a) A robot program named Spider, which automatically collects and discovers information on the Internet with certain strategies; (b) Indexing the collected information by the indexer; (c) the searcher searches the index database according to the user's query input; (d) This kind of search engine has the disadvantages of small amount of information and untimely update; (4) The logistics activities of commercial enterprises in commodity management include the purchase, sale, transfer, storage and return of commodities. (b) Minimize the cost of purchasing commodities and related expenses, and bring higher profits to enterprises. (B) The main function of internal logistics of commercial enterprises is to ensure the normal sales of goods. (3) Sales logistics can complete commodity trading activities, maintain the relationship between enterprises and customers through good sales activities, and provide after-sales service for customers. (D) The return logistics of an enterprise is to return the goods to the place of purchase, which is generally not important for large enterprises. 5.(a) Filter data packets entering and leaving the network; (b) Manage access behaviors entering and leaving the network; (c) Record information content and activities passing through the firewall; (d) Prevent some prohibited access behaviors. 6. The statement about TCP/IP protocol error is (CD). (a) It is an Internet protocol and a de facto industrial standard; (B)TCP is a transmission control protocol, which provides reliable data information transmission service; (C)TCP/IP protocol stipulates that each IP address consists of two parts: physical address and host address; (D)IP protocol is a transmission control protocol, which provides reliable data information transmission services. 7, about the classification of IP address is wrong (AD). (a) The first digit of the first set of numbers for Class A addresses must be 0. (b) Class D addresses are used for future expansion. (c) The range of Class B addresses is 128 ~ 19 1. (d) Each Class C network can accommodate 255 hosts. 8. The following situations may be related to viruses. (ABC)。 (a) The number of abnormal system crashes has increased; (b) The running speed of the system is extremely slow; (c) Unexplained hidden documents appear; (d) Bad tracks appear on the hard disk; 9. In www.sina.com.cn. (A) WWW means WWW server (B) com means commercial organization (C) com means government organization (D) cn means China 10. The following statement about FTP login mode is true (ABD). (a) Some FTP servers require users to enter legal user ID (ID and password); (b) Some provide a service called anonymous FTP service; Anonymous FIP servers usually allow users to upload files; (d) Anonymous FTP is one of the most popular Internet services,11; FTP software is the interface for users to use file transfer services; The following statement is correct: (ABC) (a) According to different interface styles, FTP software can be divided into two categories: character interface and graphical interface. (b) The character interface FTP software uses the command line for man-machine dialogue. (c) FTP software provides a more intuitive, convenient and flexible window interconnection environment for the graphical interface. (d) FTP software under various early operating systems and FTP application programs built in windows 9X belong to FTP 12 of graphical interface. It is necessary to make web pages with FrontPage. (1) For the convenience of management, it is best to save the web pages edited by users in a fixed folder. (b) Pay attention to returning to the "normal" view after previewing, otherwise the webpage cannot be edited or modified. (c) There can be unlimited frames on a web page. (d) Use "Save Page" under the "Frame" menu. This method only saves the web page 13 in the currently selected frame. Regarding the framework in web page making, the following statement is true (ABCD). (1) The window of a web browser can be divided into several independent areas by frame technology, and each area is a frame (
B) Frames are small windows that can be changed and scrolled independently. (c) Through reasonable organization and arrangement, web pages can be better displayed and made more beautiful. (d) The frame is similar to a table, except that the table divides the page area, while the frame divides the whole window into 14. (BCD)。 (a) This area contains websites that users do not trust. (b) The default security level for this area is "Low". (c) Files can be downloaded or directly run. (4) The default security level in this area is "medium and low" 15, and the following websites belong to Class B websites. (communication) (a)135.10.0.25 (b)192.168.0.1(c)172.30./kloc-. (b) The length of the network address determines how many hosts each network can accommodate, and the length of the host address determines how many networks the whole network can accommodate. (c) Each IP address consists of 32 bits and is divided into 4 groups. Each group of 8 bits (d) has an IP address:127.0.0.1.19. The following statement about safety level is correct (AD). (a) Click the Custom Level button to customize the security level. (b) The default security level of the Internet zone is medium. (c) Trusted site area: This area can directly download or run files without worrying about damaging personal computers. The default security level for this zone is High. (d) Restricted site area: This area contains sites that users don't trust. The default security level of this area is "high" 20, and IE5.0 divides the Internet into (ABCD). (A) Internet zone (b) Local Intranet zone (c) Trusted site zone (d) Restricted site zone 2 1. The functions commonly used in BBS are (ABD). (a) reading articles (b) publishing articles (c) sending and receiving emails (d) communicating and chatting. The statement about domain name is correct (ABD). (1) The IP address of a computer on the Internet can be expressed in two forms: IP address and domain name. (2) The so-called domain name means that the host address is expressed by a humanized name. (c) A domain name consists of several parts, and each part is separated by a "."The first part is a first-level domain name, also known as a top-level domain name. (d) It is easier to remember than using a digital IP address to represent the host address. 23. The home page usually contains the following basic elements. (a) Text (b) Image (c) Form (d) Hypertext 24. According to the medium in which the virus exists, it can be divided into (AB). (1) Network virus (2) File virus (3) Bootable virus (4) A mixture of the above three situations. 25. The prevention of computer viruses can be carried out from the following aspects (ABC). (a) Use virus detection software to check the known viruses of the newly purchased computer system and verify that there are no signs of virus infection and destruction. (b) After the floppy disk is formatted in DOS format, it is still necessary to detect the virus. (c) If the hard disk can boot without virus, try not to boot with floppy disk. (d) The newly purchased hard disk or factory-formatted floppy disk cannot contain viruses, and it is unnecessary to format the hard disk at a low level. 26. Computer viruses can be divided into (ABCD) according to the invasion mode. (a) Operating system virus, which can paralyze the whole system; (b) The virus of the source program is inserted into the source program compiled by FORTRAN, C or PASCAL before the program is compiled, and the virus program that completes this work is usually in the language processor or linker; (c) Shell viruses often attach to the beginning and end of the main program, and the source program is not modified; (d) Invasive viruses are generally written for some specific programs. 27. The main purpose of market demand research is to master market demand, market scale, market share, and how to use effective business strategies and means. The following is its research content (ABD). (a) the potential market demand; (b) the market share of the products of the enterprise in the whole market; (c) the specific analysis of who are the decision makers, users and specific executors of purchasing commodities, and the relationship between them; (d) the analysis and research on the entry strategy and intertemporal strategy, from which the most favorable market opportunities can be selected and grasped. 28. The following understanding of the future development of online marketing and traditional marketing is correct (BCD). (a) As a new virtual market, the Internet will cover all groups. (2) As an effective channel, the Internet has its own characteristics and advantages, but for many consumers, it may not be willing to accept or use this new mode of communication and marketing channel. (c) traditional.
The unique affinity of some people-oriented marketing strategies is irreplaceable by online marketing. (d) Online marketing will not completely replace traditional marketing. 29. The impact of online marketing on traditional marketing methods is manifested in (ABCD). (a) gradually reflect the individuality of the market, and finally organize production and sales according to the needs of each user. (B) Enterprise competition of network marketing is a customer-centered form of competition. (C) the implementation of customer relationship management is the key to the success of online marketing. (d) The target market, customer form and product category based on the network era will be very different from before. 30. The research contents of users' and consumers' buying behaviors include (ABC)(A) basic information such as users' family, region, economy, etc. (b) studying the reasons why users prefer specific trademarks or specific stores (c) understanding when and where consumers like to buy (d) studying promotion strategies (3 1). The following explanation about the sample type of online market survey is correct (ABD). (1) Random sampling refers to organizing sampling according to the principle of randomness, and taking samples randomly from Internet websites. (2) Filter sampling refers to limiting some self-selected unrepresentative samples through quotas of expected sample characteristics. (c) Filtered samples are most suitable when a sampling database has been established. (d) Selecting samples on the Internet for target groups that need more sample restrictions. There are many skills to choose a flag advertising service provider, including (ACD). (a) Consider the types of information services and user service support provided by service providers; (b) Post some articles that can provide valuable information for the audience; (c) Consider the equipment conditions and technical strength of service providers; (d) Consider the communication export rate of service providers; 33. The skills of publishing information in newsgroups are (ABCD). (a) Often post information in selected newsgroups or reply to information posted by others. (b) Post some articles that can provide valuable information for the audience. (c) website upgrade notice. (d) Publish websites in newsgroups and solicit opinions from others. 34. The following description of news group classification is incorrect (AC). (a) Business (b) Science (c) Computer (d) Society and culture. There are many techniques to publish bulletin board advertisements. The following statement is true (ABC). (1) Write the title. (b) Be concise and to the point. (c) Widely distributed in relevant categories and places. (d) Consider the communication exit rate of the provider. 36. Pay attention to the following questions (ABCD) when using e-mail correctly for advertising activities. (1) Use the signature of e-mail correctly; (2) Write the contents of e-mail correctly; (3) Ask customers for advertisements passively; (4) Send e-mails in groups and send a large number of e-mails in a centralized way. 37. Compared with traditional business information, online business information has the following remarkable features (BD). (1) Only business information transmitted through computer networks belongs to the category of online business information. (b) it is effective. (3) The intermediate link of information transmission has been added, thus increasing the misinformation and modification of information. (d) easy to store. 38. The following description of commonly used business analysis tools is correct (ACD). (1) Discriminant analysis is a multivariate statistical method to distinguish sample types, which is often used in production, scientific research and daily life. (a) Time series analysis is a multivariate statistical analysis method, which classifies individuals (samples or variables) according to certain criteria. (c) The digital characteristic quantity used to describe the direction of change and the degree of closeness between two variables is called correlation coefficient. (d) Regression analysis includes univariate linear regression equation, bivariate linear regression equation and multivariate linear regression equation. (a) Cyberspace can be infinitely expanded, so advertisements on the Internet can be less limited by space. (b) Advertisements can be selectively displayed according to the characteristics of visitors, such as hardware platform, domain name or search topic during the visit. (c) The rapid improvement of advertising efficiency has also created convenient conditions for online enterprises. (d) Advertisements sent to visitors can change rapidly according to the purchasing behavior of their registered users. 40. Company Y wants to collect the quotation information of a brand wine seller, and the following scheme is feasible. (a) Inquire about the quotation on the seller's website; (b) Inquire about the price of the government liquor monopoly agency; (c) Inquire directly by mail; (d) Whether the function of the shopping cart provided by the online electronic mall through business negotiation is reasonable and complete is very important for the final determination of the customer's order, so it should have the following functions (ABC). (a) Display the list of these goods in the shopping cart and some brief information about these goods; (b) completing the connection of the payment gateway interface; (c) Complete data verification, confirm the order and file it; (d) It is forbidden for shoppers to update the goods in the shopping cart at any time, so as to prevent customers from deleting the purchased goods; Online shopping should provide the following functions (ABD). (a) allow inquiry of orders; (b) Allow modification of the order.
- Previous article:Is South Korea's Huwon University private or public?
- Next article:Can I make my resume into h5?
- Related articles
- Traditional manual e-books
- Take the iron ore funeral case as an example to analyze the environment of business negotiation?
- What is the difference between ancient Chinese paintings and contemporary oil paintings?
- I'm unemployed and want to start a business, what's the best thing to do?
- Pinyin of "Story"
- Is there ink painting in Korea?
- China people have always attached importance to family education, and many letters from their families have far-reaching influence. Please list one or two reasons.
- What are the etiquette gestures in China?
- How much is a catty of Xinjiang cut cakes?
- Fishing tips