www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
(单选题)1: TPN refers to()
A: Trading Process Network Post B: Trading Price Network Post C: Trading Price Net Position D: Trading Process Nigation Post 正确答案:
(单选题)2: E-commerce was first developed in the () A: 1960s B: 1970s C: 1980s D: 1990s 正确答案:
(单选题)3: Transaction broker provides a ()payment mechanism for buyers and sellers to settle a transaction. A: direct B: indirect C: auction D: third party 正确答案:
(单选题)4: () refers to the universal code now attached to most goods, final and intermediate that identifies the particular product and its manufacturer. A: EDI
B: supply chainBar coding C: patent 正确答案:
(单选题)5: To B2B EC, the focus of vendors' competition has been turned from the products to ().
A: profit B: service C: low-cost D: efficiency 正确答案:
(单选题)6: Manufacturer model is also called () A: a direct model B: e-tailer
C: catalog merchant D: Bit vendor 正确答案:
(单选题)7: Firewalls typically run monitoring () to detect and thwart external attacks on the site, and are needed to protect internal corporate networks. A: software B: hardware
C: operation system D: internet 正确答案:
(单选题)8: ( ) are market-makers: they bring buyers and sellers together and facilitate transactions. A: brokers B: enterpriser
C: human resources departments D: enterprise leaders 正确答案:
(单选题)9: () facilitates transactions between buyer and sellers by providing comprehensive
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
information and ancillary services, but does not get involved in the actual exchange of goods or services between the parties. A: utility model
B: incentive marketing model C: subscription model D: Metamediary Model 正确答案:
(单选题)10: ()is a method to verify the buyer’s identity before payment is authorized.. A: password
B: Authentication C: profile D: identity 正确答案:
(单选题)11: If you need to access information and know where it is on the web, you only need enter the entire www address into your browser's (). A: address B: computer C: http
D: Unifrom Resource Loactor field 正确答案:
(单选题)12: ?Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data. A: patents B: passwords C: telnet
D: encryption technologies 正确答案:
(单选题)13: The Web is a large system of () that offers many kinds of information to anyone on the Internet or to a lesser extent on an inter-/intra-network. A: Http B: telnet C: servers D: modems 正确答案:
(单选题)14: EC set a high demands on the responsiveness, flexibility, visibility,and optimization of(). A: sales activity B: tractions
C: security system D: logistics service 正确答案:
(单选题)15: the main advantage of the electronic exchange of information between individual companies that are linked along the supply chian is () A: speed B: accuracy C: security
D: improved speed and accuracy 正确答案:
(单选题)16: ()is a network of networks that is contained within a company or enterprise. A: extranet B: intranet C: portal D: HTTP
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
正确答案:
(单选题)17: ?Regardless of their basic purposes ― B2C or B2B ― virtually all EC sites rest on the same (), communication protocols, Web standards and security systems. A: informaiton B: patent
C: network structure D: contract 正确答案:
(单选题)18: The supply chain is the flow of () and services from one business to another. A: money
B: intermediate goods C: EC D: TPN 正确答案:
(单选题)19: A () is an approach to security; it helps implement a larger security policy that defines the services and access to be permitted. A: firewall B: patent C: ERP
D: intranet 正确答案:
(单选题)20: Business models have taken on greater importance recently as a form of ( ) that can be protected with a patent A: intellectual property B: password
C: business model D: strategy 正确答案:
(多选题)21: Internet is a network of interconnected networks. This network has () A: people B: computers C: a information D: software 正确答案:
(多选题)22: WAP is () A: software B: hardware
C: a communications protocol D: application environment 正确答案:
(多选题)23: The basic categories of business models include() A: brokerage B: advertising C: community D: subscription 正确答案:
(多选题)24: Bar-coding technology which identifies the () and the (), can help companies identify the source of defective parts and improve quality control. A: product B: logistics C: manufacturer D: quality
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
正确答案:
(多选题)25: The industries affected by m-commerce include: () A: financial service B: telecommunications C: bill payment D: account review 正确答案:
(多选题)26: An extranet is a private network that facilitate interaction between businesses. But an extranet requires () and (). A: informaiton B: modem C: security D: privacy 正确答案:
(多选题)27: Packet filtering firewalls identify and control traffic by examining the (),(),and (). A: ways B: source
C: destination D: port 正确答案:
(多选题)28: Data about () and their () are valuable, especially when that information is carefully analyzed and used to target marketing campaigns. A: consumers
B: market situation C: consumption habits D: buyers 正确答案:
(多选题)29: The Web server knows how to (),(), and () the document to the requesting client A: avoid B: locate C: read D: report 正确答案:
(多选题)30: ?Firewalls appear primarily in two flavors: () and (). A: application level gateways B: software C: http
D: proxy servers 正确答案:
(判断题)31: ERP is often referred to as front-office software. A: 错误 B: 正确 正确答案:
(判断题)32: The Web site can be promoted expensively throughout the world with links on other Web pages and in E-mail newsletters. A: 错误 B: 正确 正确答案:
(判断题)33: From a web marketing standpoint, one of the difficulties you face when you offer a number of products aimed at different groups is to facilitate the feedback speed to visitors quickly and move them to their own sections. A: 错误
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
B: 正确 正确答案:
(判断题)34: In order to keep competitive in EC, logistics industry has begun to employ the opening, systematical and technical structure. A: 错误 B: 正确 正确答案:
(判断题)35: Metamediary model can facilitate transactions between buyer and sellers, and it get involved in the actual exchange of goods or services between the parties. A: 错误 B: 正确 正确答案:
(判断题)36: detailed and accurate sales data can help to increase stock level and operating cost. A: 错误 B: 正确 正确答案:
(判断题)37: If you don’t know exactly where to find the information, you may use one of the many search engines on the Web. A: 错误 B: 正确 正确答案:
(判断题)38: B2B electronic commerce may give companies the less advantages that they need to achieve productivity gains. A: 错误 B: 正确 正确答案:
(判断题)39: A firewall is an approach to security, it helps implement a large security policy that defines the services and access to be permitted. A: 错误 B: 正确 正确答案:
(判断题)40: If business goes well, the cost of operation exceed the revenues from sales and the company realizes a profit. A: 错误 B: 正确 正确答案:
(判断题)41: Technologies are not the real keys in terms of the success of EC. A: 错误 B: 正确 正确答案:
(判断题)42: To participate in an EDI network, each member must maintain an EDI translator to convert information to and from its computer language into the common EDI language. A: 错误 B: 正确 正确答案:
(判断题)43: EC means using simple, fast and low-cost electronic communications to transact, without face-to-face meeting between the two parties of the transaction. A: 错误 B: 正确 正确答案:
(判断题)44: Two levels of network policy directly influence the sales, installation and use of a firewall system.
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
A: 错误 B: 正确 正确答案:
(判断题)45: The main purpose of an intranet is to share company information and computing resources with business partners. A: 错误 B: 正确 正确答案:
(判断题)46: Business-to-Business electronic commerce could also change the relationships among different groups of companies in the supply chain. A: 错误 B: 正确 正确答案:
(判断题)47: By setting up electronic communities, small vendors could more easily locate partners to help design and produce the intermediate goods supplied to large firms. A: 错误 B: 正确 正确答案:
(判断题)48: Mobile commerce is any transaction, involving the transfer of partnership or rights to use goods and services A: 错误 B: 正确 正确答案:
(判断题)49: In global Internet marketing, marketers can take other countries and their populations for granted without restraint A: 错误 B: 正确 正确答案:
(判断题)50: The CPFR strategy makes it impossible for both the producers and retailers to compare and contrast separately with the anticipaitons wo the particular product. A: 错误 B: 正确 正确答案:
(单选题)1: TPN refers to()
A: Trading Process Network Post B: Trading Price Network Post C: Trading Price Net Position D: Trading Process Nigation Post 正确答案:
(单选题)2: E-commerce was first developed in the () A: 1960s B: 1970s C: 1980s D: 1990s 正确答案:
(单选题)3: Transaction broker provides a ()payment mechanism for buyers and sellers to settle a transaction. A: direct B: indirect C: auction D: third party 正确答案:
(单选题)4: () refers to the universal code now attached to most goods, final and intermediate
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
that identifies the particular product and its manufacturer. A: EDI
B: supply chainBar coding C: patent 正确答案:
(单选题)5: To B2B EC, the focus of vendors' competition has been turned from the products to ().
A: profit B: service C: low-cost D: efficiency 正确答案:
(单选题)6: Manufacturer model is also called () A: a direct model B: e-tailer
C: catalog merchant D: Bit vendor 正确答案:
(单选题)7: Firewalls typically run monitoring () to detect and thwart external attacks on the site, and are needed to protect internal corporate networks. A: software B: hardware
C: operation system D: internet 正确答案:
(单选题)8: ( ) are market-makers: they bring buyers and sellers together and facilitate transactions. A: brokers B: enterpriser
C: human resources departments D: enterprise leaders 正确答案:
(单选题)9: () facilitates transactions between buyer and sellers by providing comprehensive information and ancillary services, but does not get involved in the actual exchange of goods or services between the parties. A: utility model
B: incentive marketing model C: subscription model D: Metamediary Model 正确答案:
(单选题)10: ()is a method to verify the buyer’s identity before payment is authorized.. A: password
B: Authentication C: profile D: identity 正确答案:
(单选题)11: If you need to access information and know where it is on the web, you only need enter the entire www address into your browser's (). A: address B: computer C: http
D: Unifrom Resource Loactor field 正确答案:
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
(单选题)12: ?Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data. A: patents B: passwords C: telnet
D: encryption technologies 正确答案:
(单选题)13: The Web is a large system of () that offers many kinds of information to anyone on the Internet or to a lesser extent on an inter-/intra-network. A: Http B: telnet C: servers D: modems 正确答案:
(单选题)14: EC set a high demands on the responsiveness, flexibility, visibility,and optimization of(). A: sales activity B: tractions
C: security system D: logistics service 正确答案:
(单选题)15: the main advantage of the electronic exchange of information between individual companies that are linked along the supply chian is () A: speed B: accuracy C: security
D: improved speed and accuracy 正确答案:
(单选题)16: ()is a network of networks that is contained within a company or enterprise. A: extranet B: intranet C: portal D: HTTP 正确答案:
(单选题)17: ?Regardless of their basic purposes ― B2C or B2B ― virtually all EC sites rest on the same (), communication protocols, Web standards and security systems. A: informaiton B: patent
C: network structure D: contract 正确答案:
(单选题)18: The supply chain is the flow of () and services from one business to another. A: money
B: intermediate goods C: EC D: TPN 正确答案:
(单选题)19: A () is an approach to security; it helps implement a larger security policy that defines the services and access to be permitted. A: firewall B: patent C: ERP
D: intranet
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
正确答案:
(单选题)20: Business models have taken on greater importance recently as a form of ( ) that can be protected with a patent A: intellectual property B: password
C: business model D: strategy 正确答案:
(多选题)21: Internet is a network of interconnected networks. This network has () A: people B: computers C: a information D: software 正确答案:
(多选题)22: WAP is () A: software B: hardware
C: a communications protocol D: application environment 正确答案:
(多选题)23: The basic categories of business models include() A: brokerage B: advertising C: community D: subscription 正确答案:
(多选题)24: Bar-coding technology which identifies the () and the (), can help companies identify the source of defective parts and improve quality control. A: product B: logistics C: manufacturer D: quality 正确答案:
(多选题)25: The industries affected by m-commerce include: () A: financial service B: telecommunications C: bill payment D: account review 正确答案:
(多选题)26: An extranet is a private network that facilitate interaction between businesses. But an extranet requires () and (). A: informaiton B: modem C: security D: privacy 正确答案:
(多选题)27: Packet filtering firewalls identify and control traffic by examining the (),(),and (). A: ways B: source
C: destination D: port
www.vu8o.com
??------------------------------------------------------------------------------------------------------------------------------
正确答案:
(多选题)28: Data about () and their () are valuable, especially when that information is carefully analyzed and used to target marketing campaigns. A: consumers