南开19秋学期(1709、1803、1809、1903、1909)《电子商务英语》在线作业[答案]满分答案
19秋学期(1709、1803、1809、1903、1909)《电子商务英语》在线作业-0001
试卷总分:100 得分:100
一、单选题 (共 20 道试题,共 40 分)
1.To manage all aspects of information exchange over the Internet, the companies in a supply chain would need to adopt a () technology.
A.specific
B.special
C.different
D.common
2.ERP is ()
A.enterprise resource policy
B.enterprise resource planning software
C.enterprise relation policy
D.enterprise relation personnel
3.()provides a third party payment mechanism for buyers and sellers to settle a transaction.
A.salesman
B.broadcaster
C.auctioner
D.Transaction broker
4.Firewalls typically run monitoring () to detect and thwart external attacks on the site, and are needed to protect internal corporate networks.
A.software
B.operation system
C.internet
D.hardware
5.Mobile internet is access to the internet using a mobile wireless (), either integrated into a mobile phone or in an independent device.
A.webpage
B.portal
C.modem
D.intranet
6.TPN refers to()
A.Trading Process Nigation Post
B.Trading Process Network Post
C.Trading Price Network Post
D.Trading Price Net Position
7.?The () plays its role in connecting Internet and proprietary network of banks.
A.software
B.payment gateway
C.intranet
D.firewall
8.()is the flow of intermediate goods and services from one business to another.
A.the supply chain
B.TPN
C.EDI
D.EC
9.The movement of goods and services on a timely basis is critical for successful delivery,accurate produciton scheduling and ()
A.quality of products
B.personnel management
C.effective inventory management
D.effective internet browse
10.A search engine reads its () of sites and site information around the world for particular items searched on by users.
A.webpage
B.password
C.database
D.attachment
11.E-commerce was first developed in the ()
A.1990s
B.1980s
C.1970s
D.1960s
12.Firewalls appear primarily in two flavors: application level gateways and ()
A.software
B.proxy servers
C.intranet
D.extranet
13.?Regardless of their basic purposes ― B2C or B2B ― virtually all EC sites rest on the same (), communication protocols, Web standards and security systems.
A.patent
B.network structure
C.informaiton
D.contract
14.A () is an approach to security; it helps implement a larger security policy that defines the services and access to be permitted.
A.patent
B.intranet
C.firewall
D.ERP
15.?Members of Internet-based supply chains will need to evaluate their security needs and employ ()and other electronic security tools to protect confidential data.
A.telnet
B.patents
C.passwords
D.encryption technologies
16.On the Internet, a?()?is a site that consists of links to other websites.
A.system
B.strategy
C.portal
D.password
17.If you need to access information and know where it is on the web, you only need enter the entire www address into your browser's ().
A.http
B.computer
C.address
D.Unifrom Resource Loactor field
18.To B2B EC, the focus of vendors' competition has been turned from the products to ().
A.service
B.profit
C.low-cost
D.efficiency
19.() is a key factor in successfully moving products through the supply chain.
A.none of them
B.information sharing
C.information opening
D.information flowing
E.Information management
20.Manufacturer model is also called ()
A.e-tailer
B.catalog merchant
C.a direct model
D.Bit vendor
南开19秋学期(1709、1803、1809、1903、1909)《电子商务英语》在线作业[答案]多选题答案
二、多选题 (共 10 道试题,共 20 分)
21.brokerage models include()
A.marketplace exchange
B.content-targeted advertising
C.buy/sell fulfillment
D.bounty broker
22.detailed client information such as()can help business to set their marketing strategies effectively.
A.purchasing power
B.product quality
C.personal preferences
D.mode of consumption
23.In general, the major benefits of B2B are()
A.reduce inventory levels
B.reduce administrative costs
C.lower earch costs and time for buyers
D.decrease productivity of employees
24.The broadcaster is part of a complex network of()
A.distributors
B.content creators
C.cable system
D.advertisers
25.Packet filtering firewalls identify and control traffic by examining the (),(),and ().
A.ways
B.source
C.port
D.destination
26.a firewall is both policy and the implementation of that policy in terms of (),(),and (), as well as other security measures
A.softwares
B.routers
C.network configuration
D.host systems
27.Marketers with global goals are now establishing ()
A.security system
B.multiple-language versions of their Web sites
C.mirror sites
D.language tools
28.The essential security requirements for safe electronic payments are()
A.nonrepudiation
B.integrity
C.encryption
D.authentication
29.Internet is a network of interconnected networks. This network has ()
A.software
B.people
C.computers
D.a information
30.There are two types of encryption:()
A.secret key
B.public key
C.missing key
D.double keys
三、判断题 (共 20 道试题,共 40 分)
31.information management is a key factor in successfully moving products through the supply chain.
32.The Web site can be promoted expensively throughout the world with links on other Web pages and in E-mail newsletters.
33.If you need to access information and know where it is on the Web, you only need to enter the entire www address into your browser’s Uniform Resource Locator (URL) field.
34.Internet translation tools make it easier to establish mirror sites and multiple-language versions of their web sites.
35.B2B electronic commerce may give companies the less advantages that they need to achieve productivity gains.
36.EC means using simple, fast and low-cost electronic communications to transact, without face-to-face meeting between the two parties of the transaction.
37.If the EDI net work requires the receiver's computer to be in a ready-to-receive mode, it is less common.
38.incentive market provides suggestion for customers for making purchases from associated retailers.