Current location - Trademark Inquiry Complete Network - Trademark registration - Five-level theoretical problems of e-commerce
Five-level theoretical problems of e-commerce
judgment of theoretical questions: 1. At present, all relational database management systems, such as ORACLE, SYBASE, DB2, INFORMIX and SQL Server, use SQL as the basic tool language. R 2, ORACLE is a relational database management system developed by Microsoft, which is suitable for large, medium and microcomputer. W 3. The security performance of the firewall is fixed and cannot be set. W 4. "Home Page" is the first start page that Internet Explore opens every time it is started. There are three setting methods: "Use current page", "Use default page" and "Use blank page". R 5. FTP protocol is a part of TCP/IP protocol, which defines the interaction process between local login client and remote server. W 6, regional brands set up a unified brand image, so that the credit of well-known brands can be used to drive the sales of related products, and this marketing strategy will not adversely affect the overall situation of enterprises. W 7. The topic of a news group can be judged by reading the articles of association of the discussion group or by the content of the article. R 8. If the order is in "unprocessed" status, you can cancel the order by E-mail or telephone. W 9. The shopping cart display module is mainly realized by Cookie technology. Cookies are called client-side persistent information, which is a small program file stored in the Web client. R 1. Digital signature can ensure that the information has not been modified since it was issued until it was received, and the issued document is a real document. R single choice 1. The following are the advantages of online direct selling of goods, of which (D) is correct. (a) It can effectively increase the transaction links; (b) It can greatly increase the transaction cost; (c) It can increase the final price of the goods obtained by consumers; (d) It can effectively reduce the technical support cost of after-sales service; 2. The following items are not classified by search tools according to the service provision mode; (c). (a) Full-text database retrieval software (b) Non-full-text database retrieval software (c) Meta-search engine (d) Subject guide retrieval 3. It must rely on a powerful database as the backing, and can provide complete literature and information retrieval, with high recall rate and high requirements for retrieval technology. This search engine is (a). (a) Full-text database retrieval software (b) Non-full-text database retrieval software (c) Topic guide retrieval software (d) Meta-search engine 4. The following electronic payment tools that do not belong to electronic checks are (d). (a) E-check (b) E-remittance (c) E-transfer (d) Smart card 5. About in-plant logistics, the incorrect statement is (B)(A) Put the purchased raw materials and spare parts into the warehouse and keep them properly, and send them out to the production site in time when production is needed; (b) Send the produced goods from the warehouse of the factory, logistics center or other units to the wholesalers; (c) Produce the factory. 6. The logistics activities of commercial enterprises in commodity management include different stages of commodity purchase, sale, transfer, storage and return, and the focus and purpose of their logistics activities are also different. The following statement is wrong (D). (a) As far as possible, reducing the cost of purchasing goods and related expenses will bring higher profits to enterprises. (b) The main function of internal logistics of commercial enterprises is to ensure the normal sales of goods. (c) Sales logistics can complete the trading activities of goods, and maintain the relationship between enterprises and customers through good sales activities, and do a good job of after-sales service for customers. (d) The return logistics of enterprises is to return goods to the purchasing stronghold, which is not important to large enterprises. 7. (a) A security system that can only manage the mutual access between two networks compulsorily; (b) An internal network is isolated as a trusted network by shielding unauthorized network access; (c) It is used to limit the access of an internal trusted network to an external network or other untrusted networks within a specified range; (d) The security performance of a firewall is set according to the requirements of system security, which is different due to different security levels of the system; 8. The statement about a uniform resource locator is wrong; (d) (A)URL is the address code of WWW. (b) Using URL can describe all kinds of information resources in a unified format, including files, addresses and directories of servers. (c) It completely describes the address of hypertext on the Internet. (d) All information resources that can be accessed on WWW have a unique address, that is, URL 9. The following websites belong to Class C websites. (b). (a) 127...1 (b) 192.168..1 (c) 172.3.115.46 (d) 1.3.115.234 1. When we want to make a "hyperlink" in a web page, we should pay attention to (. (a) unpaired tags must be used to complete the link. (b) In tags, absolute or relative URLs can be used to indicate the link target. (c) Absolute URLs are usually used to link other pages in the current previous website. (d) "Relative URLs" are mainly used to link pages of other websites. 11. The statement about the restricted site area is correct. (a). (a) This area contains sites that users don't trust. (b) The default security level in this area is "low". (c) Files can be downloaded or run directly. (d) The default security level in this area is "medium-low". 12. About making web pages with FrontPage, the correct statement is (c). (a) You must know the HTML language. (b) With FrontPage, users can only customize tables. (c) You can convert the text on a webpage into tables. (d) There can be unlimited frames on a webpage, which will not affect the downloading time of the webpage. 13. The following are not classified as invasive viruses by infection mode. (d). (a) Computer virus infected in the boot area of the disk (b) Computer virus infected by the operating system (c) Computer virus infected by general application programs (d) Shell virus 14. The statement about the intrusion mode of computer virus is incorrect (c). (a) Operating system virus, which can cause the paralysis of the whole system; (b) Source virus is inserted into the source program compiled in FORTRAN, C or PASCAL before the program is compiled, and the virus program that completes this work is generally in the language processing program or connecting program; (c) Shell virus is easy to write, and it is not easy to find; (d) Intrusion virus is generally written for some specific programs; 15. Internet marketing has produced traditional marketing channels. (a) The importance of middlemen has increased. (b) The traditional international distribution network established by multinational companies will significantly reduce the barriers to entry for small competitors. (c) Distributors will probably no longer undertake after-sales service. (d) Through the Internet, manufacturers can directly contact end users. 16. Internet marketing has had a great impact on traditional marketing methods, among which (b) is wrong. (a) Gradually reflect the individualization of the market, and finally organize production and sales according to the needs of each user. (b) The enterprise competition of network marketing is a market-focused competition form. (c) The implementation of customer relationship management is the key to the success of network marketing. (a) The target market, customer form and product category based on the network era will be very different from before. 17. The influence of network marketing on traditional marketing strategies does not include (d). (a) Impact on traditional product brand strategy (b) Impact on pricing strategy (c) Impact on traditional marketing channels (d) Consolidation of traditional advertising barriers 18. The impact of online marketing on marketing strategy is incorrect (a). (a) It is more difficult for small enterprises to participate in the global competition. (b) The market competition in the Internet age is transparent, and everyone can master the product information and marketing actions of competitors. (c) The cost accounting of global marketing is lower than that of regional marketing, and enterprises will have to enter the era of transnational operation. (d) Not only should they be familiar with the characteristics of customers in transnational markets to win trust and meet their needs, but they should also arrange transnational production, transportation and future services, and these transnational businesses are all through. (a) The first level is free business information, mainly social public welfare information. (b) The second level is information that charges lower fees and only charges basic service fees. (c) The third level is information that charges standard information fees. (d) The fourth level is information with high quality and good price. Most of the online business information belongs to this category. 2. It is incorrect to say that online marketing eliminates traditional advertising obstacles. (b). (a) Cyberspace is infinitely expandable, Therefore, advertising on the Internet can be less limited by space. (b) Advertisements can't be selectively displayed according to the characteristics of visitors, such as hardware platform, domain name or search theme during access. (c) The rapid improvement of advertising efficiency has also created convenient conditions for online enterprises. (d) Advertisements sent to visitors can be quickly changed according to the purchase behavior of registered users. 21. In order to clearly show the results of comparison of various numerical data, You can choose (B)(A) pie chart (b) column chart (c) graph (d) area chart 22. Company Z wants to collect the quotation information of a brand of red wine sellers, but the following scheme is not feasible (c). (a) Inquire about the quotation in the seller's website (b) Inquire about the price of the government liquor monopoly organization (c) Inquire directly by mail (d) Pricing through business negotiation 23. The content of marketing factor research does not include (a). (a) The market share of our products in the whole market; (b) What is the potential demand in the market; (c) Research on the promotion strategy; (d) Price research; 24. Using E-mail to conduct market research; the following statement is incorrect (d). (a) Try to use plain text format in ASCII code. (b) First convey the most important information. (c) Take the file title as the subject of the email. (d) The more detailed the email, the longer the better. 25. The following introduction to the rating category of news groups is correct. (b). (A)Comp business (B)sci science (C)rec computer (D)alt miscellaneous 26. The problems that should be paid attention to in the design of online questionnaire are (a). (a) The questionnaire mailed to the respondents in the online market survey consists of four parts: greeting, question list, answer column and code column. (b) Inducing people to answer. (c) The question asked can be biased or misleading. (d) The meaning and scope of the question need not be clear. 27. Regarding the publishing skills of bulletin board advertisements, the following statement is incorrect. (d). (a) write a good title; (b) write a good title for the content part, Be concise and to the point (c) publish widely in relevant categories and places (d) consider the equipment conditions of service providers and

the technical force. 28. The following statements about the efficient management and operation mechanism of newsgroups are correct: (A)(A) users download new titles and articles every time they use newsgroup client software; (b) they are not allowed to visit newsgroups and browse home pages, send emails, Download and FTP upload files at the same time (c) After cutting off the network connection, users can't read and reply articles locally (d) Newsgroup client software can effectively organize all kinds of newsgroup information, which will reduce the efficiency of news processing for users. 29. The documents of online stores are the vouchers for transactions between merchants and users. The points that need attention and the skills that can be adopted in design are (d). (a) advertising is always necessary to minimize interference; (b) it should be explained in detail and not afraid of tolerance. (c) Provide customers with a permanent storage place. (d) Provide visual clues and links to shopping carts. The following statement about online shopping carts is wrong. (D)(A) Shopping carts provided by online stores accompany online consumers to shop, and the stores finally determine customers' orders according to the information of the shopping carts. (b) Whether the functions that the shopping carts provided by online electronic shopping malls can complete are reasonable and complete is very important for the final determination of customers' orders. (c) Shopping carts are very important. (d) It is forbidden for shoppers to update the goods in the shopping cart at any time, so as to prevent customers from deleting the purchased goods. (a) To be processed: because the information of the order is unknown, it needs to be confirmed by the customer. (b) Confirmed: it means that the order submitted by the customer is cash on delivery and has been regarded as a valid order by the order handler in the store. Entering the distribution process (c) has received the money, indicating that the customer has received the goods ordered by this order (d) has not been processed: indicating that the customer's order has just been submitted and has not been delivered. 32. The principle of digital certificate is correct (b). (a) Each user SETs a public key and uses it to decrypt and sign. (b) The digital certificate adopts a public key system, that is, a pair of matching keys are used for encryption and decryption. (c) A private key is set for a group of users to encrypt and verify the signature. (d) When sending a confidential document, the sender uses the private key of the receiver to encrypt the data, and the receiver uses its own private key to decrypt it. (a) consumers (b) offline stores (c) acquiring banks (d) certification centers (CA) 34. Electronic money is a new type of payment means compared with traditional money. The following introduction is wrong (b). (a) Electronic money mainly includes payment cards in the form of smart cards (such as Mondex cards) or digital money documents (such as eCard and Cybercoin). (b) Electronic money has the characteristics of wide use, flexibility, anonymity, quickness and simplicity. (c) It can only be operated by direct connection with banks when using electronic money. (D)Mondex cards are used for offline payment, and eCard is used for online payment. The following statement is wrong (a). (a) Early electronic money was popularized smoothly and has been widely used. (b) Electronic money does not need to be divided into denominations complementary to cash, especially suitable for payment of businesses with small amounts. (c) For security reasons, the actual payment is that consumers use secure encryption protocols to encrypt eCash and send it to merchants. (d) The difference between electronic money and credit cards is that banks lend funds to each cardholder. (a) In SET transactions, CA issues certificates to cardholders and merchants, but not to banks and gateways that receive money. (B)CA Center issues a digital certificate to each user who uses public keys, and the role of the digital certificate is to prove that the users listed in the certificate legally own the public keys listed in the certificate. (c) The digital signature of CA institutions makes it impossible for attackers to forge and tamper with certificates. (d)