Introduction to E-commerce Consolidate Sprint Test Questions
First, multiple-choice questions (this big question ***25 small questions. 1 point for each small question, ***25 points)
1.C2 C is a kind of ()
A. E-commerce between enterprises and consumers
B. E-commerce between enterprises and governments
C. E-commerce between consumers
D. E-commerce between enterprises
2. The principle of functional equivalence refers to
A. In the legal treatment of domestic e-commerce activities and international e-commerce activities, we should treat them equally
B. E-commerce should not discriminate between traditional password method and asymmetric public key method.
C. Fair concept of business transactions
D. A method to compare the effectiveness of data messages with the functions in paper form
3.1995. Safety first online bank was born in ()
A. Canada
B. United States
C. Britain
D. Japan
4. According to the Telecommunications Ordinance, China implements ()
A. Free declaration system
B. Licensing system
C. First application first licensing system
D. Filing system
5. The narrow form of electronic contract can be ().
A. Contract concluded by telegram
B. Contract concluded by EDI
C. Contract concluded by telex
D. Contract concluded by fax
6. Formation of contract ()
A. refers to that the contracting parties reach an agreement on the main terms of the contract. That is to say, both parties have the same intention
B. It means that the offeree agrees to all the conditions of the offer to express the intention of concluding the contract
C. It means that the contract is effective
D. It means that the content and form of the contract are legal
7. The laws and regulations that recognize the legal effect of electronic signature for the first time in China are ().
A. Electronic Signature Law
B. Contract Law
C. Regulations on Electronic Signature
D. Model Law on Electronic Signature
8. The electronic signature law formulated by adopting the technology-specific legislative model is ().
A. Digital Signature Law of Utah, USA
B. Electronic Transaction Law of Singapore
C. United Nations Model Law on Electronic Commerce
D. EU Directive on the Same Framework of Electronic Signatures
9. The legally significant service for verifying the authenticity of electronic signatures and their signers is ()
A. Authentication
B. Electronic authentication
C. Cross-authentication
D.PKI system authentication
1. At present, the main mode of electronic authentication service management in the United States is ().
a. compulsory licensing system authorized by the government
B. non-compulsory licensing system
C. filing system
D. completely relying on market regulation, Self-discipline of the industry
11. The provisions on the issuance of card access tools in the Electronic Fund Transfer Law and E Regulation are to protect consumers' ()
A. Right to choose
B. Right to know
C. Right to property safety
D. Right to privacy
12. The credit card payment under the set agreement belongs to ().
a. unencrypted credit card payment
b. simple encrypted credit card payment
c. credit card payment verified by a third party
d. special agreement credit card payment
13. The following is not a payment order error ().
a. payment order authentication error
b. wrong expression of payment order
c. wrong execution of payment order
d. wrong payment order
14. computer information data units transmitted on the Internet and received by users? Bit? The taxation scheme based on the quantity of is called ()
A. Byte tax
B. Tariff
C. International tax
D. Commodity tax
15. The tax levied based on the sales income (or operating income) of taxable goods or services is ().
A. Personal income tax
B. Bit tax
C. Consumption tax
D. Business tax
16. Page advertisements can be divided into ()
A. Search advertisements, e-mails, BBS advertisements
B. Graphic advertisements, text advertisements and sponsored advertisements
C. Banner ads
D. Button ads, BBS ads, sponsored ads
17. The protection mode of online privacy mainly includes ()
A. Legal measures, industrial policy guidance, technical measures and third-party certification
B. National legislation-led, Industry self-discipline and user self-discipline
C. Enterprise industry self-discipline and user self-discipline
D. Combination of national legislation leading and enterprise industry self-discipline
18. Data users refer to ()
A. Legally collecting, owning, People who control and use relevant data
B. People who collect or obtain other people's personal data
C. Legal data subjects
D. Institutions or individuals who collect personal information
19. Technical measures for copyright protection refer to ()
A. Technology invented by copyright owners to prevent unauthorized use of works to protect and manage their own copyrights. Preventing others from infringing acts
B. The copyright owner takes the initiative to protect and manage his own copyright and prevent others from infringing acts
C. The copyright owner issues a statement prohibiting others from using the work to protect and manage his own copyright and prevent others from infringing acts
D. The copyright owner takes the initiative to take technical measures to protect and manage his own copyright in order to prevent unauthorized and illegal access and use of the work. Prevention of infringement by others
2. Trade secrets refer to ()
A. Technical information and business information that are not known to the public and are practical and have been kept confidential by the obligee
B. Information that is not known to the public and can bring economic benefits to the obligee
C. Information that is not known to the public and can bring economic benefits to the obligee, Practical information
D. Technical information and business information that are not known to the public, can bring economic benefits to the obligee, are practical, and have been kept confidential by the obligee
21. Cybersquatting refers to ()
A. Reverse domain name encroachment
B. Out of trademark (trade mark) from others. Malicious registration and selling of domain names for profit
C. Theft and dilution of domain names
D. Legal owners of the same trademark want to use their trademarks as domain names
22. The crime of illegally invading computer information systems means ()
A. Violation of state regulations, The act of invading the computer information system in the fields of state affairs, national defense construction and cutting-edge science and technology
B. The act of deleting, modifying, adding and interfering the functions of the computer information system in violation of state regulations, which causes the computer information system to fail to operate normally and has serious consequences
C. The act of deleting, modifying and adding operations to the data and applications stored, processed or transmitted in the computer information system in violation of state regulations, Acts with serious consequences
D. Deliberately making and spreading destructive programs such as computer viruses, which affect the normal operation of computer information systems, Behavior with serious consequences
23. The black number of computer and network crimes refers to ().
a. The frequency or times of hackers invading computer information systems
b. The number of crimes that have not been discovered, prosecuted or punished
c. Generally refers to the number of all computer viruses
d. The number of hackers who have damaged computer network systems
24. The online dispute resolution mechanism refers to ().
A. All ways to solve disputes arising from e-commerce contracts between enterprises
B. All ways to solve disputes arising from e-commerce contracts between enterprises and consumers by non-court but fair third parties on the Internet
C. By email, All ways to solve disputes between enterprises and consumers due to e-commerce contracts
D. Through real-time communication software such as MSN, All the ways to solve disputes arising from e-commerce contracts between enterprises and consumers
25. The legal status of electronic evidence means ().
A. Admissibility or acceptability of electronic evidence
B. In what form is electronic evidence submitted to the court and presented
C. Any electronic evidence can enter the proceedings or other proof activities
D. Proof of electronic evidence
II. Multiple-choice questions (this big question ***5 small questions, 2 points for each small question, ***1 points)
26. The following legal documents issued by UNCITRAL are ().
A. Model Law on Electronic Commerce
B. Uniform Rules for Electronic Signatures
C. European Action Plan on Electronic Commerce
D. Model Law on Electronic Fund Transmission
E. Uniform Electronic Transaction Law
27. The parties involved in electronic payment include ().
A. Buyer and Seller
B. Bank
C. Certification Center
D. Data communication network
E. Government regulatory agency
28. According to the form of expression, The main types of online advertisements include ()
A. Page advertisements
B. E-mail advertisements
C. Search advertisements
D. Website advertisements
E.BBS, NewsGroup and QQ advertisements
29. The infringement ways of online privacy mainly include ().
A. Abuse of cookies
B. Hacking behavior
C. Monitoring software abuse
D. Third-party disclosure or * * * enjoyment
E. Abuse identification mechanism
3. The following are the characteristics of electronic evidence ().
A. High-tech
B. Objectivity and fragility
C. Invisibility
D. Destructibility
E. Compoundness
III. Noun explanation questions (this big question ***5 small questions, 3 points for each small question, ***15 points)
31. generalized e-commerce law
32. contract
33. data collection subject of non-government agencies
34. right to disseminate information on the internet
35. protective jurisdiction
4. short answer questions (this big question ***4 small questions, 5 points for each small question.
37. Briefly describe the main functions of electronic money.
38. Briefly describe the relevant provisions of China's Copyright Law on the protection of technical measures.
39. Briefly describe the obligations of IAP in online advertising.
5. Discussion questions (this topic is ***2 small questions, with 1 points for each small question and 2 points for * * *)
4. Try to describe the main features of China's Electronic Signature Law.
41. Explain the reasons why China's Electronic Signature Law stipulates the compulsory licensing system for electronic authentication services.
VI. Case analysis questions (this big question is ***1 small question, 1 points)
42. A website is an e-commerce company that provides online commodity auction. Is Xiaoli on the website? Beautiful cosmetics? The seller found that a cosmetic she sold was 4% cheaper than the same brand of goods she bought in the store. After carefully checking the online product introduction and related pictures, Xiaoli bought the cosmetics according to the established shopping process. Subsequently, Xiaoli found that the cosmetics bought online were fakes. Xiaoli took the website to court when she could not negotiate with the seller to return the goods and could not know the seller's detailed contact information. The court is required to safeguard the legitimate rights and interests of consumers in accordance with the relevant provisions on the protection of consumers' rights and interests, and judge the website to compensate for the losses. However, the court did not adopt Xiaoli's appeal. Because,? Beautiful cosmetics? It is an online shop opened according to the service agreement of the website. The website only provides a trading platform for buyers and sellers, and prompts on the webpage, which does not guarantee the authenticity of the goods sold by the seller. When Xiaoli was looking for a seller, the website also tried its best to provide the contact information when the seller registered.
According to the case analysis, answer the following questions:
(1) What are the basic requirements for the responsibility norms of Internet service providers from the facts triggered by the case?
(2) under what circumstances, the website may be liable? ;