Current location - Quotes Website - Signature design - 2009 Assistant E-commerce Division E-commerce Division Comprehensive Simulation Knowledge Test Paper (1)
2009 Assistant E-commerce Division E-commerce Division Comprehensive Simulation Knowledge Test Paper (1)
First, multiple-choice questions (65438+ 0 points for each question, * * * 60 questions)

1. () is a digital file containing the holder, personal information, public key, serial number of certificate, validity period, electronic signature of issuing unit, etc. (1)

(a) digital certificate (b) digital signature (c) electronic seal (D)CA

2. The real name of () is non-volatile random access memory (NVRAM), and its characteristic is that data will not disappear after power failure, so it can be used as external memory. (1)

(a) flash memory (b) memory (c) read-only memory (d) hard disk

3. () belongs to horizontal B2B e-commerce. (3)

(a) Dell Computer (b) Cisco (c) global sources Network (d) Shanghai Book City.

4. The meaning of 4.EDI is (). (2)

A. Electronic data processing B. Electronic data interchange C. Electronic fund transfer D. Electronic sales system

5. The monitor and printer belong to () in the computer system. (3)

A. auxiliary memory B. input device C. output device D. software system

6. The research on the prevention and control of computer viruses and other harmful data endangering public safety is managed by (). (4)

A. Ministry of Industry and Commerce B. Ministry of Security C. Ministry of Justice D. Ministry of Public Security

7. To insert the banner advertisement () correctly, which of the following commands should be executed? B

(a) "Insert"-"Image"

(b) Insert-Component-Banner Ad Manager

(c) Insert-Banner Ad Manager

(d) Insert-Image-Banner Advertisement Manager

8. Digital certificate is a series of data that identifies the information of both parties in network communication. (1)

(1) Identity (2) Capital (3) Logistics (4) Order

9. E-commerce among consumers, namely () e-commerce. (4)

A.B2C B.B2BC.G2GD.C2C

10. () is a third-party organization that provides authentication. (3)

A. Online trading center B. Payment platform C. Certification center D. Online industrial and commercial bureau

1 1. In HTML, () is a page title tag. (2)

(1)< head & gt (b) < title & gt(C)& lt; hr & gt(D)& lt; body & gt

13. In HTML, the align attribute means (). (2)

(a) Display bullets of different shapes (b) Control the alignment of text.

(c) Define the font used for text (d) Define the number of rows in the cell.

14. 1994 18 In February, China promulgated (), which is the first computer security regulation in China and the overall scheme of computer security work in China. (3)

(a) New Criminal Law (b) Computer Security Law

(3) Regulations on the Security Protection of Computer Information Systems in People's Republic of China (PRC) (4) Regulations on Computer Security.

15. When defining a style, put the content of the style definition in the () tag. (3)

(1) "< > (b)" () "(c)" {} "(d) <; Script > ... <; /script & gt;

16. In the process of e-commerce, people need to use () to prove their identity to each other. (3)

(a) email account number (b) electronic fingerprint (c) electronic signature mechanism (D)IP address.

17. In (), computers can use HyperTerminal to communicate. (1)

A. peer-to-peer network B. broadcast network C. non-peer network D. VPN

18. For the same sound file, the minimum file format is generally (). (2)

(A)WAV file (B)MID file (C)MP3 file (D)rm file.

19. The biggest advantage of mobile storage devices is (). (3)

A. low unit cost of standard storage B. large storage capacity

C. easy to store, less affected by the outside world D. convenient and easy to use.

20.ASP's default scripting language is (). (3)

(A)Delphi(B)JavaScript(C)VBScript(D)CSS

The () top-level category in the 2 1. newsgroup indicates the topic about the newsgroup itself. (2)

News C. Miscellaneous D. Talk

22. In the newsgroup, the Java focus group under the program topic in the top-level computer category is correctly described as (). (1)

Salary plan. Java. Java. Program. free ticket

News company. Java. Java. Compare. news

23. The process of searching for information publishing sources and collecting commercial information through search engines () effectively ensures the accuracy of information. (1)

A. the intermediate links of information transmission are reduced. B. manual intervention is reduced.

C. Improve the relevance of search results D. Improve the timeliness of information.

24. () is the most effective and commonly used method of online market research. (1)

(a) Online questionnaire survey (b) Newsgroup discussion (c) E-mail (d) Online question and answer.

25. Do the following () options meet the design requirements of the questionnaire? (3)

(a) Is this seasoning very damp? (b) Is this seasoning very spicy?

(c) Is this seasoning wet or spicy? (d) Is this seasoning delicious?

26. Merchants should take () as the main business platform to carry out e-commerce activities. (3)

A.bbsb E-mail C. Online store D. Telephone ordering

27. () is the core of the store generation system. (4)

(1) Front desk business system (2) Background data system (3) Site management system (4) Store management system.

28.PSD refers to (). (3)

A. structured query language B. data definition language C. mobile storage device D. personal storage device

29. Due to the characteristics of online advertising (), the company placed its advertisements and related product introductions in many places on the network. (3)

(a) fast feedback, (b) high efficiency, (c) low cost and (d) strong interactivity.

30. In the process of online document design, we should pay attention to ensure that the order is not confirmed in the mall before (). (3)

(a) convertibility (b) transitivity (c) modifiability (d) traceability

3 1. is suitable for the situation that goods are easy to move centrally and the demand for similar goods is large, which belongs to the () distribution operation method. (1)

(a) sowing mode (b) sorting mode (c) picking mode (d) picking mode

32. The customer's purchase record belongs to () information. (4)

(a) customer's static (b) customer's operation (c) customer's dynamic (d) customer's behavior.

33. An electronic contract refers to a contract concluded through a computer network system and generated, stored or transmitted in the form of ().

(4)

(a) data file (b) digital information (c) digital file (d) data information

34. In the network marketing strategy, () is the main competitive means, which is related to the realization of enterprise marketing objectives. (2)

A. product strategy B. pricing strategy C. distribution strategy D. promotion strategy

35. If the first order is in () status, you cannot merge orders. (4)

(a) unprocessed; (b) it has been confirmed; (c) subject to inspection; (d) delivered.

36. () The determination of the legal effect of electronic contracts only meets the most basic functional requirements of contracts. ()A

(1) Electronic Signature Law (2) Network Intellectual Property Law

(c) Information Security Law (d) Electronic Contract Law

37.SET protocol is the network standard protocol of the application layer above (). (4)

(a) data link layer (b) physical layer (c) transport layer (d) dialogue layer

38. Websites with suffixes. Net domain name is (). (4)

A. general website B. computer website C. business website D. website of network service company

39. The fundamental purpose of () is to safeguard the public interest and protect the information vulnerable groups. (2)

(1) Information search system (2) Information disclosure system (3) Information release system (4) Information encryption system.

40.FAQ refers to the use of website pages to provide customers with questions about product use, technical support and enterprise situation (). (2)

(a) List of questions (b) Ready-made answers (c) Consultation answers (d) Question and answer service

4 1. Establish contact with various databases and communicate with (). (1)

(1) SQL language (2) VB (3) C language (4) Java.

42. The terminal operation of the distribution center is (C)

A. tally B. distribution C. loading and delivery D. plan analysis

43. Which of the following databases is considered to be widely used and has good performance ()? (2)

(a) format database (b) relational database (c) mesh database (d) hierarchical database

44. In EAN, the code of P 1~P3 in EAN- 13 is (). (3)

A. manufacturer code B. commodity code C. country or region code D. check code

45. Information that occurs in the process of logistics activities. Such as inventory type, inventory volume, transportation volume, investment under construction, arrival and departure of port ship trade goods are all (c)

A. Planning information B. Statistical information C. Control and operation information D. Supporting information

46. The brand and packaging of products belong to the () level in the overall concept of products. (2)

A. Core products B. Entity products C. Value-added products D. Additional products

47. The abbreviation of electronic ordering system is (D).

A. Location B.EPS C.GPS D.EOS

48. The purpose of obtaining the bid price is (). (1)

A. get the lowest price. Draw up a tender list. Review suppliers. Evaluate suppliers.

49. Among the basic documents used for internal control of enterprise procurement and payment business cycle, () is a pre-numbered document prepared by the procurement department to authorize suppliers to provide goods. (2)

A. Purchase requisition B. Order C. Acceptance receipt D. Debit notice

50. The following is the security password (). (4)

(a) 123456(b)abcdefg(c)45ff(d) 14sd%^df4 1

5 1. () is an asymmetric cryptographic algorithm. (1)

(A)RSA algorithm (B)DES(C)AES(D) circular curve algorithm.

52. In online procurement, the evaluation score used to evaluate the performance of suppliers is (), and the score is calculated in the form of a percentage system. (4)

A. price+quality B. price+quality+suitability

C. price+quality+delivered quantity D. price+quality+delivered quantity+degree of cooperation

53. Usually, there are a large number of numerical records () and (c) in the databases of industrial and commercial enterprises and government agencies.

(a) correlation coefficient (b) cluster analysis (c) time series (d) discriminant analysis

54. In the OSI security architecture, what are the following errors in the system communication mode? ( )。 (3)

(a) Information is transmitted from the application software of one computer system to the application software of another computer system.

(b) It is necessary to pass the first-level on-site inspection reference model.

(c) The whole communication process is to transmit information from top to bottom or from bottom to top.

(d) The whole communication process is to transfer the information of one system to another system from top to bottom, and then transfer the information of the other system to the receiving application from bottom to top.

55. () belongs to the category of additional products. (1)

(a) After-sales service (b) Basic utility and benefits pursued by customers.

(c) Quality (d) Improved products

56. () is to use a fortress host with two network cards as a firewall. (1)

(a) Dual-homed host firewall (b) Shielded subnet firewall (c) Shielded host firewall (d) Shielded router

57. Which of the following is the core part (b) of communication security?

(a) Computer security (b) Password security (c) Network security (d) Information security

58. The following statement is true (). (3)

(1) It is impossible for a newly bought computer to carry a computer virus.

(2) Genuine software cannot contain computer viruses.

(c) Pirated software can carry computer viruses.

(d) Antivirus software can be used to detect and kill viruses.

59. () plays an important role in the research activities of competitors. (2)

(a) Online direct survey (b) Online indirect survey (c) E-mail questionnaire (d) Focus group.

60. In Europe and America, () generally refers only to sales logistics. (3)

(a) Sales Logistics (b) Logistics (c) Logistics Distribution (d) Sales Distribution

Second, multiple-choice questions (65438+ 0 for each question, 40 questions * * *)

6 1. Computer network is mainly composed of resources, servers and (). (ABCD)

(a) Workstation (b) Network equipment (c) Network protocol (d) Network operating system

62. E-commerce refers to all kinds of business activities conducted by the parties or participants in a transaction by using modern information technologies such as computer technology and network technology (mainly the Internet), including (). (ABCD)

(a) Trade in goods (b) Trade in services (c) Trade in technology (d) Trade in intellectual property.

63. Digital video is (ABD).

(1) Digital video captures traditional analog video clips and converts them into digital signals.

(b) Digital video is a movie file.

(c) Digital video production is usually more difficult than animation creation.

(D)VCD is a compressed digital video.

64. According to the different types of networks used, the forms of e-commerce can be mainly divided into (). (BCD)

A.C2C e-commerce

B.EDI (Electronic Data Interchange) service

C. Internet commerce

65. Any physical transaction in e-commerce consists of several basic parts, such as (). (automatic call distributor)

(1) Information flow (2) Passenger flow (3) Capital flow (4) Logistics.

66. Threat agents refer to people or programs that attack the system through vulnerabilities, which are divided into (). (CD)

(a) Safe (b) Unsafe (c) Malicious (d) Non-Malicious

67. Under the condition of e-commerce, the buyer's obligations include (). (ABD)

(a) The obligation to pay the price in the way specified in online transactions

(b) The obligation to accept the subject matter at the time, place and manner stipulated in the contract.

(3) To undertake the guarantee obligation for the quality of the subject matter.

(d) Obligation to accept the subject matter

68. Regarding the characteristics of HTML files, the correct statement is (). (ABCD)

(A)html files have the extension ". Html or. htm”。

The HTML file is a plain text file.

HTML is the foundation of web pages.

(d) You can use a text editor, such as Notepad and WordPad, to edit HTML files.

69. Computer security is usually manifested in (). (CD)

A. Security protection of computer files B. Protection of computer passwords

C. Security protection of computer systems D. Preventing and combating computer crimes

70. In FrontPage, the event that can add DHTML effect is (). (ABCD)

(a) Click (b) Double-click (c) Hover (d) Web page load.

72. About the characteristics of CSS, the correct statement is (). (ABD)

(a) convenient to modify the page; (2) It is convenient to unify the page style.

(c) Promote interaction with databases; (d) Reduce the size of web pages.

73. About peer-to-peer communication and peer-to-peer networks, the correct statement is (). (AB)

All computers in peer-to-peer communication assume the roles of both server and client.

B.Windows XP, Windows 2000 and NetWare Lite are all peer-to-peer network systems.

C. Peer-to-peer networks are suitable for all kinds of large, medium and small network systems.

D. Peer-to-peer networks are cheap and easy to manage.

74. The influence of e-commerce on enterprise benefits can be analyzed and discussed from () and other aspects. B C D

It helps to reduce the purchase cost and sales price. B, it promotes sales and reduces inventory.

C. access to new sales opportunities

D. Convenient and effective customer service

75. The following () SQL statements belong to data manipulation languages. (BD)

A. Change B. Select C. Create D. Update

76. The main contents of online market research are (). (ABC)

(a) Research on market demand (b) Research on marketing factors (c) Research on competitors (d) Internal environment of the organization.

77. The project management process is divided into five processes: (1) implementation, control and closure. (communication)

(a) Start (b) Organize (c) Plan (d) Lead.

78. With the development of mobile communication technology, a variety of vehicle traffic management systems have emerged, mainly including (). (ABD)

A.MCA wireless technology B.GISC.PDTD.GPS

79. The settlement mode of online commodity trading center effectively avoids (). (ABC)

(1) Interception of funds in various forms; (2) Multi-level misappropriation of funds.

(3) Multi-form capital occupation (4) Multi-level capital withdrawal.

80. Questionnaire design report, briefly introducing the questionnaire (), etc. (ABCD)

(1) Design ideas (2) Organizational structure (3) Design process (4) Revision.

8 1. Measures to prevent black-box operation in enterprise procurement are "three unification and one point", in which "three unification and one point" means that all purchased goods should be (). (BCD)

A. unified cost control B. unified purchase acceptance C. unified audit settlement D. unified transfer payment

82.SSL can be used to encrypt any application based on TCP/IP, such as (). (automatic call distributor)

(A)HTTP (B)X.23 (C)Telnet (D)FTP

83. On the Internet, the main way to get customer feedback information is (). (ABD)

(a) Online questionnaire survey (b) Creating online community (c) Collecting information (d) Providing free products.

84. The main encryption methods of e-mail are (). (AB)

(a) using PGP plug-ins (b) using digital certificates.

(c) Use the encryption function that comes with the system.

(d) Use compression encryption software.

85. Relevant customer records listed in the CRM system include: () and other precautions. (ABCD)

(a) Basic personal data of customers; (b) Records of orders and payments; Complaints and handling; Arrears.

86. Every commodity on the shelves of retail stores is displayed with a price tag, whose function is (). (communication)

A. tell the price B. it's easy to distinguish between goods

C. calculate whether the display volume is lower than the set ordering point D. it is convenient for customers to choose.

87. The functions of online banking generally include (). B.C.

A. Bank projects B. Information dissemination C. Business services D. Enterprise management

88. The virus can be attacked by () computer. (ABC)

(A)IE browser (B)Cookie program (C)Java application program (d) above are not allowed.

89. The development of online banking has not reached the goal and effect predicted by commercial banks, and there are still many problems in its development, such as (). (ABC)

(a) Online customers account for a small proportion of the total number of customers; (2) The actual utilization rate is low.

(c) Low customer trust; (d) the price is unreasonable.

90. Online after-sales service is (). (ABCD)

(a) Maintaining the reputation of commodities; (b) Ensuring the quality of commodities; (c) Fulfilling product commitments; and (d) Providing relevant information about commodities.

9 1. The core and key issue of a successful e-commerce is to ensure the security of transactions, including (). (ABCD)

(a) Computer security (b) Password security (c) Network security (d) Information security

92. The time arrangement of online advertising can be divided into (). (automatic call distributor)

(a) continuous (b) cyclic (c) intermittent (d) real-time.

93. According to the overall operation process, electronic ordering system can be divided into (). (automatic call distributor)

A. EOS system within the enterprise B. EOS system within the department

C. EOS system between retailers and wholesalers

D. EOS system among retailers, wholesalers and manufacturers

94. Computer security refers to a state in which computerized data and program files cannot be accessed, acquired or modified. (BCD)

(a) authorized personnel (b) computer (c) program (d) unauthorized personnel

95. The information flow includes (), etc. (ABCD)

A. Promotional marketing B. After-sales service C. Technical support D. Providing commodity information

96. Style requirements for online documents (CDs) in stores.

(a) determine that color, font and glyph of the online document.

(b) List the relevant data items of various files.

(c) List the contents of prompt words required by online documents for the convenience of customers.

(d) List the types of online documents required.

97. The objects involved in the set protocol are (). (automatic call distributor)

(a) consumer (b) issuing bank (c) receiving bank (d) authentication center

98. The transaction subject can be (). (automatic call distributor)

A. Enterprise B. Network C. Store D. Individual

99. The scope of e-commerce legislation should be the intersection of two subsets, namely (b) and (c).

(a) Payment (b) Commerce (c) Means of communication included in electronic commerce (d) Transaction.

100. Among the evaluation indicators for suppliers, the following () are quality indicators. (communication)

A. Rejection rate B. Overdue rate C. Average qualified rate D. On-time delivery rate