电子商务专业英语 课后答案.docx
- 文档编号:8511191
- 上传时间:2023-01-31
- 格式:DOCX
- 页数:15
- 大小:23.81KB
电子商务专业英语 课后答案.docx
《电子商务专业英语 课后答案.docx》由会员分享,可在线阅读,更多相关《电子商务专业英语 课后答案.docx(15页珍藏版)》请在冰豆网上搜索。
电子商务专业英语课后答案
Chapter1IntroductiontoE-Commerce
ANSWER
I.Answerthefollowingquestions
1.business-to-consumer,business-to-business,businessprocesses,consumer-to-consumer,and
business-to-government
2.Abusinessmodelisasetofprocessesthatcombinetoachieveacompany’sgoal,whichisto
yieldaprofit.
NO.
3.Arevenuemodelisaspecificcollectionofbusinessprocessesusedtoidentifycustomers,
markettothosecustomers,andgeneratesalestothosecustomers.
4.booksandCDs,etc.
5.Transactioncostsarethetotalofallcoststhatabuyerandsellerincurastheygather
informationandnegotiateapurchase-and-saletransaction.
6.Asmorepeopleororganizationsparticipateinanetwork,thevalueofthenetworktoeach
participantincreases.Thisincreaseinvalueiscalledanetworkeffect.
7.Thekeyissuesthatanycompanyfaceswhenitconductsinternationalcommerceincludetrust
andculture,language,infrastructure,internationallawandcurrency.
8.Localizationmeansatranslationthatconsidersmultipleelementsofthelocalenvironment,
suchasbusinessandculturalpractices,inadditiontolocaldialectvariationsinthelanguage.
II.Fillintheblanksineachofthefollowing
1.Internet
2.dot-compuredot-com
3.international
4.commodity
5.electronictraditional
6.verticalintegration.
7.informationcoordination
8.valuechain
Chapter3E-BusinessModels
I.a)Trueb)False.Thisistheconceptofatrueauction.c)False.Areservepriceisthelowestpricea
sellerwillacceptinanauction.d)Truee)False.Thename-yourpricemodelallowscustomerstogetChapter1IntroductiontoE-Commerce115
alowerpricebyclearingthepricewithanumberofvendors.Thisdoesnotinvolveanauction.f)
False.Brick-and-mortarbusinessareofflinebusinesses.Thistermisoftenassociatedwith
companieswhohavebothandonlineandofflinepresence.g)False.Web-basedtrainingiscurrently
usedbyorganizationsaroundtheworld.h)Truei)Truej)True
II.a)Brick-and-mortarb)Demandsensitivepricingmodelc)shoppingcartd)auctione)vertical,
horizontalf)communityg)reverseauctionsh)B2Bexchangesi)onlinetradingj)comparison
shopping
III.Categorizeeachofthefollowingitemsasitbestrelatestothestorefrontmodel,theauction
modelorthedynamicpricingmodels:
a)Auctionmodelb)Auctionmodelc)Storefrontmodel
d)Storefrontmodele)Dynamicpricing.f)Dynamicpricing
Chapter4B2BE-Commerce
I.WriteanAbstractofthispaperinabout100words.
Abstract-Justastheindustrialrevolutionmechanizedthemanufacturingfunctionsoffirms,theinformation
revolutionisautomatingtheirmerchantfunctions.Fourtypesofpotentialproductivitygainsareexpectedfrom
business-to-business(B2B)electroniccommerce:
costefficienciesfromautomationoftransactions,potential
advantagesofnewmarketintermediaries,consolidationofdemandandsupplythroughorganizedexchanges,and
changesintheextentofverticalintegrationoffirms.ThearticleexaminesthecharacteristicsofB2Bonline
intermediaries,includingcategoriesofgoodstraded,marketmechanismsemployed,andownershiparrangements,
andconsidersthemarketstructureofB2Be-commerce.
II.Answerthefollowingquestions
1.ThepopularphraseB2Be-commercereferstothesubstitutionofcomputerdataprocessingand
Internetcommunicationsforlaborservicesintheproductionofeconomictransactions.
2.ExpectationsaboutproductivitygainsfromB2Be-commercecanbeusefullydividedintofour
areas:
possibleefficienciesfromautomationoftransactions,potentialeconomicadvantagesof
newmarketintermediaries,consolidationofdemandandsupplythroughorganizedexchanges,
andchangesintheextentofverticalintegrationofcompanies.
3.Intermediariescanreducetransactioncostsrelativetodirectexchange,byreducingthecostsof
search,certifyingproductquality,mitigatingcommunicationcosts,andprovidingguaranteesfor
buyerorsellercommitments.
4.E-commerceintermediariescanbeclassifiedintofourmaincategories:
brokers,auctioneers,
dealers,andexchanges.116电子商务专业英语(第二版)
III.StatewhetherthefollowingareTrueorFalse?
1.T2.T3.F4.T5.T
Chapter5ElectronicPaymentSystems
ANSWER
I.Answerthefollowingquestions
1.Listfivepartiesmaybeinvolvedinthee-paymentmethod.
Theyare:
a)Customer/payer/buyer.Thepartymakingthee-paymentinexchangeforgoodsor
services
b)Merchant/payee/seller.Thepartyreceivingthee-paymentinexchangeforgoodsand
services
c)Issuer.Thebanksornonbankinginstitutionsthatissuethee-paymentinstrument
usedtomakethepurchase
d)Regulator.Usuallyagovernmentagencywhoseregulationscontrolthee-payment
process
e)AutomatedClearingHouse(ACH).Anelectronicnetworkthattransfersmoney
betweenbankaccounts
2.ListCharacteristicsofSuccessfulE-paymentMethods
Interoperabilityandportability;security;anonymity;divisibility;easyofuse;
transactionfees;criticalmass.
3.Whatarevirtualcreditcards?
Thisisane-paymentsysteminwhichacreditcardissuerissuesaspecialnumberthat
canbeusedinplaceofregularcreditcardnumberstomakeonlinepurchases.Thisallows
userstouseacreditcardonlinewithouthavingtodisclosetheactualcreditcardnumber.
4.Describethedifferencebetweenthecontactcardandcontactlesscard.
Acontactcardisinsertedinasmartcardreader.Thesecardshaveasmallgoldplate
aboutone-halfinchindiameteronthefront;whenthecardisinsertedinthereader,the
platemakeselectroniccontactanddataarepassedtoandfromthechip.
Inadditiontothechip,acontactlesscardhasanembeddedantenna.Inthiscase,data
(andapplications)arepassedtoandfromthecardthroughthecard’santennatoanother
antennaattachedtoacardreaderunitorotherdevice.
5.ListAdvantagesofE-billingChapter1IntroductiontoE-Commerce117
Fromtheperspectiveofthebillingfirm,themostobviousbenefitisthereductionin
expensesrelatedtobillingandprocessingpayments.E-billingalsoenablesbettercustomer
service.Anotheradvantagerelatestoadvertising.
Fromthecustomer’sperspective,E-billingreducesthecustomer’sexpensesby
eliminatingthecostofchecks,postage,andenvelopes.E-billingsimplifiesandcentralizes
paymentprocessingandprovidesbetterrecordkeeping.
II.Fillintheblanksineachofthefollowing
1.Creditcards,Chargecards,Debitcards
2.e-wallet
3.smartcard,microprocessor,memory,nonprogrammable
4.Stored-value
5.e-check
6.electronicbillpresentmentandpayment(EBPP)Chapter6E-CommerceSecurity
ANSWER
I.Answerthefollowingquestions
1.Describethedifferencebetweenanontechnicalandatechnicalcyberattack.
Nontechnicalattacksarethoseinwhichaperpetratoruseschicaneryorotherformsof
persuasiontotrickpeopleintorevealingsensitiveinformationorperformingactionsthatcanbeused
tocompromisethesecurityofanetwork..Theseattacksarealsocalledsocialengineeringattacks.
Incontrasttonontechnicalattacks,softwareandsystemsknowledgeareusedtoperpetrate
technicalattacks.Inconductingatechnicalattack,anexperthackeroftenusesamethodical
approach.
2.HowareDDoSattacksperpetrated?
Onceanattackerhasaccesstoalargenumberofcomputers,theyloadthespecializedDDoS
softwareontothesecomputers.Thesoftwarelaysinwait,listeningforacommandtobeginthe
attack.Whenthecommandisgiven,thedistributednetworkofcomputersbeginssendingout
requeststothetargetcomputer.Therequestscanbelegitimatequeriesforinformationorcanbevery
specializedcomputercommandsdesignedtooverwhelmspecificcomputerresources.
3.Whatarethemajorformsofmaliciouscode?
Viruses,Worms,Macrovirusesandmacroworms,andTrojanHorses.
4.WhataresomecommonmistakesthatECsitesmakeinmanagingtheirsecurity?
lUndervaluedinformation.Feworganizationshaveaclearunderstandingofthevalueof
specificinformationassets.
lNarrowlydefinedsecurityboundaries.Mostorganizationsfocusonsecuringtheir
internalnetworksandfailtounderstandthesecuritypracticesoftheirsupplychain
partners.
lReactivesecuritymanagement.Manyorganizationsarereactiveratherthanproactive
focusingonsecurityafteranincidentorproblemoccurs.
lDatedsecuritymanagementprocesses.Organizationsrarelyupdateorchangetheir
securitypracticetomeetchangingneeds.Similarly,theyrarelyupdatetheknowledgeand
skillsoftheirstaffaboutbestpracticesininformationsecurity.
lLackofcommunicationaboutsecurityresponsibilities.SecurityoftenisviewedasanIT
problem,notanorganizationalone.Chapter1IntroductiontoE-Commerce119
5.Describethedifferencebetweenphysiologicalbiometricsandbehavioralbiometrics.
Physiologicalbiometricsarebasedonmeasurementsderiveddirectlyfromdifferentparts
ofthebody(e.g.,scansoffingerprints,theiris,handgeometry,andfacialcharacteristics).In
contrast,behavioralbiometricsarederivedfromvariousactionsandindirectlyfromvarious
bodyparts(e.g.,voicescansorkeystrokemonitoring).
6.Describethebasiccomponentsofencryption.
Allencryptionhasfourbasicparts:
theplaintext,ciphertext,encryptionalgorithm,andthe
key.
7.Whatarethebasicdifferencesbetweensymmetricandasymmetricencryption?
Inasymmetric(private)keysystemthesamekeyisusedtoencryptanddecryptthe
plaintext.Thesenderandreceiverofthetextmustsharethesamekeywithoutrevealingitto
anyoneelse—thusmakingitaso-calledprivatesystem.
Public(Asym
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 电子商务专业英语 课后答案 电子商务 专业 英语 课后 答案