资源预览内容
第1页 / 共10页
第2页 / 共10页
第3页 / 共10页
第4页 / 共10页
第5页 / 共10页
第6页 / 共10页
第7页 / 共10页
第8页 / 共10页
第9页 / 共10页
第10页 / 共10页
亲,该文档总共10页全部预览完了,如果喜欢就下载吧!
资源描述
电子商务概论第2次平时作业答案(Introduction to e-commerce second usual assignments answer)Introduction to e-commerce second usual assignments answerFirst, fill in the blanks1. physical security refers to the protection of computer host hardware and physical line security.2. according to the composition of computer software system, software security can be divided into operating system security and database security,Network software security and application software security.3. the risk of transaction credit mainly comes from the buyers and sellers credit risk, and the seller and the buyer both deny the situation.4. instantaneous replication technology is to make the computer automatically copy data at a disaster time.5. firewall mainly includes secure operating system, filter, gateway, domain name service and Email processing.6. at present, electronic commerce information encryption technology is divided into two categories, namely symmetric encryption and asymmetric encryption.7. electronic commerce identity authentication can be realized in three basic ways or combinations, that is, the biological characteristics of human body,Password mode and marking mode.8. in a sense, computer viruses and Internet hackers are two major factors endangering todays computer systems.9. enterprise network business development strategy planning and implementation of hierarchical procedures, can be divided into: strategic analysis, strategic elements of the configuration, the overall entry strategy, competitive strategy, strategic management process etc.10., enterprises should analyze the macro environment of enterprises, and analyze the macro environment of enterprises, including technical environment analysis, social environment analysis, legal environment analysis and economic environment analysis.11. enterprises in the formulation of network management strategy, the need to seek external environment in the network environment may bring opportunities to avoidThe threats caused by the external environment can excavate the advantages of the enterprise and overcome the disadvantages inside the enterprise.12. generally speaking, the synergy of enterprises can be divided into four categories: Investment synergy and job synergy,Sales synergy and management synergy.Two. NOUN interpretation:1. firewall:A firewall is a protective barrier constructed on the interface between an intranet and an extranet, which is composed of software systems and hardware devices.2. digital certificate:Digital certificate is also called digital certificate, digital identification, it is a certificate authority digital signature, including the certificate applicants personal information and its public key file.3. symmetric encryption:Symmetric encryption is an encryption method. In this encryption method, the encryption and decryption sides share a common key, the encryption party uses this key to encrypt the data, and the decryption party can only use this key to restore the data.4. synergy:Synergy refers to the effect of all kinds of joint efforts that enterprises can seek from the decision of resource allocation and scope of operation.5. competitive advantage:Competitive advantage refers to the different competitive position of the enterprise with its competitors in the market through the decision of its resource allocation mode and scope of operation.6. resource allocation:Resource allocation refers to the level and mode of the enterprises past and present resources and skills allocation, which is the special ability of the enterprise. The allocation of resources will greatly affect the extent of enterprises to achieve their goals.7. enterprise mission:Enterprise mission is the general direction, general objective, total characteristics and general guiding ideology of enterprise production and management determined by enterprise managers. It reflects the enterprise values and the enterprise managers trying to establish their own image, suggesting that differences between the enterprise and other enterprises in the peer business objectives, define the main range of products and services of enterprises, and enterprises to meet the basic needs of customers.Three. Choose the right answer:1. the main security elements of electronic commerce system are (ABD).A validity, B confidentiality, C security, D non repudiation2. electronic commerce digital signature is realized by (C).A manual signature B communication digital signalC uses encryption algorithm to exchange and decrypt D analog signalsThe function of the 3. e-commerce certification authority is (B).A prevents computer viruses and hackers from invading e-commerce systemsB releases and manages digital certificates for usersC encrypts and decrypts the transaction information of both buyers and sellersD constructing e-commerce system firew
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号