方向： 姓名： ______ 学号：
Final Individual Assignment-2015 No.
True/False Indicate whether the statement is true or false.（20 points, 1 point each）
____ 1. Transferring funds, placing orders, sending invoices, and shipping goods to customers are all types of activities or transactions.
____ 2. A value added network (VAN) is an independent firm that offers connection and transaction-forwarding services to buyers and sellers engaged in EDI.
____ 3. An HTML document is similar ...view middle of the document...
____ 13. Creations that can be copyrighted include virtually all forms of artistic or intellectual expression.
____ 14. The type of electronic commerce software an organization needs depends on several factors, with size and budget being the primary drivers.
____ 15. The element of necessity in computer security refers to preventing data delays or denials (removal).
____ 16. The most complete way for Web site visitors to protect themselves from revealing private information or being tracked by cookies is to disable cookies entirely.
____ 17. Sending bills and receiving payments over the Internet can drop the transaction cost to an average of 50 cents per bill.
____ 18. Electronic cash containing serial numbers raises a number of privacy issues.
____ 19. The most important step that companies can take today to prevent phishing attacks is to update their prevention technology.
____ 20. Sometimes a content manager offers seed money, management advice, and marketing assistance.
Multiple Choice Identify the choice that best completes the statement or answers the question. （20 points, 1 point each）
____ 21. Some researchers define a fourth category of electronic commerce called ____, which includes individuals who buy and sell items among themselves.
|a. |C2C |c. |C2B |
|b. |B2B |d. |B2C |
____ 22. A(n) ____ is an independent firm that offers connection and transaction-forwarding services to buyers and sellers engaged in EDI.
|a. |VAN |c. |ERP |
|b. |EFT |d. |LAN |
____ 23. The combination of the protocol name and the domain name is called a ____.
|a. |URT |c. |URL |
|b. |URO |d. |HTTP |
____ 24. ____ is also known as unsolicited commercial e-mail.
|a. |Spam |c. |VPN |
|b. |CGI |d. |Java |
____ 25. ____ is the number of HTTP requests that a particular hardware and software combination can process in a unit of time.
|a. |Output |c. |Capability |
|b. |Throughput |d. |Tracert capacity |
____ 26. The greatest...