题目内容

10.Whichofthefollowingdoesnotposeathreattoelectronicdata?

A. unauthorizedaccess
B. jailbreakingone’smobilephone
C. unauthorizeddatamodification
D. alloftheabovecancompromisedata

查看答案
更多问题

11.Whichofthefollowingisanexampleofconsumer-to-consumerelectroniccommerce?

Alyssamakesanonlinedepositof$5,000intoherfriend'saccount.
B. SeraybuysagiftforVanessaonForever.com.
C. Jerry,amanufacturer,conductsbusinessovertheWebwithitsretailers.
D. AshleybuysanewpairofshoesonFequette.com.
E. JayboughtasecondhandguitarusingtheGumtreeapp.

12.______________involvescreatingnewproducts,processes,orservicesthatreturnvaluetotheorganization.

A. Startupculture
B. Creativity
C. Invention
D. Innovation

13.WhichofthefollowingistheprotocoloftheInternet?

A. URL
B. HTML
C. TCP/IP
D. ARPA

14.Accordingtothevaluechainmodel,whichofthefollowingisasupportactivity?

A. technologydevelopment
B. marketingandsales
C. inboundlogistics
D. operationsandmanufacturing

答案查题题库