10.Whichofthefollowingdoesnotposeathreattoelectronicdata?
A. unauthorizedaccess
B. jailbreakingone’smobilephone
C. unauthorizeddatamodification
D. alloftheabovecancompromisedata
查看答案
11.Whichofthefollowingisanexampleofconsumer-to-consumerelectroniccommerce?
Alyssamakesanonlinedepositof$5,000intoherfriend'saccount.
B. SeraybuysagiftforVanessaonForever.com.
C. Jerry,amanufacturer,conductsbusinessovertheWebwithitsretailers.
D. AshleybuysanewpairofshoesonFequette.com.
E. JayboughtasecondhandguitarusingtheGumtreeapp.
12.______________involvescreatingnewproducts,processes,orservicesthatreturnvaluetotheorganization.
A. Startupculture
B. Creativity
C. Invention
D. Innovation
13.WhichofthefollowingistheprotocoloftheInternet?
A. URL
B. HTML
C. TCP/IP
D. ARPA
14.Accordingtothevaluechainmodel,whichofthefollowingisasupportactivity?
A. technologydevelopment
B. marketingandsales
C. inboundlogistics
D. operationsandmanufacturing