好文档就是一把金锄头!
欢迎来到金锄头文库![会员中心]
电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

助理电子商务师考证复习重点.doc

14页
  • 卖家[上传人]:ss****gk
  • 文档编号:281573424
  • 上传时间:2022-04-24
  • 文档格式:DOC
  • 文档大小:82KB
  • / 14 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 助理电子商务师考证复习重点The expression P2, which is more common in e-commerceE-commerce impact P3E-commerce is divided into four categories according to the network type, the Chinese and English in each category is called P6E-commerce framework P7S/MIME in the electronic commerce security protocol P8Electronic business system personnel and organization structure make up P9For e-commerce transactions, pay attention to the content PIO at each stageThe origin of the Internet is P25The classification of IP addresses, which bytes represent the network identity, host identity, and the range of addresses of various addresses P28China's CN domain is managed by CNNIC for P313 g technology full name P33China mobile, China telecom and China unicorn each have 3G licenee P33The concept and characteristics of web business information P36The ranking of online business information is P37The basic requirements for online business information collection are P37The definition of the information store P38Method P39 for information storageWhat are the steps for the information consolidationInformation processing P40What is the email header and mail body of the email including P48Features of the E-mail system P48POP3 is responsible for receiving mail, and SMTP is used for sending and passing mail P49What is the representative of various search engines? What are the P54 for the popular search engine sitesThe intercept query, the field retrieves P55Anonymous FTP P59P2P P59The breakpoint is passed to P60The commonly used file download tools have P60The various SQL language commands have the statements P64Archie P65The purpose of market demand research is P71The main sources of indirect research are P72Network market research has several operation step P72What is the first part of the questionnaireThe question that should be noted in the design of the questionnaire (understanding) P74The classification P78 of the discriminant analysisWhat are the P85 products that are suitable for sale in online storesThe element P86 is considered when choosing a digital camera for a picture of a productManual white balance P88Aperture and shutter use P88Exposure compensation P88 madeThe light of a smooth surface is applied to the P90Photo technique for food products: P90The item image adds borders, backgrounds and watermarks for P93The difference between e-commerce and self-built online shops in third-party trading platforms is P95Third-party B2B e-business platforms are the equivalent of trading in traditional tradeThird-party C2C e-commerce platforms are equivalent to trade fairs in traditional tradeFramework for web P108The HTML language concept P108HTML document features P109< textarea > tag P113Typesetting label P113Network security threat is subject to the P130What is the technical means of network security managementFirewall action P131The proxy service is based on the firewall of the application layer.Firewall local management P132Computer virus features P133The function of the computer virus infection module is to copy the virus program into other files in accordance with the intended rules・Consider the element P135 for anti-virus softwareThe security requirement for e-commerce transactions is which five P140The cipher leak has two methods, P141The way an attacker gets a password on the Internet usually consists of three P142Which of the following is true for digital signatures?A digital signature ensures the integrity and tampering of information.B digital signatures ensure that information sent is not stolen by other people.The C digital signature confirms the identity of the receiver・D digital signature contains the function of the digital envelope・Which is the right thing to say about the digital envelope?A digital envelope ensures that the information sent is not leakedA digital envelope can confirm the sender,s identityThe C digital envelope requires the use of the sender's private keyThe D digital envelope needs to use the sender,s public keyWhat is included in the digital certificate?A certificate owner's public keyB the unit that issues a digital certificateThe validity of the C public keyD presents the digital signature of the unit of the digital certificateWhich of the following statements is true?The main problem with the existence of symmetric encryption is key security exchange and management issuesB asymmetric encryption algorithms are complex and the speed of encryption data is unbearableIn C asymmetric encryption, a private key can have a second public key corresponding to itD DES is a symmetric encryption techniqueThe authentication center authentication architecture is an inverted tree structureThe RCA is responsible for issuing and managing certificates for industry certification centersSET is an open specification that guarantees credit card payment security 。

      点击阅读更多内容
      关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
      手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
      ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.