首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How long had business-centered electronic commerce developed?
How long had business-centered electronic commerce developed?
admin
2009-06-24
58
问题
How long had business-centered electronic commerce developed?
W: When did the age of electronic commerce begin?
M: Business-centered electronic commerce began more than two decades ago with the introduction of Electronic Data Interchange (EDI) between firms (sending and receiving order, delivery and payment information, etc.). Even consumer-oriented electronic commerce has a rather long history: each time you sue automatic teller machines or present your credit cards, you transact business electronically. These EDI and ATM, however, operate in a closed system; they are of a more convenient communications medium, strictly between the parties allowed in. The World Wide Web (WWW), the Internet’s client-server, opened up a new age by combining the open Internet and the easy user interface. WWW was created at the CERN Lab for Particle Physics in Geneva in 1991 (with its Mosaic, the predecessor of Netscape). It took two years for Mosaic to penetrate the Internet, and another two years before businesses and the general public took notice of its potential.
W: Is EC here to stay? Will it be here but gone tomorrow?
M: EC, and the Internet, is not a fashion because of its widespread effects. Some may find it useless to open a web store; but web stores do not make electronic commerce or the digital economy. There will be new types of interfaces (browsers and protocols) and new (privatized) network, but what the WWW represents is our march toward the digital economy and knowledge-based society. Technologies, the Web and other processes are but a means of achieving that goal.
W: Will EC be limited because not many people can afford PCs and/or get access to the Internet?
M: Today’s EC processes are based on personal computers because of their origin within the Internet, a network of computers. First stage of EC expansion is that within the installed base of computer users (more "connected" users). The second wave will come when more people get access to computers (via lowered computer prices or cheaper devices). The third, and more important, expansion is predicted to be from those with non-computer access to the global network: through broadcast TVs, cable TVs, telephone networks and new appliances. A widespread use of these cheaper access media represents the phase of "bringing workplace computers into the living room". However, the affordability of these devices, the easiness of use or the mode we access the network is less of an issue than how we will use these devices. Turning the computer into a convenient device like a TV is a goal in itself. For example, the speech-to-text technology will eventually make manual inputting unnecessary. In terms of productivity, it is hard to convince that computer hardware and software have met our expectation for making our work and life easier or more productive during the last decade. But what will we do with new inventions when we get them? Delivering the same information but more conveniently? Selling the same entertainment and TV programs but with more efforts? The limiting factor will be our limited vision about the electronic future.
W: Are there different kinds of e-money?
M: Yes. In general, there are two distinct types of e-money: identified e-money and anonymous e-money (also known as digital cash). Identified e-money contains information revealing the identity of the person who originally withdrew the money from the bank. Also, in much the same manner as credit cards, identified e-money enables the bank to track the money as it moves through the economy. Anonymous e-money works just like real paper cash. Once anonymous e-money is withdrawn from an account, it can be spent or given away without leaving a transaction trail. You create anonymous e-money by using blind signatures rather than non-blind signatures. To better understand blind signatures and their use with e-money, I highly recommend reading Chapters 1~6 of Bruce Schneier’s book Applied Cryptography. It is quite readable, even to the layman. He doesn’t get into the heavy-duty math until later in the book. Bruce does a very good job of describing the wide variety of interesting things you can do when you combine computers, networks, and security. There are two varieties of e-money for each type: online e-money and offline e-money. Online means you need to interact with a bank (via modem or network) to conduct a transaction with a third party. Offline means you can conduct a transaction with out having to directly involve a bank. Offline anonymous e-money (true digital cash) is the most complex form of e-money because of the double-spending problem.
选项
答案
use these devices
解析
在第三轮对话中,男士首先介绍了电子商务发展的3个阶段,指出廉价电子设备的广泛应用是电子商务发展的要求,然后在第六句转折说:the affordability of these devices..: than how we will use these devices,即购买这些设备、我们连接网络的难易及方式等问题都没有如何使用这些设备这一问题重要,也就是说,专家们担心的是如何使用这些设备的问题,因此填入use these devices即可。
转载请注明原文地址:https://kaotiyun.com/show/HJTd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
FightingforaBrighterFutureforWomenWhenIwasaskedwhatitmeanstobeawomanrunningforpresident,Ialwaysgave
Howmuchwouldfourpoundsofteaweighifitwastaken4,000milesoutfromthesurfaceoftheearth?Accordingtothepassage
TheRecreativeFunctionofGreenspaceFacilitiesGreenspacefacilities(设施)arecontributingtoanimportantextenttothequali
GlobalWarmingFewpeoplenowquestiontherealityofglobalwarminganditseffectsontheworld’sclimate.Manyscientists
A.fallasleepagainB.becomemoreenergeticthefollowingdayC.sleeplessthan7hoursD.confirmthoseseriousconsequences
Techniquestoharnesstheenergyofthesunarebeingdeveloped.
SuccessfulLanguageLearners1.Somepeopleseemtohaveaknackforlearninglanguages.Theycanpickupnewvocabulary,mast
TeachingandLearningManyteachersbelievethattheresponsibilitiesforlearningliewiththestudent.Ifalongreadinga
______aweatherwarningsystemisestablishedtohelppeopleawayfromdangerheat?______humanactivitiescontributetoglobal
随机试题
设函数y=2cosχ,则y′=()
电抽搐治疗适用于
项目应具有适当的经济规模,但单一项目的投资额不宜超过开发商各类项目全部投资额的13%,从房地产投资组合的角度来说()。
某发电厂气体灭火系统主要分布于1#、2#机组的集控室,电子间,工程师站,电缆夹层,380V母线室和6kV母线室等关键部位。该气体灭火系统选择组合分配设置的IG—54l全淹没的灭火方式,药剂瓶组42瓶。该系统竣工距今已使用10多年。根据以上材料,回
在基金运行中,为了对基金管理人进行监督和保管,基金的管理与保管是分开的。()
票据丧失后,失票人向人民法院提出公示催告申请。人民法院应在受理申请后3日内发出公告,公示催告的期间不得少于(),涉及票据可根据情况适当延长,但最长不得超过90日。
奉献社会是社会主义职业道德的基石和最高境界,需要我们做到()。
结合材料回答问题:材料1一、没收一切土地归苏维埃政府所有,用下列三种方法分配之:(一)分配农民个别耕种;(二)分配农民共同耕种;(三)由苏维埃政府组织模范农场耕种。以上三种方法,以第一种为主体。遇特别情形,或苏维埃政府有力时,兼用二三两种。二、一切土
求幂级数的收敛域.
下面不属于需求分析阶段任务的是
最新回复
(
0
)