首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
How long had business-centered electronic commerce developed?
How long had business-centered electronic commerce developed?
admin
2009-06-24
53
问题
How long had business-centered electronic commerce developed?
W: When did the age of electronic commerce begin?
M: Business-centered electronic commerce began more than two decades ago with the introduction of Electronic Data Interchange (EDI) between firms (sending and receiving order, delivery and payment information, etc.). Even consumer-oriented electronic commerce has a rather long history: each time you sue automatic teller machines or present your credit cards, you transact business electronically. These EDI and ATM, however, operate in a closed system; they are of a more convenient communications medium, strictly between the parties allowed in. The World Wide Web (WWW), the Internet’s client-server, opened up a new age by combining the open Internet and the easy user interface. WWW was created at the CERN Lab for Particle Physics in Geneva in 1991 (with its Mosaic, the predecessor of Netscape). It took two years for Mosaic to penetrate the Internet, and another two years before businesses and the general public took notice of its potential.
W: Is EC here to stay? Will it be here but gone tomorrow?
M: EC, and the Internet, is not a fashion because of its widespread effects. Some may find it useless to open a web store; but web stores do not make electronic commerce or the digital economy. There will be new types of interfaces (browsers and protocols) and new (privatized) network, but what the WWW represents is our march toward the digital economy and knowledge-based society. Technologies, the Web and other processes are but a means of achieving that goal.
W: Will EC be limited because not many people can afford PCs and/or get access to the Internet?
M: Today’s EC processes are based on personal computers because of their origin within the Internet, a network of computers. First stage of EC expansion is that within the installed base of computer users (more "connected" users). The second wave will come when more people get access to computers (via lowered computer prices or cheaper devices). The third, and more important, expansion is predicted to be from those with non-computer access to the global network: through broadcast TVs, cable TVs, telephone networks and new appliances. A widespread use of these cheaper access media represents the phase of "bringing workplace computers into the living room". However, the affordability of these devices, the easiness of use or the mode we access the network is less of an issue than how we will use these devices. Turning the computer into a convenient device like a TV is a goal in itself. For example, the speech-to-text technology will eventually make manual inputting unnecessary. In terms of productivity, it is hard to convince that computer hardware and software have met our expectation for making our work and life easier or more productive during the last decade. But what will we do with new inventions when we get them? Delivering the same information but more conveniently? Selling the same entertainment and TV programs but with more efforts? The limiting factor will be our limited vision about the electronic future.
W: Are there different kinds of e-money?
M: Yes. In general, there are two distinct types of e-money: identified e-money and anonymous e-money (also known as digital cash). Identified e-money contains information revealing the identity of the person who originally withdrew the money from the bank. Also, in much the same manner as credit cards, identified e-money enables the bank to track the money as it moves through the economy. Anonymous e-money works just like real paper cash. Once anonymous e-money is withdrawn from an account, it can be spent or given away without leaving a transaction trail. You create anonymous e-money by using blind signatures rather than non-blind signatures. To better understand blind signatures and their use with e-money, I highly recommend reading Chapters 1~6 of Bruce Schneier’s book Applied Cryptography. It is quite readable, even to the layman. He doesn’t get into the heavy-duty math until later in the book. Bruce does a very good job of describing the wide variety of interesting things you can do when you combine computers, networks, and security. There are two varieties of e-money for each type: online e-money and offline e-money. Online means you need to interact with a bank (via modem or network) to conduct a transaction with a third party. Offline means you can conduct a transaction with out having to directly involve a bank. Offline anonymous e-money (true digital cash) is the most complex form of e-money because of the double-spending problem.
选项
答案
transacting business electronically
解析
本题答案信息对应于第一轮对话中男士的第三句:each time you sue...you transact business electronically,即每次使用自动取款机或者刷信用卡时,都是进行电子交易。考生要注意的是题句与此句的时态不同,因此回答时动词要用-ing形式。
转载请注明原文地址:https://kaotiyun.com/show/JJTd777K
本试题收录于:
公共英语五级笔试题库公共英语(PETS)分类
0
公共英语五级笔试
公共英语(PETS)
相关试题推荐
TheGreatNewspaperWarUpuntilabout100yearsago,newspapersintheUnitedStatesappealedonlytothemostseriousreade
Thepolicemenactedquicklybecauseliveswere(atstake).
SpaceResearchDoeswalkingonthemoonmakelifebetterforpeopleonearth?【51】alltheproblemsofourownworld,whyshou
One-roomSchoolsOne-roomschoolsarepartoftheheritageoftheUnitedStates,andthementionofthemmakespeoplefeela
AIftheGardeners’argumentwassoundBbecauseshewasclevererthanotherchimpsCwhenshewantedtoeatDwhileshewasat
ExplanationWhatdoesascientistdowhenheorshe"explains"something?Scientificexplanationcomesintwoforms:generalizat
Whatdoesthephrase"turnthetablesontheirteachers"inPara.1mean?Whyhasthestudents’expectationoftheircoursesch
Extensivereportingontelevisionhashelpedtobringaboutinterestinawidevarietyofsportsandactivities.
Techniquestoemploytheenergyofthesunarebeingdeveloped.
A.ColorfulLifeonCampusB.IntelligentStudentBodyC.SchoolAdministrationD.DistinguishedFacultyE.SubstantialFinancialSu
随机试题
牙周疾病感染牙髓通过的主要通道是
患者男,30岁,右耳脓性分泌物3个月余,量不多,伴有耳鸣,间断性。体检:右外耳道内可见少许脓性分泌物,鼓膜紧张部边缘型穿孔,最可能的诊断是
甲见乙被丙推人河中,便跳入河中将乙救起,在救乙过程中,甲腿部被划伤,并所带手机损坏,为此花去医药费和手机损失共计5000元,为此引起纠纷。下列表述正确的是:()
工业废水的处理过程是将废水中所含的各种污染物与水分离或加以分解,使其净化的过程。混凝、气浮方法属于()。
根据《招标投标法》,投标人补充、修改或者撤回已提交的投标文件,并书面通知招标人的时间期限应在()。
某公司拟进行股票投资,计划购买A、B、C三种股票,并分别设计了甲、乙两种投资组合。已知三种股票的β系数分别为1.5、1.0和0.5,它们在甲投资组合下的投资比重为50%、30%和20%;乙投资组合的风险收益率为3.4%。同期市场上所有股票的平均收
劳动合同的无效,经仲裁未引起诉讼的,由()认定。
已知某投资项目的净现值率为0.5,该项目的原始投资额为800万元,且于建设起点一次投入,则该项目的净现值为()万元。
下列情况下,适宜采用市场开发战略的是()。
1993年以来,我国内蒙古地区经常出现沙尘暴,造成重大经济损失。有人认为,沙尘暴是由于气候干旱造成草原退化、沙化而引起的,是天灾,因此是不可避免的。以下各项如果为真,能够对上述观点提出质疑,除了
最新回复
(
0
)