一起答
单选

电子商务交易必须具备抗抵赖性,目的在于防止()。

  • A.一个实体假装成另一个实体
  • B.他人对数据进行非授权的修改、破坏
  • C.参与此交易的一方否认曾经发生过此次交易
  • D.信息从被监视的通信过程中泄漏出去
参考答案
查看试卷详情
相关试题
  1. (59)

    • A.procedure
    • B.program
    • C.programmer
    • D.process
  2. (57)

    • A.chips
    • B.frame
    • C.structure
    • D.cell
  3. Programmers test a program by running it to ensure that the(74)are correct and that the program produces the desired outcome. If errors do occur, the programmer must make the appropriate change and recheck the program until it produces the correct results. This(75)is called testing and debugging.

    • A.commands
    • B.software
    • C.instructions
    • D.measure
  4. Computer hardware engineers research, design, develop, and test computer hardware and supervise its manufacture and(72). Hardware refers to computer(73), circuit boards, computer systems, and related equipment such as keyboards, modems, and printers.

    • A.fixing
    • B.building
    • C.setting
    • D.installation
  5. (55)

    • A.protocol
    • B.specification
    • C.prescript
    • D.rule
  6. The major goal of USB was to define an external expansion bus which makes adding(70)to a PC as easy as hooking up a telephone to a wall-jack. USB 2.0 is an evolution of the USB 1.1(71), providing a higher performance interface.

    • A.peripherals
    • B.outside
    • C.inside
    • D.beside
  7. Like personal computers, most workstations are(72)computers

    • A.single-user
    • B.single user
    • C.multi-user
    • D.multi user
  8. The term data is often used to distinguish()machine-readable information from textual human-readable information.

    • A.binary
    • B.hex
    • C.octal
    • D.decimal
  9. (50)

    • A.回溯
    • B.回归
    • C.返回
    • D.合成
  10. The major technical areas of computer security are usually represented by the initials CIA:(66), integrity, and authentication or availability.

    • A.confidentiality
    • B.confident
    • C.secret
    • D.safety