1. Trang chủ
  2. » Kinh Doanh - Tiếp Thị

English for E commerce

54 381 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 54
Dung lượng 571 KB

Nội dung

This material is written for students who major in E-commerce. The topics selected mostly deal with basic areas of business and economics. They are presented in an order from a sole proprietorship to a multinational corporation. Each lesson is introduced and related to the previous lesson. Besides, students also have chance to deal with several topics related to information technology which has a very close relationship with e-commerce. To help students understand the text as well as do the tasks given effectively, we recommend that students should begin each lesson by looking at the glossary and the vocabulary exercises.

Vietnam – Korea Friendship Information Technology College ………… o0o………… English For E-Commerce English For E-Commerce 1 Vietnam – Korea Friendship Information Technology College INTRODUCTION This material is written for students who major in E-commerce. The topics selected mostly deal with basic areas of business and economics. They are presented in an order from a sole proprietorship to a multinational corporation. Each lesson is introduced and related to the previous lesson. Besides, students also have chance to deal with several topics related to information technology which has a very close relationship with e-commerce. To help students understand the text as well as do the tasks given effectively, we recommend that students should begin each lesson by looking at the glossary and the vocabulary exercises. This course aims to: English For E-Commerce 2 Vietnam – Korea Friendship Information Technology College • Provide students with key words and concepts of business, economics and information technology • Develop students’ comprehension of business, economics and information technology in business • Develop students’ basic English language skills such as writing, speaking, translating… especially reading comprehension • Provides a good foundation for further studying CONTENTS Introduction .1 Unit 1: Wap Phones 3 Unit 2: Security and Privacy on the Internet 6 Unit 3: Online Services 10 Unit 4: Legal Forms of Organization .14 Unit 5: Production 20 Unit 6: Personnel 25 Unit 7: Marketing .30 English For E-Commerce 3 Vietnam – Korea Friendship Information Technology College Unit 8: Distribution .35 Unit 9: Promotion .41 Unit 10: International Business 48 References .54 UNIT 1 WAP PHONES Task 1: Answer the questions • Have you got a mobile phone? • What do you use it for? • How often do you use it per day? • What additional functions does it have? Task 2: Study these examples of abbreviations used in mobile phone text messages. Try to guess their meanings 1 2DAY today 15 ATB 2 2MORO 16 BCNU English For E-Commerce 4 Vietnam – Korea Friendship Information Technology College 3 ASAP 17 CU 4 2NITE 18 CU L8R 5 B4 19 Luv 6 BTW 20 Msg 7 F2F 21 NE 8 HAND 22 NE1 9 PCM 23 NO1 10 SOM1 24 PPL 11 KIT 25 RUOK 12 ILU 26 THNQ 13 X 27 Wknd 14 GR8 28 HOPE 2 C U @ PARTY L8R WAP PHONES Wap stands for “wireless application protocol” which allows users to send emails and access information from the internet on a mobile phone. This has been made possible by technological advances in “bandwidths”, the amount of data that can be received or sent within a fraction of a second. This means that it can be used for many more purposes than were previously imagined, including video transmission. Some analysts reckon that Wap phones will overtake PCs as the most common way of surfing the internet, although PCs will still be used for more complex applications such as spreadsheets and video players. Some industry experts believe that Wap will have a limited lifespan and will quickly be replaced by more sophisticated technology, such as General Package Radio Service (GPRS) and the Universal Mobile Telecommunication Systems (UMTS). GPRS increases the bandwidth still further and allows you to send up to ten times more information than Wap technology. However, users will still be limited by the size and resolution of the screen on which the data is received. One analyst, Jakob Nielsen, advises companies to forget Wap and plan, instead, for the next generation of phones. He believes that mobile phones are going to become more like palmtop computer. A Wap phone cannot dial into every website. The language of the web is HTML-hypertext markup language. Wap operates on WML-wireless markup language, so Wap phones can only read pages written in WML. Because the screen on a Wap phone is so small that you are unable to read a normal webpage, WML pages tend to consist of small chunks of information. Soon, however, most English For E-Commerce 5 Vietnam – Korea Friendship Information Technology College web pages will be written in XML-extensible markup language. This can be programmed to ensure that every phone or PC receives transmissions in the language it understands. Wap allows you to deliver online services to a handheld computer. People are also expected to use Wap to access online news and financial services, sports scores and entertainment information, most of which you should be able to reach by scrolling down a set menu bar. You will also be able to book tickets by Wap. Sending emails is likely to be the application that is used most often, as people will be able to pick up messages at any time from anywhere in the world. Gambling and games, some of which can be downloaded, are also expected to be popular with users. But you can, of course, use the Wap to make regular phone calls. Task 3: What do these abbreviations mean? 1. GPRS……………………………………………………………………………………………. 2. HTML…………………………………………………………………………………………… 3. SMS……………………………………………………………………………………………… 4. Wap……………………………………………………………………………………………… 5. WML…………………………………………………………………………………………… 6. XML…………………………………………………………………………………………… . Task 4: Match the paragraph with its main idea Paragraphs Main ideas Paragraph 1 Spread Paragraph 2 Internet Paragraph 3 Games Paragraph 4 Email Paragraph 5 What is Wap? Paragraph 6 Language Paragraph 7 Lifespan Task 5: Answer the questions 1. What make people access information from the internet on a mobile phone? 2. Cannot Wap phones access all websites? Why (not)? 3. What advantages and disadvantages do Wap phones have? Task 6: Decide whether the following statements are True or False 1. ……We can send emails and access information from the internet on a Wap. English For E-Commerce 6 Vietnam – Korea Friendship Information Technology College 2. ……A Wap phone can dial to every website. 3. ……People like Wap phone because of its size and resolution of the screen. 4. ……Wap phones are able to read pages written in XML-extensible markup language. UNIT 2 SECURITY AND PRIVACY ON THE INTERNET Task 1: Answer the questions 1. Is it technically possible for computer criminals to infiltrate into the Internet and steal sensitive information? 2. Can virus enter you PC from the Internet? Task 2: Consider these examples of computer disasters. How could you prevent them or limit their effect? Compare answers within your group. 1. You open an email attachment which contains a very destructive virus. 2. Someone guesses your password and copies sensitive data. 3. Your hard disk crashes and much of your data is lost permanently. 4. Someone walks into your computer lab and steals the memory chips from all the PCs. 5. Your backup tapes fail to restore properly. Task 3: Match the text with the correct picture A B English For E-Commerce 7 Web browsers warn you if the connection is not secure; they display a message when you try to send personal information to a server. You have to type your user name and password to assess a locked computer system or network. Vietnam – Korea Friendship Information Technology College C D 1 2 3 4 SECURITY AND PRIVACY ON THE INTERNET There are a lot of benefits from an open system, like the internet, but we are also exposed to the hackers who break into the computer system just for fun, as well as to steal information or propagate viruses. So how do you go about making online transactions secure? The question of security is crucial when sending confidential information such as credit card numbers. For example, consider the process of buying a book on the Web. You have to type your credit card number into an order form which passes from computer to computer on its way to the online bookstore. If one of the intermediary computers is infiltrated by hackers, your data can be English For E-Commerce 8 An open padlock in Netscape Communicator indicates the page is not secure; a closed padlock indicates the page is encrypted. Private networks use a software and hardware mechanism called a “firewall”, to block unauthorized traffic from the Internet. Vietnam – Korea Friendship Information Technology College copied. It is difficult to say how often this happens, but it’s technically possible. To avoid risks, you should set all security alerts to high on your Web browser, Netscape Communicator, and Internet Explorer display a lock when the Web page is secure and allow you to disable or delete “cookies”. If you use online bank services, make sure your bank uses digital certificates. A popular security standard is SET (security electronic transactions). Similarly, as your email message travels across the net, it is copied temporarily on many computers in between. This means it can be read by unscrupulous people who illegally enter computer systems. The only way to protect a message is to put it on a sort of “envelope”, that is, to encode it with some form of encryption. A system designed to send email privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman. Private networks connected to the Internet can be attacked by intruders who attempt to take valuable information such as Social Security numbers, bank accounts, or research and business reports. To protect crucial data, companies hire security consultants who analyze the risks and provide security solutions. The most common methods of protection are passwords for access control, encryption and decryption system, and firewalls. Viruses can enter a PC through files from disks, the Internet, or bulletin board systems. If you want to protect your system, don’t open email attachments for strangers and take care when downloading files from the Web (Plain text email alone can’t pass a virus). Remember also to update your anti-virus software as often as possible, since new viruses are being created all the time. Task 4: Match the word in A with its corresponding definition in B A B Hacker Files that identify user and Web servers on the net, like digital identification Cookies The process of encoding data so that unauthorized users can’t read them Certificates A person who obtains unauthorized access to computer data Encryption The process of decoding encrypted data transmitted to you Decryption Small files used by Web servers to know if you have visited their site before Task 5: Match the paragraph with its corresponding main idea Paragraphs Main ideas Paragraph 1 Email privacy Paragraph 2 Network security Paragraph 3 Introduction Paragraph 4 Virus protection Paragraph 5 Security on the Web English For E-Commerce 9 Vietnam – Korea Friendship Information Technology College Task 6: Complete the sentence by using a term from the text 1. Users have to enter a p……………to gain access to a network 2. You can download a lot of f…………… or public domain programs from the internet. 3. Hundreds of h……………… break into computer systems every year. 4. A computer v………………can infect your files and corrupt your hard disk. 5. The process of encoding data so that unauthorized users can’t read the data is known as e………………… 6. A f……………is a device which allows limited access to an internal network from the internet. 7. You can include an a………………….as part of your email massage. 8. This company uses d………………techniques to decode (or decipher) secret data. Task 7: Answer the questions 1. Why is security so important on the Internet? 2. What security features are offered by Netscape Communicator and Internet Explorer? 3. What security standard is used by most banks to make online transactions secure? 4. How can we protect and keep our email private? 5. What methods are used by companies to make internal networks secure? 6. Which ways can a virus enter a computer system? English For E-Commerce 10 . online service they ever used. They tend to judge all other online services based on this first service – often preventing themselves from seeing the advantages. not exist elsewhere or are superior to the same features on other services. And I’ve a really subjective reason for being on one service – I use it to send

Ngày đăng: 23/07/2013, 16:01

TỪ KHÓA LIÊN QUAN

w