Activity task Vocabulary test
Download 30,87 Kb. Pdf ko'rish
|
1 2
Bog'liqghjigt
- Bu sahifa navigatsiya:
- 2. Match the first half of the sentences 1-6 to the second half a-f.
- Task III. Reading . 1. What are the steps in buying products online Number these sentences in the correct order.
Task II. Grammar.
1. Complete this text with the words in the box. Companies want to reach more customers, (1) so they go online. It is easy to set up an online business (2) but it is difficult to design and develop a website that attracts a lot of customers. Hardware (3) - and - software provide basic infrastructure for E-commerce. Networking, customer interface and payment solutions are very important parts of a company's E-commerce solution. Customers expect a fast and reliable service (4) or - they will go somewhere else to buy things. 2. Match the first half of the sentences 1-6 to the second half a-f. 1.Effective product information and -- our sales improved a lot. 2.Salom . 3.We used a lot of promotions, so ---- promotions attract customers. 4.I don't know how to buy online but --- I'll check online tutorials. 5.They want to buy a Cat 5e cable so --- they search the Internet. 6.In E-commerce you can look at a picture of a product but --- you can't touch it. Task III. Reading . 1. What are the steps in buying products online? Number these sentences in the correct order. 1. e) The customer goes to the website. 2. l) The customer searches and/or browses the website. 3. g) The customer chooses the items to buy. 4. c) The customer puts the items in a basket or shopping cart. 5. a) The customer opens an account. 6. b) The customer goes to the check-out. 7. h) The customer checks the order. 8. d) The customer pays for the products with a credit or debit card. 2. Read this email and write answers to the questions given below: 1. The company will have at least five security features. 2. The firewall in the virtual private network will stop attacks on the company network perimeter. 3. The Web Application Protection Firewall (WAF) will protect customer contacts and login boxes. 4. Secure Socket Layer (SSL) will protect private user information sent over the network. 5. Two-factor authentication (2FA) will prevent password leaks. 6. Encrypted backup will protect information. Download 30,87 Kb. Do'stlaringiz bilan baham: |
1 2
Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2025
ma'muriyatiga murojaat qiling
ma'muriyatiga murojaat qiling