Seek digital currency
Contracts, transactions and their records are an important part of our social, economic, legal and political systems. They protect our assets and define the boundaries of the organization. They formed and verified our personal identity and various historical events. They manage a series of activities between the state, organizations, communities and indivials. They direct all management and social activities. But these key tools and the bureaucracy that manages them have not kept pace with the digital transformation of the economy. It's like F1 racing in a big jam. In a digital world, our way of supervision and administrative control must be changed
blockchain has the potential to solve this problem. As the core supporting technology of bitcoin and other virtual currencies, blockchain is an open, distributed ledger, which can effectively record the transaction records between the two parties, and can be verified and permanently saved. The ledger itself can be programmed to automatically trigger transaction completion
five basic principles of blockchain technology
1. Distributed database
each party on the blockchain can obtain all data and complete historical records. No one can control data or information. Each party can directly verify the records of all parties to the transaction without mediation
2. Point to point communication
each independent point can communicate directly without a central node. Each node can store information and transfer all information to all other nodes
3. Limited transparency
users who have access to the system can see every transaction and its value. Each node or user on the blockchain has a unique address composed of letters and numbers, which can be used as the identity of the user. Users can choose to remain anonymous or disclose their identity to others. Transactions occur between addresses on the blockchain
4. Records cannot be changed
once the transaction results enter the database, the account information will be updated accordingly, and the records cannot be changed, because these information are related to all previous transaction records (this is the source of the term "chain"). Various calculation algorithms and methods are used to ensure that the records in the database are permanent, sorted in chronological order, and can be seen by all other people in the network
5. Computational logic
the digital nature of the ledger means that blockchain transactions can be connected with computational logic, and can actually be realized by programming. All users can set algorithms and rules, so that transactions can be automatically triggered between nodes
with blockchain technology, we can imagine that in a new world, contracts are stored in a transparent shared database in the form of digital programming, and will not be deleted, tampered with or revised. In such a world, every protocol, every process, every task and every payment will have a digital record and a digital signature that can be identified, verified, stored and shared. Intermediaries such as lawyers, brokers and bankers are no longer necessary. Indivials, organizations, machines and algorithms can freely interact and trade with each other without friction. This is the infinite potential of blockchain
in fact, almost everyone has heard that blockchain will bring revolutionary impact on enterprises and redefine enterprises and economy. Although we are enthusiastic about the potential of blockchain, we are also worried about exaggeration. It's not just security issues (such as the collapse of a bitcoin exchange in 2014 and the recent hacker attacks) that worry us. The experience of research on technological innovation tells us that if there is a blockchain revolution in the future, there will be many obstacles - technological, governance, organizational and social obstacles. It is likely to lead to a big mistake to rashly apply blockchain technology innovation before we really understand blockchain thoroughly
we believe that it will take many years for blockchain to bring real changes to enterprises and governments. Because blockchain is not a "disruptive" technology, disruptive technology can impact the traditional business model with low-cost solutions, and can quickly replace traditional enterprises. We believe that blockchain is a basic technology: it has the potential to create a new foundation for our economic and social system. But its impact is very extensive, and it will take decades for blockchain to penetrate into economic and social infrastructure. The process of blockchain popularization will be graal, and this process and its strategic significance will be the focus of this paper
technology adoption mode
before discussing blockchain strategy and investment, let's recall the technology adoption process we know below, especially the adoption process of other basic technologies. One of the most relevant examples is the distributed computer network technology, that is, the adoption of TCP / IP protocol, which has laid the foundation for the development of the Internet
TCP / IP first appeared in 1972 and has been widely concerned in an independent application scenario: it is the basis for sending e-mail between researchers on ARPANET, which is the predecessor of the commercial Internet developed by the U.S. Department of defense. Before TCP / IP, the communication system architecture was built on the basis of "circuit switching". The connection between two parties or two machines must be preset and maintained through the switch. In order to ensure that any two nodes can communicate, telecom service providers and equipment manufacturers have invested billions of dollars in dedicated lines
TCP / IP has completely changed the above mode. The new protocol digitizes the information and decomposes it into many small packets, each packet contains address information. Once these packets are released into the network, they can reach the receiver by any route. The data sending point and receiving point in the network can decompose the data packets, combine the data packets again, and interpret the data. There is no need for dedicated lines or large-scale infrastructure. TCP / IP creates an open and shared public network, which has no central organization or main body responsible for maintenance and update
traditional telecom enterprises and related enterprises are suspicious of TCP / IP. Rarely imagine that data, information, audio and video can be established under the new system, and rarely imagine that the related system will be very safe and develop rapidly. However, from the late 1980s to the 1990s, more and more enterprises, such as sun, next, HP and silicon graphics, used TCP / IP to develop their internal LAN. By doing so, they have developed technologies that go beyond e-mail and graally replace traditional LAN technologies and standards. With the adoption of these newly developed technologies and tools, the proction efficiency of enterprises has been greatly improved< In the mid-1990s, the emergence of the world wide web made TCP / IP widely used. The newly founded high-tech enterprises began to provide relevant "tools" - hardware, software and related services, which are necessary for connecting with the current open network and exchanging information. Netscape has commercialized browsers, web servers and other tools and components. Sun company promotes the development of Java. With the exponential growth of information on the Internet, Infoseek, excite, Altavista, and Yahoo are leading users to use TCP / IP technology
once this basic infrastructure is widely accepted, the new generation of enterprises can seize the opportunity brought by low-cost Internet access to create more Internet services, which in turn helps to replace the original business model. CNET has moved news online. Amazon sells more books than any physical bookstore. Priceline and Expedia make it easier to buy tickets, and the whole purchase process is more transparent. These new enterprises expand their business at a very low cost, making traditional enterprises such as newspapers and physical retail stores feel unprecedented pressure
relying on the widespread Internet, enterprises can create novel and revolutionary applications, which are enough to fundamentally change the traditional business model and create value. These enterprises are built on the new P2P architecture, and generate value by coordinating the users of the distributed network. Imagine how eBay has changed the online retail business through auction mode, Napster has changed the music instry, Skype has changed the telecommunications instry, and Google has changed the Internet search by using the links formed by users to provide more accurate search results
many enterprises have used blockchain to track goods in the supply chain. Finally, it took more than 30 years for TCP / IP to become widely accepted - used alone, locally applied, replaced and transformed - and reshape our economy. Today, more than half of the world's most valuable listed companies are Internet driven, platform based business models. The foundation of our economy has fundamentally changed. Physical assets and proprietary intellectual property rights are no longer the guarantee of competitive advantage; Enterprises that lead economic development can play a key role, especially in organizing, influencing and coordinating a wide range of community networks, users and organizations
new system
blockchain, the P2P network at the top of the Internet, came into people's view as the core foundation of bitcoin in October 2008. Bitcoin is a virtual monetary system, which does not issue currency through the central authority, transfers ownership and confirms transactions. Bitcoin is the first practical application of blockchain technology
the similarities between blockchain and TCP / IP are obvious. Just as email allows people to exchange information, bitcoin allows people to trade with each other. The development and maintenance of blockchain is open, distributed and shared - just like TCP / IP. There's a group of volunteers around the world maintaining their core software. Like email, bitcoin has received enthusiastic support from people at the beginning, but only a relatively small number of people
TCP / IP greatly reces the cost of interconnection, thus creating new value for economic development. Similarly, blockchain can significantly rece transaction costs. Blockchain has the potential to become all transaction recording systems. If this becomes a reality, new enterprises based on blockchain technology will influence and control emerging instries, and the economy will experience fundamental changes again
let's first look at how enterprises operate. Recording transactions is the core work that every enterprise must do. These records track past activities and achievements and provide guidance for the future. They can not only let people understand how the enterprise operates internally, but also let people know how to keep in touch with the outside world. Every enterprise or organization has its own records, and these records are private and confidential. Many enterprises do not have a general ledger record of all activities of the enterprise; On the contrary, all records are scattered in various branches or departments within the enterprise. The problem is that it takes a long time to coordinate transactions between indivials and private ledgers
1 Visual FoxPro database function
adatabases() puts the names and paths of all open databases into a memory variable array
adobjects() puts the named connection name, relationship name, table name or SQL view name in the current database into a memory variable array
afields() stores the structure information of the current table in an array, And returns the number of fields in the table
alias() returns the alias of the current table or the specified workspace
assignments() creates an existing data work period ID array
ataginfo() creates a name containing index and key expression Array of quantity and type information
aused() stores the table alias and workspace in a data working period into the memory variable array
bof() determines whether the current record pointer is in the header
candidate() determines whether the index is a candidate index
cdx() numbers according to the specified index position, Returns the name of the open composite index (. CDX) file
cpdbp() returns the code page used by an open table
create offline() creates a free view from an existing view
cursorgetprop() returns the current property settings of the VisualFoxpro table or temporary table
cursorsetprop() specifies the property settings of the VisualFoxpro table or temporary table
cursortoxml() converts visualf Oxpro temporary table is XML text
curval() returns field values directly from a table on disk or a remote data source
dbc() returns the name and path of the current database
dbf() returns the name of the table opened in the specified workspace, or returns the name of the table according to the table alias
dbsetprop() gives the current database or the fields, named connections The table or view sets an attribute
deleted() to return a logical value indicating whether the current record is marked with a deletion mark
deleting() creates an index ID with the deleting keyword
dropoffline() discards all modifications to the free view, And put the free view back to the database
eof() determines whether the record pointer position exceeds the current table or the last record in the specified table
fcount() returns the number of fields in the table
field() returns the field name in the table according to the number
filter() returns the table filter expression specified in setfilter command
fldlist() for the field list specified by setfields command, Return the field and calculation result field expression
block() attempts to lock the current table or the specified table
for() returns an open single index file or index filter expression of index ID
find() if continue, find, locate or seek command is executed successfully, the return value of the function is & quot; True & quot<
fsize() returns the size of the specified field or file in bytes
getfldstate() returns a value indicating whether the field in the table or temporary table has been edited, whether there are additional records, or whether the deletion status of the record has changed
getextmodified() returns a record number, Corresponding to the next modified record in the buffer table or temporary table,
header() returns the number of bytes occupied by the header of the current or specified table file
idxcollate() returns the sort sequence of index or index ID
indbc() returns & quot; if the specified database object is in the current database; True & quot; ( T. )
indexseek() searches an index table for a record that appears for the first time
isexclusive() judges whether a table or database is opened in exclusive mode
islocked() returns the lock state of the table
isreadonly() judges whether to open the table in read-only mode
isrlocked() returns the lock state of the record
key() returns the index of the index ID or index file Keyword expression
keymatch() searches for an index keyword in the index ID or index file
lookup() searches for the first record whose field value matches the specified expression in the table
update() returns the date of the last update of a table
mdx() returns the open. CDX composite index file name according to the specified index number
memlines() returns remarks Section
mline() returns the specified line in the remarks field in the form of string
ndx() returns the name of an index (jdx) file opened for the current table or the specified table
order() returns the master index file or identifier of the current table or the specified table
primary() checks the index identifier, if it is the master index identifier, it returns & quot; True & quot; ( T. )
reccount() returns the number of records in the current or specified table
recno() returns the current record number in the current or specified table
recsize() returns the size (width) of the records in the table
refresh() refreshes the data in the updatable SQL view
relaxation() returns the relationship expression specified for the table opened in the given workspace
seek() in an established query Search for the first occurrence position of a record in the referenced table
select() returns the current workspace number or the maximum number of unused workspaces
setfldstate() specifies the field status value or deletion status value for the field or record in the table or temporary table
sqlcall() requests to cancel an executing SQL statement
sqlcalls() to specify the column name and about of the data source table The information of each column is stored in a VisualFoxpro temporary table
sqlconnect() submits a transaction
sqlconnect() establishes a connection to the data source
sqlconnect() terminates the connection with the data source
sqlexec() sends an SQL statement to the data source for processing
sqlgetprop() returns the current or default setting of an active connection
sqlmoreresults() If there are multiple result sets, another result set to the temporary table of VisualFoxpro
sqlprepare() before using sqlexec() to perform remote data operation, You can use this function to prepare the remote data for the command to be executed
sqlcallback() to cancel any changes made ring the current transaction
sqlsetup() to specify the setting of an active connection
sqlstringconnect() to use a connection string to establish a connection with the data source
sqltables() to store the table name in the data source in the temporary table of VisualFoxpro
sqltables() />Sys (14) index expression
sys (21) control index number
sys (22) control identifier name or index name
sys (2011) returns the status of record locking or table locking in the current workspace
sys (2012) returns the remark field block size of the table
sys (2021) screens the index expression
sys (2029) returns the value corresponding to the table type
sys (3054) Rushmore optimization level & 822 6;
tag() returns the identification name of the opened. CDX multiple index file, Or return the file name of the opened. IDX single index file
tagcount() returns the composite index file (. CDX) ID and the number of opened single index files (. IDX)
tagno() returns the composite index file (. CDX) ID and the index location of the opened single index file (. IDX)
target() returns the alias of a table, This table is the target of the relationship specified in the into clause of the setreading command.
unique() is used to test whether the index is created in a unique way.
updated() is used to test whether the index is created in the latest read command, Whether the data has been modified
used() determines whether a table is opened in the specified workspace
xmlcursor() converts XML text to a Visual FoxPro cursor or table
2 Visual FoxPro date and time functions
ctod() converts character expressions to date expressions
cdow() returns the value of the week from a given date or date time expression
cmonth() returns the month name of a given date or date time expression
ctod() converts character expressions to date expressions
ctot() returns a date time value from a character expression
date() returns the current system date of the operating system control, or creates a date value compatible with the year 2000
datetime() returns the current date and time with a date time value, or creates a 2000 compatible date time value
day() returns the number of days in a given day expression or date time expression
dmy() returns a character expression in the format of "day month year" from a date or date time expression (for example, 31 May 1995). The name of the month is not abbreviated
dtoc() returns a character date from a date or date time expression
dtos() returns a string date in yyyymmdd format from a specified date or date time expression
dtot() returns a date time type value from a date type expression
for a given date expression or date time expression, gomonth() returns the date before or after the specified number of months
hour() returns the hour part of a date time expression
mdy() returns the specified date or date time expression in month day year format, where the month name is not abbreviated
minute() returns the minute part of a datetime expression
month() returns the month value of a given date or date time expression
quarter() returns the quarter value in a date or date time expression
sec() returns the second part of the datetime expression
seconds() returns the time since midnight in seconds
sys (1) returns the current system date in the form of date numeric string
sys (2) returns the time since midnight, in seconds
sys (10) converts the (Julian) date to a string
sys (11) converts the date expression or string represented by date format to (Julian) date
time() returns the current system time in 24-hour format and 8-bit string (hour: minute: Second) format
ttoc() returns a character value from a date time expression
ttod() returns a date value from a date time expression
week() returns a number representing the week of the year from a date or date time expression
year() returns the year from the specified date expression<
3 Visual FoxPro character function
alltrim(). Delete the space character before and after the specified character expression
asc() returns the ANSI value of the leftmost character in the character expression
at() returns the first occurrence position of one character expression or remark field in another character expression or remark field
at()_ C() returns the position where a character expression or remark field first appears in another character expression or remark field
atc() returns the position where a character expression or remark field first appears in another character expression or remark field
atcc() returns the position where a character expression or remark field first appears in another character expression or remark field Current location
addbs () if necessary, Add a backslash to a path expression
atcline() returns the line number of the first occurrence of a character expression or remark field in another character expression or remark field
at line() returns the line number of the first occurrence of a character expression or remark field in another character expression or remark field
between() determines the value of an expression No, between the values of two other expressions of the same data type,
chr() returns its corresponding characters according to the specified ANSI numeric code,
chrtran() replaces the characters in the first character expression that match those in the second expression with those in the third expression
adatabases() puts the names and paths of all open databases into a memory variable array
objects() puts the named connection name, relationship name, table name or SQL view name in the current database into a memory variable array
afields() stores the structure information of the current table in an array, And returns the number of fields in the table
alias() returns the alias of the current table or the specified workspace
assignments() creates an existing data work period ID array
ataginfo() creates a name containing index and key expression Array of quantity and type information
aused() stores the table alias and workspace in a data working period into the memory variable array
bof() determines whether the current record pointer is in the header
candidate() determines whether the index is a candidate index
cdx() numbers according to the specified index position, Returns the name of the opened composite index (. CDX) file
cpdbp() returns the code page used by an open table
create offline() creates a free view from an existing view
cursorgetprop() returns the current property settings of the VisualFoxpro table or temporary table
cursorsetprop() specifies the property settings of the VisualFoxpro table or temporary table
cursortoxml() conversion VI Sualfoxpro temporary table is XML text,
curval() returns field values directly from a table on disk or a remote data source,
dbc() returns the name and path of the current database,
dbf() returns the name of the table opened in the specified workspace, or returns the name of the table according to the table alias,
dbsetprop() gives the current database or the fields and connections in the current database The table or view sets an attribute
deleted() to return a logical value indicating whether the current record is marked with a deletion mark
deleting() creates an index ID with the deleting keyword
dropoffline() discards all modifications to the free view, And put the free view back to the database
eof() determines whether the record pointer position exceeds the current table or the last record in the specified table
fcount() returns the number of fields in the table
field() returns the field name in the table according to the number
filter() returns the table filter expression specified in setfilter command
fldlist() returns the field column specified by setfields command Table, return the field and calculation result field expression
block() attempts to lock the current table or the specified table
for() returns the index filter expression of an opened single index file or index ID
find() if the continue, find, locate or seek command is executed successfully, the return value of the function is & quot; True & quot<
fsize() returns the size of the specified field or file in bytes
getfldstate() returns a value indicating whether the field in the table or temporary table has been edited, whether there are additional records, or whether the deletion status of the record has changed
getextmodified() returns a record number, Corresponding to the next modified record in the buffer table or temporary table,
header() returns the number of bytes occupied by the header of the current or specified table file
idxcollate() returns the sort sequence of index or index ID
indbc() returns & quot; if the specified database object is in the current database; True & quot; ( T. )
indexseek() searches an index table for a record that appears for the first time
isexclusive() judges whether a table or database is opened in exclusive mode
islocked() returns the lock status of the table
isreadonly() judges whether to open the table in read-only mode
isrlocked() returns the lock status of the record
key() returns the lock status of the index ID or index file Index keyword expression
keymatch() searches for an index keyword in the index ID or index file
lookup() searches for the first record in the table whose field value matches the specified expression
update() returns the latest update date of a table
mdx() returns the open. CDX composite index file name according to the specified index number
memlines() returns The number of rows in the comment field
mline() returns the specified row in the comment field in the form of string
ndx() returns the name of a jdx file opened for the current table or the specified table
order() returns the master index file or identifier of the current table or the specified table
primary() checks the index identifier, and if it is the master index identifier, returns & quot; True & quot; ( T. )
reccount() returns the number of records in the current or specified table
recno() returns the current record number in the current or specified table
recsize() returns the size (width) of the records in the table
refresh() refreshes the data in the updatable SQL view
relaxation() returns the relationship expression specified for the table opened in the given workspace
seek() in a built Search the first occurrence position of a record in the indexed table
select() returns the current workspace number or the maximum number of unused workspace
setfldstate() specifies the field status value or deletion status value for the field or record in the table or temporary table
sqlcell() requests to cancel an executing SQL statement
sqllinks() to specify the column name of the data source table And the information about each column is stored in a temporary table of Visual FoxPro
sqlconnect() submits a transaction
sqlconnect() establishes a connection to the data source
sqlconnect() terminates the connection to the data source
sqlexec() sends an SQL statement to the data source for processing
sqlgetprop() returns the current or default setting of an active connection
sql Moreresults() if there are multiple result sets, another result set to the temporary table of VisualFoxpro
sqlcompare() before using sqlexec() to perform remote data operation, You can use this function to prepare the remote data for the command to be executed
sqlcallback() to cancel any changes made ring the current transaction
sqlsetup() to specify the setting of an active connection
sqlstringconnect() to use a connection string to establish a connection with the data source
sqltables() to store the table name in the data source to the temporary table of VisualFoxpro In
sys (14) index expression
sys (21) control index number
sys (22) control identifier name or index name
sys (2011) returns the status of record locking or table locking in the current workspace
sys (2012) returns the remark field block size of the table
sys (2021) filter index expression
sys (2029) returns the value corresponding to the table type
sys (3054) Rushmore optimization Level ·
tag() returns the identification name of the opened. CDX multiple index file, Or return the file name of the opened. IDX single index file
tagcount() returns the composite index file (. CDX) ID and the number of opened single index files (. IDX)
tagno() returns the composite index file (. CDX) ID and the index location of the opened single index file (. IDX)
target() returns the alias of a table, This table is the target of the relationship specified in the into clause of the setreading command.
unique() is used to test whether the index is created in a unique way.
updated() is used to test whether the index is created in the latest read command, Whether the data has been modified
used() determines whether a table has been opened in the specified workspace
xmlcursor() converts XML text to a VisualFoxpro cursor or table
: --- -
Visual FoxPro date and time functions
ctod() converts character expressions to date expressions
cdow() returns the value of the week from a given date or date time expression
cmonth() returns the month name of a given date or date time expression
ctod() converts character expressions to date expressions
ctot() returns a date time value from a character expression
date() returns the current system date of the operating system control, or creates a date value compatible with the year 2000
datetime() returns the current date and time with a date time value, or creates a 2000 compatible date time value
day() returns the number of days in a given day expression or date time expression
dmy() returns a character expression in the format of "day month year" from a date or date time expression (for example, 31 May 1995). The name of the month is not abbreviated
dtoc() returns a character date from a date or date time expression
dtos() returns a string date in yyyymmdd format from a specified date or date time expression
dtot() returns a date time type value from a date type expression
for a given date expression or date time expression, gomonth() returns the date before or after the specified number of months
hour() returns the hour part of a date time expression
mdy() returns the specified date or date time expression in month day year format, where the month name is not abbreviated
minute() returns the minute part of a datetime expression
month() returns the month value of a given date or date time expression
quarter() returns the quarter value in a date or date time expression
sec() returns the second part of the datetime expression
seconds() returns the time since midnight in seconds
sys (1) returns the current system date in the form of date numeric string
sys (2) returns the time since midnight, in seconds
sys (10) converts the (Julian) date to a string
sys (11) converts the date expression or string represented by date format to (Julian) date
time() returns the current system time in 24-hour format and 8-bit string (hour: minute: Second) format
ttoc() returns a character value from a date time expression
ttod() returns a date value from a date time expression
week() returns a number representing the week of the year from a date or date time expression
year() returns the year from the specified date expression
Visual FoxPro character function
alltrim(). Delete the space character before and after the specified character expression
asc() returns the ANSI value of the leftmost character in the character expression
at() returns the first occurrence position of one character expression or remark field in another character expression or remark field
at()_ C() returns the position where a character expression or remark field first appears in another character expression or remark field
atc() returns the position where a character expression or remark field first appears in another character expression or remark field
atcc() returns the position where a character expression or remark field first appears in another character expression or remark field Location
addbs () if necessary, Add a backslash to a path expression
atcline() returns the line number of the first occurrence of a character expression or remark field in another character expression or remark field
at line() returns the line number of the first occurrence of a character expression or remark field in another character expression or remark field
between() determines whether the value of an expression is correct Between the values of two other expressions of the same data type,
chr() returns its value according to the specified ANSI numeric code
At present, there are 15 ACCA examinations, After 13 subjects, you can get ACCA certificate
Basic Courses:
knowledge courses (3 in total)
F1 account in business accounting
F2 management accounting
F3 financial accounting
skill courses (6 in total)
F4 corporate and business law (CHN) Company Law and commercial law
F5 performance management performance management
F6 Taxation (CHN) tax law
F7 financial reporting financial report
F8 audit and assurance audit and certification
F9 financial management financial management
Professional stage: Core Course
SBL strategic business leader
SBL strategic business report Optional courses (2 of them)
P4 advanced financial management senior financial management
P5 advanced performance management senior performance management
P6 advanced taxation senior tax law
P7 advanced audit and assurance senior audit and certification
rapid customs clearance program ACCA global private course college student employer through train plan Plan weekend face-to-face classes, winter and summer sprint classes and other courses
The price of APP depends on the size of the development function and the length of the development cycle caused by the texture of the user experience. The development function and the development cycle are respectively in direct proportion to the development price. The more functions developed, the longer the development price; The longer the development cycle is, the longer the development price is. For this reason, the development company will work out a function requirement table according to the function you need to develop, so that both parties can determine the development cycle time. The price is also determined according to the function development requirement. And each company's technical content is different, and the quotation for developing the same function is different. The only thing to pay attention to is not to be subcontract, which not only makes the development price more expensive, but also makes it impossible to determine the development cycle. Therefore, to discuss an app setting is to determine the development price of the type of app, the range is also very large, from thousands to millions, the span is very large. However, the main functional requirements of the loan app on the market are as follows:
the required functions are not very complex, so they will not reach millions. The main thing is to do it delicately, achieve a good user experience, and increase the trust and status of this app among users. If you really want to know the accurate development price of an app, it is suggested that you go to the app company to talk with the business personnel, or go to the official website for consultation and leave a message, and wait for the business personnel to contact you actively. How can you see new things in the shell? So as long as you take one step, what's the difficulty for app development companies to take the remaining 99 steps
2
(a) modest and prudent, fair (b) law-abiding, honest (c) seeking truth from facts, serious work (d) scrupulously abide by confidentiality, strictly abide by confidentiality
3. E-commerce engineer, whether collecting information, providing advice, writing documents, must correct thinking, adhere to the principle of ()
(a) objective and practical (b) seeking truth from facts (c) working conscientiously (d) adhering to practice
4. Only a fair and decent e-commerce engineer can be broad-minded and full of vigor and vitality in his work
(a) modest and prudent (b) Fair (c) tolerant and generous (d) energetic and lively
5. The () of e-commerce engineer is the code of conct for e-commerce personnel in professional activities< (a) professional ethics cultivation (b) Business Ethics (c) ideological ethics (d) professional ethics
6. The State implements () system for the sale of computer information system security special procts
(a) license (b) license (c) letter of credit (d) security certificate
7. The earliest e-wallet system in the world is ()
(a) Mondex (b) visacash (c) MasterCard (d) clip
8. A standard called () jointly developed by MasterCard and visa provides sufficient guarantee for the safe flow of information and funds on the Internet
(a) ATM (b) pin (c) SSL (d) set
9. Search engine systems such as Lycos and Altavista provide full-text search services for web pages, It is called ()
(a) directory search engine (b) robot search engine (c) meta search engine (d) full text database search engine
10. () it is more suitable for qualitative research on key issues< On March 14, 1996, the State Press and Publication Administration issued the Interim Provisions on electronic publications to strengthen the protection of CD-ROM, cd-g and other electronic publications< The model law on electronic commerce was adopted in 1996, which will promote the harmonization and unification of international trade law< (a) International Trade Law Commission (b) International Chamber of Commerce (c) European Commission on Trade Law (d) United States Commission on Trade Law
13. E-mail is one of the most frequently used applications on the Internet, and it is transmitted by using ()
(a) http (b) TCP / IP (c) ATP (d) SMTP
14. () can only retrieve files, generally can not upload files< (a) telnet (b) FTP (c) e-mail (d) Usenet
15. Article 6 of the model law provides that "if written form is required by law, if the information contained in a data message can be accessed for future reference, that requirement is met." As for "future reference", it refers to ()
(a) storability (b) non repeatability (c) function (d) changeability
16. Internet is the most powerful marketing tool, and its () marketing ability is in line with the future trend of customized marketing and direct marketing< (a) one to many (b) one to one (c) many to one (d) many to many
17. Firewall is a combination of computer hardware and software, which establishes a () between Internet and Intranet, so as to protect intranet from illegal users< (a) security level protection system (b) security information system (c) security gateway (d) security protection
18. Logistics informatization includes establishment of () and database, rationalization of transportation network, systematization of sales network and electronization of logistics center management
(a) commodity code (b) bar code (c) distribution network (d) information system
19. () is a kind of small image advertisement that can be displayed on the screen. When users click on the image, it will automatically expand the display space
(a) picture ads (b) banner ads (c) mobile ads (d) link ads
20. () is a relational data management system developed by IBM
(a) Oracle (b) DB2 (c) Sybase (d) SQL Server
21. The interface of winzip is a standard () interface, with 4 menus and 8 shortcut buttons
(a) UNIX (b) Linux (c) windows (d) WindowsNT
22. Framework is also called (). Through framework technology, the window of web browser can be divided into several independent areas, and each area is a framework
(a) table (b) column (c) frame (d) webpage
23. Use font mark () to set the font, size and color of the text< br />A< h1> B< h6> CD< font>
24. The source code virus is inserted into FORTRAN, C or Pascal before the program is compiled
(a) source program (b) main program (c) language processor (d) connector
25. It is recommended to use () when installing antivirus software folder
(a) backup folder (b) temporary folder (c) named folder (d) default folder
26. When the real-time monitoring program finds a virus, a dialog box will be displayed with () options, and the user can choose what action to take
(a) 1 (b) 2 (c) 3 (d) 4
27. The targets of real-time monitoring are: floppy disk, local hard disk, optical disk, ()
(a) host (b) system (c) network neighbor (d) file
28. The home page is the first page opened when Internet Explorer starts every time. It has () setting method
(a) 2 (b) 3 (c) 4 (d) 5
29. Internet Explorer divides various web sites into () security zones and specifies different security levels for each zone
(a) 2 (b) 3 (c) 4 (d) 5
30. The format of URL is: (Protocol) / / (host name) / () / (file path) / (file name)< (a) file number (b) port number (c) path number (d) host number
31. According to TCP / IP protocol, each IP address consists of () (netid) and host address (hostid)
(a) domain name address (b) link address (c) path address (d) network address
32. A domain name is a tree structure called (), which is managed by InterNIC< (a) domain name space (b) domain name address (c) domain name system (d) domain name management
33. Computer viruses can be divided into operating system viruses, (), shell viruses and intrusion viruses according to their invasion modes
(a) timing virus (b) random virus (c) source code virus (d) dot virus
34. Each IP address is composed of () binary
(a) 15 (b) 20 (c) 28 (d) 32
35. To realize file transport and share resources on the Internet, the connection between client and server is called ()< According to different interface styles, FTP software can be divided into two categories: () and graphical interface
(a) glyph interface (b) character interface (c) sound interface (d) file interface
37. Generally, when the user logs in to the host, the user name is entered (), and no password is required
(a) guest (b) admin (c) Manager (d) anonymous
38. Telnet is a () file named telnet.exe
(a) independent program (b) additional program (c) temporary program (d) permanent program
39. HTML can describe the location, size and other attributes of an image, but it can't directly describe the () on the image
(a) color (b) pixel (c) text (d) code
my answer:
40. When creating frame pages with frontpage, frame pages have () view mode
(a) 5 (b) 4 (c) 3 (d) 2
41. FTP server provides () shared resources, users can download the required files from FTP server to local computer
(a) massive (b) sufficient (c) quantitative (d) small amount
42. Port refers to the channel entering (), which is generally the default port
(a) host (b) system (c) server (d) network
43
(a) name resolution (b) address resolution (c) forward resolution (d) reverse resolution
44. The domain name system defines the name structure: the name structure is from left to right, and the range is from small to large, which is in the same order as the IP address
(a) consistent (b) opposite (c) consistent (d) opposite
45. In the Internet host domain name, () represents the country - the Netherlands
(a) HL (b) NL (c) eg (d) GR
46. During the operation of Telnet, two programs are started, one is called telnet client program, which runs on the local computer, the other is called telnet server program, which runs on the () that needs to be logged in
(a) client (b) host (c) remote computer (d) remote host
47. If the color of the inserted image does not exceed 256 colors, the frontpage editor will automatically convert to () format; Otherwise, convert to () format< br />AGIF/JPEGBARJ/SCRCZIP/GIFDJPEG/GIP
48.< font> It has three properties: face, size, ()
(a) Center (b) title (c) color (d) body
49; html>~& lt;/ html> It contains two main parts, one is the "title setting area", the other is the "HTML page text area", which is framed with () mark< br />A< head>~& lt;/ head> B< ul>~& lt;/ ul> C< a>~& lt;/ a> D< body>~& lt;/ body>
50. Cannabis virus is a typical virus
(a) invasion virus (b) shell virus (c) source code virus (d) operating system virus
51. The first part of Usenet naming rules determines the major categories to which the focus group belongs, about () top-level categories
(a) 6 (b) 8 (c) 10 (d) 12
52. The rate of communication exit is a key information to select () service provider
(a) banner advertising (b) bulletin board advertising (c) button advertising (d) insert advertising
53. The collection of detailed information of importers in various countries can start from ()
(a) inquire the importers of all countries who have established contact with each other (b) inquire through professional management organizations and instry associations (c) inquire through the websites of news organizations (d) search through large databases
54. () are discrete numerical records of stochastic processes with equal time intervals
(a) time series (b) discriminant analysis (c)
The sources of indirect information include internal information sources and external information sources. The internal information sources related to the market are mainly the market information collected and sorted by the enterprise itself, various records, archival materials and historical data of the sales of the enterprise's procts in the market, such as customer name table, purchase and sales records, salesman's reports, communications and letters from customers and middlemen, etc. The external market information sources of enterprises include a wide range of relevant public institutions at home and abroad< (1) websites of domestic government agencies. Relevant government departments, international trade research institutions and offices in various countries usually collect market information of the world or the host country in a more comprehensive way. Domestic foreign trade companies and foreign trade consulting companies can also provide more detailed, systematic and specialized international market information. (2) foreign government websites. Governments all over the world have corresponding departments to collect international market information. Many developed countries set up trade information service agencies to provide some or all of the marketing information to the export enterprises of developing countries. In addition, the statistical agencies of each country regularly publish statistics of various systems, and the customs of some countries can even provide more detailed information on market, trade and marketing than the published figures< (3) library. Public libraries and university libraries can at least provide documents and research reports of market background information. The most valuable information often comes from the library attached to the Department of foreign trade, which can at least provide various trade statistics, procts and prices of relevant markets, as well as basic market information of distribution channels and middlemen in the international market< (4) international organizations. The international market information is mainly related to:
① United Nations. Publication of statistics on international and national trade, instry and other economic aspects, as well as on market development issues
② international trade center. It provides research on special procts and market introction materials of various countries. It also has a service agency to reply to the consultation, which is specialized in providing comprehensive, complete and systematic information on international market trade processed by computer< (3) the International Monetary Fund. Publish information on foreign exchange management, trade relations, trade barriers, foreign trade and financial and economic development of various countries and international markets< (4) World Bank< (5) World Trade Organization
in addition, the information provided by some international and local organizations is also very useful for understanding the economy and trade, market development and international marketing environment of a specific region or international economic group< (5) bank. Many big international banks issue journals, which are usually available for free upon request. These journals generally contain national economic surveys, commodity reviews and the above-mentioned information. These materials are helpful to grasp the marketing environment of the market and each market segment< (6) business information research institutions. In addition to completing research and consulting work for clients, these institutions also regularly publish market reports and special research papers< (7) related enterprises. All kinds of enterprises participating in market operation are one of the important sources of market information. As long as the marketing information personnel write to the external departments of these enterprises to ask for the commodity catalogue, proct information, price list, list of dealers, agents, wholesalers and brokers, annual report, etc., they can get a lot of information about the competitors and understand the overall picture and competitive environment of the competition
by visiting the websites of relevant enterprises or organizations on the Internet, enterprises can easily obtain a lot of information and materials in the market. Therefore, in the era of network information, it is no longer difficult to obtain information. The difficulty is how to find the useful information needed by enterprises in the sea of information. Online indirect survey mainly uses the Internet to collect information about the market, competitors, consumers and macro environment related to enterprise marketing. The most commonly used method for enterprises is online indirect survey, because its wide range of information can meet the needs of enterprise management and decision-making, while online direct survey is generally only suitable for special investigation of specific problems. There are mainly WWW, usernet news, BBS and e-mail, among which WWW is the most important information source. According to statistics, there are 800 million Web pages in the world, each of which contains all kinds of information
online indirect survey method. Generally through the search engine to search and retrieve the web address of the site, and then visit the website or webpage that you want to find information. Among the websites that provide information service and inquiry, websites generally provide the function of information retrieval and inquiry. (1) using search engines to collect information
at present, 80% of the information on the Internet is in English. After several years of development, the Chinese information on the Internet has begun to enrich, and the number of Chinese websites has increased dramatically. Especially in 1999, the "government Internet year", more and more economic policy information has been on the Internet Hong Kong and other Chinese websites have small-scale online Chinese resources. Therefore, when choosing a search engine, it's better to distinguish between Chinese information and foreign information. If it's Chinese information, the most frequently used Chinese search engines are Sohu, Sina, Netease and Chinese Yahoo. If it's foreign information, the most frequently used search engines are Yahoo!, Excite, Lycos, Infoseek and Altavista< (2) using bulletin board to collect information
bulletin board (BBS) is to provide an open "venue" on the Internet, where anyone can leave a message, answer questions or express opinions and questions, or view other people's messages. Just like discussing in a public place, you can join or leave at will. At present, many ICP have a free bulletin board, you just need to apply to use it. There are two kinds of bulletin board software systems. One is text based on Telnet, which is not very convenient to view and read, and is used very much in the early days; The other is the most popular way based on WWW, which is realized through web pages and programs (such as JavaScript). This way has a friendly interface and is popular. The way to use it is like browsing WWW pages. Using BBS to collect information is mainly to go to the BBS website related to the theme to understand the situation< (3) using newsgroups to collect information
newsgroups are a combination of computers based on the network. These computers can exchange articles (or messages) identified by one or more recognizable tags, commonly known as Usenet or newsgroup. Because newsgroups are easy to use, have a wide range of contents, and can accurately classify users (according to interests and categories), they contain various categories of topics that can cover all the contents of human society, such as science and technology, human society, geography and history, leisure and entertainment, etc. The main purpose of using newsgroups is to get free information or exchange free information with each other< (4) using e-mail to collect information
e-mail is the most widely used means of communication on the Internet. It is not only cheap, but also convenient and fast to use. It is most popular among users. Many users surf the Internet mainly for sending and receiving e-mail letters. At present, many ICP and traditional media, as well as some enterprises use e-mail to release information. Some traditional media companies and enterprises, in order to maintain communication with users, also regularly send e-mail to company users to release the company's latest news and related proct and service information. Therefore, collecting information through e-mail is the fastest and most effective channel. When collecting information, you only need to register at the relevant website and wait to receive E-mail later
the person in charge of a business may be the owner (owner manager, also known as an entrepreneur) or the owner employed by a professional manager. These two types of managers seek to achieve profits, growth, survival, and a sense of social responsibility
the owner manager sets his or her own goals, while the professional manager tries to achieve the set goals, etc. Professional managers are responsible for the owners, the business community, who judge the performance of managers, and their goals have been achieved by PE - desertification international network - CF plus R
many of these business owners are ace entrepreneurs ^, to the people who take risks- Necessary organization and management of business, and accept financial profits and non monetary remuneration. In Chapter 3, for a more in-depth discussion, entrepreneurs will submit. Entrepreneurs of the 1990s are expected to be innovative, practical and strong willed. This view was actually established years ago as pointed out by Austrian economist Joseph Schumpeter. He pointed out: functional entrepreneurs proce by means of reform or revolution, use an invention or more generally, the possibility of an untested technology to proce new goods or proce a new way, open up a new source of supply, materials or new export procts, and restructure a new instry
the description of the owner manager who is suitable for Schumpeter is endless. The list will include names such as Ted Turner (CNN), Ken Olsen (digital equipment company), Fred Smith (FedEx), Bob Reis (last tech company), Frank Pere (Pere chicken), John McCormack (visible change), bill mcgovem (MCI Communications), bill mcgovem (MCI Communications), bill mcgovem (digital equipment company), bill mcgovem (digital equipment company), bill mcgovem (digital equipment company), bill mcgovem (digital equipment company), bill mcgovem (digital equipment company), bill mcgovem (digital equipment company), bill, Liz Claiborne (: Liz clai infection), Barbara laramont (wccl TV), and akoito Morita (Sony). What do these entrepreneurs do every year? Schumpeter describes it. They personify term entrepreneurs.
section 1 identifier
I. definition
identifier is a symbol that identifies the language units such as variables, constants, proceres, functions and classes. It can be used to reference variables, constants, proceres, functions and classes
2. Naming rules
1) start with a letter, which is composed of letters, numbers and underscores, such as a987b_ 23abc
2) the length of characters is less than 40, (Excel 2002 or above, Chinese characters can be used, and the length can be up to 254 characters)
3) the same name cannot be reserved with VB, such as public, private, dim, goto, next, with, integer, single, etc.
section 2 operator
definition: operator is a symbol representing some operation function of VB
1) assignment operator =
2) mathematical operators &, + (character connector), + (addition), - (subtraction), mod (remainder), & 92 (3) logical operators not (not), and (and), or (or), XOR (XOR), EQV (equal), imp (implied)
4) relational operators = (same), & lt& gt; Not equal to & gt Greater than & lt Less than & gt= Not less than & lt= No greater than), like, is
5) bit operators not (logical not), and (logical and), or (logical or), XOR (logical XOR), EQV (logical, etc.), imp (implied)
section 3 data types
VBA has a total of 12 data types. See the following table for details. In addition, users can use type to customize data types according to the following types
data type identifier byte
string $character length (0-65400)
byte No 1
Boolean No 2
integer% 2
long & 4
single! 4
double # 8
date no 8 A.D. 100 / 1 / 1-9999 / 12 / 31
currency @ 8
decimal No 14
variant no any of the above, variable
object no 4
section 4 variables and constants
VBA allows the use of undefined variables, the default is variant variables
2) in the general description part of the mole, the option explicit statement is added to force the user to define variables
3) variable definition statement and variable scope
dim variable as type & # 39; It is defined as a local variable, such as dim XYZ as integer
private variable as type & #; It is defined as a private variable, such as private XYZ as byte
public variable as type & #; It is defined as a public variable, such as public XYZ as single
global variable as type & #; It is defined as a global variable, such as global XYZ as date
static variable as type & # 39; It is defined as a static variable, such as static XYZ as double
the principle of general variable scope is that the definition of that part works in that part, and the definition of the mole works in that part
4) constant is a special case of variable, which is defined by const and assigned value when defined. The value cannot be changed in the program, and the scope is just like the scope of variable. The definition is as follows: const pi = 3.1415926 as single
section 5 array
an array is a set of variables with the same data type. The single variable in the array is referenced by the array index subscript. It represents a continuous memory block in memory and must be defined by global or dim statements. The definition rules are as follows:
dim array name ([lower to] upper [, [lower to] upper,...]) as type; The default value of lower is 0. Two dimensional arrays are arranged in rows and columns, such as XYZ (row, column)
in addition to the above fixed arrays, VBA also has a powerful dynamic array, which is defined without declaration of size and dimension; In the program, the ReDim statement is used to change the size of the array. The original contents of the array can be retained by adding the preserve keyword. For example:
dim array1 () as double: ReDim array1 (5): array1 (3) = 250: ReDim preserve array1 (5,10)
section 6 comments and assignment statements
1) comment statements are used to explain the functions and functions of some statements in a program; There are two methods in VBA that are identified as comment statements< br /> ü Single quotation mark ' For example, define global variables; It can be at the end of other statements or on a single line
ü Rem ; For example, REM defines global variables; Only a single line
2) the assignment statement is a statement to assign values to variables or object attributes. The assignment number =, such as x = 123: form1. Caption = "my window"
is used to assign values to objects: set MyObject = object or MyObject: = object
section 7 writing specification
1) VBA does not distinguish the case of identifier letters, and all of them are considered as lowercase letters
2) multiple statements can be written in one line, and the statements are separated by colon
3) a sentence can be written in multiple lines, with spaces and underscores_ To identify the next line
4) the identifier should be concise and clear without ambiguity
section 8 judgment sentence
1) if... Then... Else sentence
if condition then [statements] [else statements]
for example, 1: if a & gt; B And C< D then a = B + 2 else a = C + 2
e.g. 2: if X & gt; 250 then x = X-100
alternatively, you can use the syntax in block form:
if condition then
[statements]
[elseif condition-n then
[elseifstatements]...
[else
[elsestatements]]
end if
for example, 1:
if number & lt; 10 Then
Digits = 1
ElseIf Number < 100 then
digits = 2
else
digits = 3
end if
2) select case... Case... End case sentence
such as 1:
select case PID
case "A101"
price = 200
case "A102"
price = 300
...
case else
price = 900
end case
3) choose function
choose (index, choice-1, choice-2, Choice-n), which can be used to select a value in the string of independent variables and return it as a necessary parameter, numeric expression or field. Its operation result is a numeric value, which is bounded between 1 and the number of items that can be selected. The necessary parameter of choice, variant expression, contains one of the optional items. For example:
getchoice = choose (ind, & quot; Speedy", & quot; United", & quot; Federal")
4) switch function
switch (expr-1, value-1 [, expr-2, value-2 { [, Expr-n, value-n]]]
the switch function is similar to the choose function, but it returns the desired value in a group of two. In the string column, the first true value will be returned. Expr is a necessary parameter and a variant expression to be evaluated. Value is a required parameter. If the related expression is true, the value or expression of this part will be returned. If none of the expressions is true, switch will return a null value<
section 9 loop statement
1) for next statement executes a group of statements repeatedly for a specified number of times
for counter = start to end [step step] &; The default value of step is 1
[statements]
[exit for]
[statements]
next [counter]
for example, 1:
for words = 10 to 1 step - 1 & 39; Establish 10 cycles
for chars = 0 to 9 & # 39; Establish 10 cycles
mystring = mystring & chars & # 39; Add numbers to the string
next chars & # 39; Increment counter
MyString = MyString & " & quot; 39; Add a space
next words
2) the main function of the for each... Next statement is to modify an array or set object, Let all elements repeatedly execute the statement
for each element in group
statements
[exit for]
statements
next [element]
such as 1:
for each rang2 in range1
with range2. Interior
. Colorindex = 6
. Pattern = xlsolid
end with
next
the with... End with statement is used in the above example, The purpose is to save multiple calls of objects and speed up the process; The syntax is:
with object
[statements]
end with
3) do... Loop statement when the condition is true, repeatedly execute the block command
do {while | until} condition & # 39; As the name suggests,
statements
Exit do
statements
loop
or use the following syntax
do & #; Do before judge, that is to say, no matter how you do it, do it again
statements
Exit do
statements
loop {while | until} condition
section 10 other types of statements and error statements handling
I. other loop statements
it is enough for structured programs to use the above judgment and loop statements. It is recommended not to use the following statements easily, Although VBA also supports
1) goto line this statement is to jump to the line statement line
2) on expression Gosub destinationlist or on expression goto destinationlist statement is to jump to the desired line number or line tag according to the expression value
3) Gosub line... Line... Return sentence, return returns to the Gosub line line, For example:
sub gosubtry()
dim num
num = InputBox ("input a number, this value will be judged as a cycle")
If num & gt; 0 then Gosub routine1: debug. Print num: exit sub
routine1:
num = num / 5
return
End Sub
4) while... Wend statement, as long as the condition is true, the loop will be executed, which is preserved from the old VB syntax, as follows:
while condition 'while I & lt; 50
[statements] 'I = I + 1
wend' wend
2. Error statement processing
sometimes there are errors in the execution phase. On Error statement is used to process errors and start an error processing program. The syntax is as follows:
on error goto line 'when an error occurs, it will be transferred to the line immediately.
on error resume next' when an error occurs, it will be transferred to the next line immediately.
on erro goto 0 'when an error occurs, Section 11 procere and function
procere is a mole of a program, which is often used to complete a relatively independent function. Process can make the program clearer and more structured. VBA has four processes: sub process, function function, property property process and event event process
one. Sub procere
there are two ways to pass parameters of sub procere: by value (ByVal) and by address (byref). For example:
sub password (ByVal x As Integer, byref y As Integer)
if y = 100 then y = x + y else y = X-Y
x = x + 100
End Sub
sub call_ Password ()
dim X1 as integer
dim Y1 as integer
X1 = 12
Y1 = 100
call password (x1, Y1) "call procere method: 1. Call procere name (parameter 1, parameter 2...); 2. Procere name, parameter 1, parameter 2...
debug.print x1, Y1 'the result is that 12, 112, Y1 changes the value by passing the address, while X1 changes the original value by passing the value
End Sub
2. Function
function actually implements a kind of mapping, which passes through a certain mapping