

![]()


E-Business Infrastructure explores the foundational technologies, systems, and frameworks that enable online business operations. The course covers core components such as networking, internet protocols, cloud computing, databases, security mechanisms, and web services that underpin electronic commerce platforms. Students will examine the architecture of e-business environments, learn about integration of front-end and back-end systems, and analyze the critical factors for reliable, secure, and scalable infrastructure. Emphasis is placed on real-world applications, emerging technologies, and best practices to design and maintain robust infrastructures that support digital business growth and innovation.
Recommended Textbook
Electronic Commerce 10th Edition by Gary Schneider
Available Study Resources on Quizplus
12 Chapters
960 Verified Questions
960 Flashcards
Source URL: https://quizplus.com/study-set/2198 Page 2

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43753
Sample Questions
Q1) Internet e-mail accounts are far more valuable than single-organization e-mail accounts because of the ____________________.
Answer: network effect
Q2) Businesses often calculate ____ numbers before committing to any new technology.
A)return-on-investment
B)return-to-profit
C)productivity
D)return-to-value
Answer: A
Q3) A(n)____________________ is a gathering of people who share a common interest, which takes place on the Internet.
Answer: virtual community
Q4) SWOT is the acronym for ____.
A)supply, wealth, occupations, and threats
B)supply, weaknesses, opportunities, and testing
C)strengths, weaknesses, opportunities, and threats
D)strengths, wealth, occupations, and testing
Answer: C
Q5) A(n)____________________ organization always has a pyramid-shaped structure.
Answer: hierarchical
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43754
Sample Questions
Q1) A(n)____ is like a separate, covered commuter lane on a highway (the Internet)in which passengers are protected from being seen by the vehicles traveling in the other lanes.
A)VPN
B)IP wrapper
C)extranet
D)IAP
Answer: A
Q2) The POP protocol provides support for MIME.
A)True
B)False
Answer: True
Q3) A computer called a ____ converts private IP addresses into normal IP address when it forwards packets from those computers to the Internet.
A)routing algorithm device
B)network address translation device
C)subnet translation device
D)private network device
Answer: B

Page 4
To view all questions and flashcards with answers, click on the resource link above.
Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43755
Sample Questions
Q1) Even in the second wave of electronic commerce, e-mail responsiveness of electronic commerce sites is disappointing.
A)True
B)False
Answer: True
Q2) The ____________________, used by Lands' End, is an intelligent agent program that learns the customer's preference and makes suggestions. Answer: personal shopper
Q3) Visitors to Web sites are often reluctant to provide demographic information because of ____________________ concerns.
Answer: privacy
Q4) The removal of an intermediary, such as a human agent, from a value chain is called ____________________.
Answer: disintermediation
Q5) Stock brokerage firms use a(n)____________________ revenue model. Answer: fee-for-transaction fee for transaction
Q6) The word portal means ____________________.
Answer: doorway

Page 5
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43756
Sample Questions
Q1) Using the five stages of customer loyalty to create groups of customers in each stage is called ____________________ segmentation.
Q2) A(n)____________________ mix is the combination of elements a company uses to achieve their goals for selling and promoting their products and services.
Q3) Commerce in the physical world is called marketplace, while commerce in the information world is called ____________________.
Q4) A ____ is the part of a Web site that keeps track of selected items for purchase and automates the purchasing process.
A)trigger word
B)shopping cart
C)marketspace
D)padlock
Q5) The total of all financial costs that the customer pays (including all transaction costs)to obtain the product, subtracted from the benefits that a customer derives from the product, yields the customer ____________________.
Q6) Identify and describe the three techniques used by companies to arrange for other Web sites to display their banner ads.
To view all questions and flashcards with answers, click on the resource link above.
Page 6

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43757
Sample Questions
Q1) Finance and ____________________ business processes include activities such as making payments, processing payments received from customers, planning capital expenditures, and budgeting and planning to ensure that sufficient funds will be available to meet the organization's obligations as they come due.
Q2) In many companies, procurement staff need not have high levels of product knowledge to identify and evaluate appropriate suppliers.
A)True
B)False
Q3) Governments perform many functions for their stakeholders.
A)True
B)False
Q4) In the past, one of the major advantages of VANs was cost.
A)True
B)False
Q5) ____________________ tags can be placed anywhere on or in most items and are readable even when covered with packing materials, dirt, or plastic bands.
Q6) What is the difference between indirect connection EDI and direct connection EDI?
Page 7
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43758
Sample Questions
Q1) Visitors spend a greater amount of time at portal sites than they do at most other types of Web sites, which is attractive to advertisers.
A)True
B)False
Q2) The 2008 U.S.elections saw the first major use of blogs as a political networking tool.
A)True
B)False
Q3) Because sniping software synchronizes its internal clock to the auction site clock and executes its bid with a computer's precision, the software almost always wins out over a human bidder.
A)True
B)False
Q4) Most of the early Web community businesses are open and thriving today. A)True
B)False
Q5) What is the main difference between eBay and a live English auction?
Q6) ____________________ valuations are amounts that bidders are willing to pay for an item.
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43759
Sample Questions
Q1) ____ is a form of control over physical space and the people and objects that reside in that space, and is a defining characteristic of statehood.
A)Ethics
B)Culture
C)Legitimacy
D)Power
Q2) Any business that uses the Web becomes an international business instantly.
A)True
B)False
Q3) ____________________ laws, directed at large online retailers, are state laws that require online retailers to collect and remit sales taxes on sales they make in their states, even though the online retailers do not have nexus with the state.
Q4) The ____________________ patent, which protects a specific set of procedures for conducting a particular business activity, is quite controversial.
Q5) Every kind of agreement or exchange between parties, no matter how simple, is a type of ____________________.
Q6) Briefly discuss the application of import tariffs.
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43760
Sample Questions
Q1) A program called ____ tests the connectivity between two computers connected to the Internet.
A)Telnet
B)Tracert
C)Ping
D)Finger
Q2) A(n)____ file is a file on a Web site that is not linked to any page.
A)lost
B)index
C)orphan
D)independent
Q3) The open-source Apache Software Foundation sponsored a dynamic page-generation technology called ______________________________.
Q4) ____ is also known as unsolicited commercial e-mail.
A)Spam
B)CGI
C)VPN
D)Java
Q5) A large collection of servers is called a(n)____________________.
Q6) Telnet programs use a set of rules called the ____________________.
Page 10
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43761
Sample Questions
Q1) Large information systems that store the same data in many different physical locations are called ____ information systems.
A)centralized
B)distributed
C)dispersed
D)component
Q2) Because of software scalability, a high-traffic electronic commerce site, with thousands of catalog inquiries each minute, can use the same software as a small online shop selling a dozen items.
A)True
B)False
Q3) In some applications, ____________________ provide data feeds between two different companies.
Q4) Today, the main mall-style CSP that remains in business is eBay Stores.
A)True B)False
Q5) Commerce service provider is another name for Internet service provider. A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43762
Sample Questions
Q1) Absolute security is relatively easy to achieve.
A)True
B)False
Q2) ____________________ cookies exists until the Web client ends the connection.
Q3) The science that studies encryption is called ____________________.
Q4) The program that transforms normal text into cipher text is called a(n)____________________ program.
Q5) ____ encryption encodes a message with an algorithm that uses a single numeric key, such as 456839420783, to encode and decode data.
A)Hash coding
B)Symmetric
C)Asymmetric
D)Transformative
Q6) A(n)____________________ is a Trojan horse that secretly takes over another computer for the purpose of launching attacks on other computers.
Q7) Cookies can be placed on the client computer by the Web server site, in which case they are called ____________________ cookies.
Q8) What are the six main elements included on a digital certificate?
Page 12
To view all questions and flashcards with answers, click on the resource link above.

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43763
Sample Questions
Q1) ____ is a criminal act in which the perpetrator gathers personal information about a victim and then uses that information to obtain credit.
A)Pharming
B)Identity theft
C)Due diligence
D)Money laundering
Q2) A card verification number (CVN)is a three- or four-digit number that is printed on the credit card, but is not encoded in the card's ____________________.
Q3) Businesspeople often use the term ____________________ as a general term to describe all types of plastic cards that consumers use to make purchases.
Q4) The average consumers who engage in online payment transactions are easy prey for expert criminals.
A)True
B)False
Q5) Visa and MasterCard, which do not issue cards directly to consumers, are ____________________ associations that are operated by the banks who are members in the associations.
Q6) What is the difference between a credit card and a charge card?
To view all questions and flashcards with answers, click on the resource link above. Page 13

Available Study Resources on Quizplus for this Chatper
80 Verified Questions
80 Flashcards
Source URL: https://quizplus.com/quiz/43764
Sample Questions
Q1) A postimplementation audit is also called a(n)____________________.
Q2) A successful business plan for an electronic commerce initiative should include activities that identify the initiative's specific objectives and link those objectives to business strategies.
A)True
B)False
Q3) Measurements that companies can make to assess the value of benefits are often called ____________________.
Q4) In many electronic commerce projects, the company outsources the initial site design and development to launch the project quickly.This approach is called ____.
A)partial outsourcing
B)late outsourcing
C)fast venturing
D)early outsourcing
Q5) ____ design and write the database-driven Web pages.
A)Content creators
B)Web graphics designers
C)Content editors
D)Web programmers
To view all questions and flashcards with answers, click on the resource link above. Page 14