SlideShare a Scribd company logo
1 of 10
Arpanet
Robert Thompson
Block 2
Hard bounce and soft bounce
• Hard bounce is an email that got returned to
sender because the person they were sending
to has a non valid email address
• Soft bounce is when it gets there then just
sent back
Computer spam
• This is when someone sends out the same
email to many people lots of times to get
them to buy something or just bug them
Internet vs Intranet
• There a few major differences like that
intranet and internet are to totally different
environments and the intranet runs faster.
Pop
• Short for post office protocol and it is app
layer internet
Phishing
• This is a computer frauds attempt at getting
information from you.
Encryption and decryption
• This is when u send someone a message on
your computer that is all scrambled and weird
so that if someone were to get it they could
not read it and decryption is when they get it
and unscramble it so they can read it.
Netiquette
• This is how you should act when you are
online and it is important so that you don’t get
in trouble
Router
• A router is the thing that connects you up the
computer to the internet
Router
• A router is the thing that connects you up the
computer to the internet

More Related Content

What's hot

Lesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the InternetLesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the Internetguevarra_2000
 
Protocols presentation
Protocols presentationProtocols presentation
Protocols presentationLouise Reed
 
Email ppt
Email pptEmail ppt
Email pptmelgade
 
Take a Tour of ringEmail Service
Take a Tour of ringEmail ServiceTake a Tour of ringEmail Service
Take a Tour of ringEmail ServiceClearhub Pte Ltd
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateMegan Hoerauf
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devicesbrownjordan
 
Comppt22
Comppt22Comppt22
Comppt22Deliad
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemailu083133
 
Internet connections
Internet connectionsInternet connections
Internet connectionsentonline
 
Email Ppt
Email PptEmail Ppt
Email PptDyern
 

What's hot (19)

Lesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the InternetLesson6 - How do I connect to the Internet
Lesson6 - How do I connect to the Internet
 
week10
week10week10
week10
 
Welcome pc
Welcome pcWelcome pc
Welcome pc
 
Protocols presentation
Protocols presentationProtocols presentation
Protocols presentation
 
Digital literacy
Digital literacyDigital literacy
Digital literacy
 
Email ppt
Email pptEmail ppt
Email ppt
 
The internet
The internetThe internet
The internet
 
Take a Tour of ringEmail Service
Take a Tour of ringEmail ServiceTake a Tour of ringEmail Service
Take a Tour of ringEmail Service
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Digital communication protocols, methods and devices
Digital communication protocols, methods and devicesDigital communication protocols, methods and devices
Digital communication protocols, methods and devices
 
Comppt22
Comppt22Comppt22
Comppt22
 
Dialog Broadnet Brief
Dialog Broadnet BriefDialog Broadnet Brief
Dialog Broadnet Brief
 
Email And Voicemail
Email And VoicemailEmail And Voicemail
Email And Voicemail
 
E mail and fax
E mail and faxE mail and fax
E mail and fax
 
The Internet
The InternetThe Internet
The Internet
 
Internet connections
Internet connectionsInternet connections
Internet connections
 
Another one on Email...
Another one on Email...Another one on Email...
Another one on Email...
 
Email Ppt
Email PptEmail Ppt
Email Ppt
 
Email
EmailEmail
Email
 

Viewers also liked

From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...The New School
 
History of the internet.pptx done!
History of the internet.pptx done!History of the internet.pptx done!
History of the internet.pptx done!arivas2595
 
Shortcut Keys
Shortcut KeysShortcut Keys
Shortcut Keyslynblair
 
Excel short cut key
Excel short cut keyExcel short cut key
Excel short cut keyadarshcrp
 
Arpanet
ArpanetArpanet
Arpanetsmithz
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentationKalpana Dangol
 
Operating system by ajay yadav shq upr
Operating system by ajay yadav shq uprOperating system by ajay yadav shq upr
Operating system by ajay yadav shq uprAjay Yadav
 
10 Important Points for Interview Skills
10 Important Points for Interview Skills10 Important Points for Interview Skills
10 Important Points for Interview Skillsbhaktibhatt
 
Basics of computer & internet .pptx
Basics of computer & internet  .pptxBasics of computer & internet  .pptx
Basics of computer & internet .pptxSatish k
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PCshashikant pabari
 

Viewers also liked (20)

From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
From the Telegraph to ARPANET. “Alternative” Networks, Counter Culture, the I...
 
Arpanet
ArpanetArpanet
Arpanet
 
Arpanet.53
Arpanet.53Arpanet.53
Arpanet.53
 
History of the internet.pptx done!
History of the internet.pptx done!History of the internet.pptx done!
History of the internet.pptx done!
 
Shortcut Keys
Shortcut KeysShortcut Keys
Shortcut Keys
 
Excel short cut key
Excel short cut keyExcel short cut key
Excel short cut key
 
Basics of computers
Basics of computersBasics of computers
Basics of computers
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 
Arpanet
ArpanetArpanet
Arpanet
 
computer virus presentation
computer virus presentationcomputer virus presentation
computer virus presentation
 
Shortcuts (Computer commannds)
Shortcuts (Computer commannds)Shortcuts (Computer commannds)
Shortcuts (Computer commannds)
 
Operating system by ajay yadav shq upr
Operating system by ajay yadav shq uprOperating system by ajay yadav shq upr
Operating system by ajay yadav shq upr
 
computer virus
computer viruscomputer virus
computer virus
 
10 Important Points for Interview Skills
10 Important Points for Interview Skills10 Important Points for Interview Skills
10 Important Points for Interview Skills
 
Basics of computer & internet .pptx
Basics of computer & internet  .pptxBasics of computer & internet  .pptx
Basics of computer & internet .pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Basic shortcut keys of computer or PC
Basic shortcut keys of computer or PCBasic shortcut keys of computer or PC
Basic shortcut keys of computer or PC
 
Keyboard shortcuts
Keyboard shortcutsKeyboard shortcuts
Keyboard shortcuts
 
All About Short Keys
All About Short KeysAll About Short Keys
All About Short Keys
 
ARPANET
ARPANETARPANET
ARPANET
 

Similar to Arpanet

(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshowchairesj
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatesarah s
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and securitynamansaini11
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)Shail Shah
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranetAnil Pokhrel
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internetnivi88
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephJijo Joseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateJijo Joseph
 
DIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmarDIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmarJAMESFRANCISGOSE
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2erowell
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2dlombana
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateBrain Young
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication InvestigateBrain Young
 

Similar to Arpanet (20)

The internet
The internetThe internet
The internet
 
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
 
Presentation1(1)
Presentation1(1)Presentation1(1)
Presentation1(1)
 
Carnivore
CarnivoreCarnivore
Carnivore
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Internet surfing and security
Internet surfing and securityInternet surfing and security
Internet surfing and security
 
I2P (Invisible Internet Project)
I2P (Invisible Internet Project)I2P (Invisible Internet Project)
I2P (Invisible Internet Project)
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Internet and intranet
Internet and intranetInternet and intranet
Internet and intranet
 
Pros and cons of using internet
Pros and cons of using internetPros and cons of using internet
Pros and cons of using internet
 
Baabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojosephBaabtra.com template_Basics about Internet_jijojoseph
Baabtra.com template_Basics about Internet_jijojoseph
 
Basic Internet_Baabtra.com template
Basic Internet_Baabtra.com templateBasic Internet_Baabtra.com template
Basic Internet_Baabtra.com template
 
DIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmarDIGITAL COMMUNICATION for 21st century by sujina unmar
DIGITAL COMMUNICATION for 21st century by sujina unmar
 
Electronic Communication 2
Electronic Communication 2Electronic Communication 2
Electronic Communication 2
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Protocols
Protocols Protocols
Protocols
 
Protocols
Protocols Protocols
Protocols
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 

More from Rthompson2

Second Other One
Second Other OneSecond Other One
Second Other OneRthompson2
 
Slide Show 2 2
Slide Show 2 2Slide Show 2 2
Slide Show 2 2Rthompson2
 
Slide Show 1 2
Slide Show 1 2Slide Show 1 2
Slide Show 1 2Rthompson2
 
Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Rthompson2
 

More from Rthompson2 (6)

Playstation
PlaystationPlaystation
Playstation
 
Second Other One
Second Other OneSecond Other One
Second Other One
 
Other One
Other OneOther One
Other One
 
Slide Show 2 2
Slide Show 2 2Slide Show 2 2
Slide Show 2 2
 
Slide Show 1 2
Slide Show 1 2Slide Show 1 2
Slide Show 1 2
 
Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1Robert Thompson And Jordan Summerlin 1
Robert Thompson And Jordan Summerlin 1
 

Recently uploaded

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 

Recently uploaded (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Arpanet

  • 2. Hard bounce and soft bounce • Hard bounce is an email that got returned to sender because the person they were sending to has a non valid email address • Soft bounce is when it gets there then just sent back
  • 3. Computer spam • This is when someone sends out the same email to many people lots of times to get them to buy something or just bug them
  • 4. Internet vs Intranet • There a few major differences like that intranet and internet are to totally different environments and the intranet runs faster.
  • 5. Pop • Short for post office protocol and it is app layer internet
  • 6. Phishing • This is a computer frauds attempt at getting information from you.
  • 7. Encryption and decryption • This is when u send someone a message on your computer that is all scrambled and weird so that if someone were to get it they could not read it and decryption is when they get it and unscramble it so they can read it.
  • 8. Netiquette • This is how you should act when you are online and it is important so that you don’t get in trouble
  • 9. Router • A router is the thing that connects you up the computer to the internet
  • 10. Router • A router is the thing that connects you up the computer to the internet