Your SlideShare is downloading. ×
  • Like
Arpanet
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply
Published

 

Published in Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads

Views

Total Views
330
On SlideShare
0
From Embeds
0
Number of Embeds
0

Actions

Shares
Downloads
4
Comments
0
Likes
0

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1.  
  • 2.
    • a hard bounce is the failed delivery of an email due to a permanent reason like a non-existent address
    • A soft bounce is an email message that gets as far as the recipient’s mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full.
  • 3.
    • Spam is junk mail
  • 4.
    • Internet is an electronic communications network that connects computer networks and organizational computer facilities around the world
    • Intranet is a private computer network with a firewall, business.
  • 5.
    • Post Office Protocol
    • Application-layer internet standard protocol used by local email clients to retrieve e-mail from a remote sserver over a TCP/IP connection
  • 6.
    • the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication
  • 7.
    • Encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.
    • Decryption can typically also perform decryption), to make the encrypted information readable again
  • 8.
    • set of social conventions that facilitate interaction over networks, ranging from Usenet and mailing lists to blogs and forums
    • It is important because it keeps everything organized on the internet.
  • 9.
    • A networking device whose software and hardware are usually tailored to the tasks of routing and forwarding information