Jennifer Patetta Mr. Lindstrom Period 2 Computer Apps 1 ARPANET: Advanced Research Projects Agency Network developed by AR...
Hard and Soft Bounce <ul><li>Hard Bounce- a hard bounce is the failed delivery of an e-mail due to a permanent reason like...
Spam <ul><li>Junk Mail </li></ul>
Intranet and Internet <ul><li>Intranet- private computer network with firewall, business. More private than the Internet <...
POP <ul><li>POP- Post office protocol, a protocol used to retrieve e-mail from a mail server </li></ul>
Phishing <ul><li>Phishing- the act of sending an e-mail to a user falsely claiming to be an established legitimate busines...
Encryption and Decryption <ul><li>Encryption- scrambling of information for security purposes to be sent across the intern...
Netiquette <ul><li>Netiquette- guidelines for posting messages to online services, particularly Internet newsgroups, Netiq...
Router <ul><li>Router- a device that forwards data packets along networks. A router is connected to at least two networks ...
Upcoming SlideShare
Loading in...5
×

Electronic Communications

224

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
224
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Electronic Communications

  1. 1. Jennifer Patetta Mr. Lindstrom Period 2 Computer Apps 1 ARPANET: Advanced Research Projects Agency Network developed by ARPA of the United States Department of Defense during the Cold War, was the world’s first operational packet switching network, and the predecessor of the global internet.
  2. 2. Hard and Soft Bounce <ul><li>Hard Bounce- a hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address </li></ul><ul><li>Soft Bounce- a soft bounce is an e-mail message that gets as far as the recipient’s mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipients inbox is full </li></ul>
  3. 3. Spam <ul><li>Junk Mail </li></ul>
  4. 4. Intranet and Internet <ul><li>Intranet- private computer network with firewall, business. More private than the Internet </li></ul><ul><li>Internet- an electronic communications network that connects computer networks around the world </li></ul>
  5. 5. POP <ul><li>POP- Post office protocol, a protocol used to retrieve e-mail from a mail server </li></ul>
  6. 6. Phishing <ul><li>Phishing- the act of sending an e-mail to a user falsely claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. </li></ul>
  7. 7. Encryption and Decryption <ul><li>Encryption- scrambling of information for security purposes to be sent across the internet </li></ul><ul><li>Decryption- descrambling of information for security purposes that has been sent across the internet. </li></ul>
  8. 8. Netiquette <ul><li>Netiquette- guidelines for posting messages to online services, particularly Internet newsgroups, Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic forum message. </li></ul>
  9. 9. Router <ul><li>Router- a device that forwards data packets along networks. A router is connected to at least two networks commonly two LANs or WANs or a LAN ad its ISP’s network. Routers are located at gateways, the places where two or more networks connect. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×