Electronic Communication Investigate Josh Lockyer Period 4
ARPANET <ul><li>Advanced research projects agency network, developed to create a system of communications. </li></ul>
Hard/Soft Bounce <ul><li>The soft bounce gets to the recipients mail server but is then bounced back, the hard bounce is the failed delivery of a message due to a permanent reason such as no address. </li></ul>
Spam <ul><li>Spam is any form of junk mail that can sometimes carry viruses. </li></ul>
Internet/intranet <ul><li>Internet is open for the use of anybody with access to it, but intranet is private usually for a company. </li></ul>
POP <ul><li>Post office protocol </li></ul><ul><li>Used to retrieve email form a server </li></ul><ul><li>Most email servers use this </li></ul>
Phishing <ul><li>The act of sending an email to a user falsely claiming to be an established legitimate enterprise. </li></ul>
Encryption/decryption <ul><li>Encryption-the translation of data into a secret code. Encryption is the most effective way to achieve data security. </li></ul><ul><li>The process of decoding data that has been encrypted into secret format. Decryption requires a secret key or password. </li></ul>
Netiquette <ul><li>Contraction of internet etiquette, the etiquette guidelines for posting messages to online service, and particularly internet newsgroups. </li></ul><ul><li>It is important because it is the language you use on the computer. </li></ul>
Router <ul><li>The router is really important because it is what connects you to the internet. Without it you might not be able to use it. It can be your own personal network. </li></ul>
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.