Electronic Communication Investigate
Upcoming SlideShare
Loading in...5
×
 

Electronic Communication Investigate

on

  • 439 views

 

Statistics

Views

Total Views
439
Views on SlideShare
439
Embed Views
0

Actions

Likes
0
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Electronic Communication Investigate Electronic Communication Investigate Presentation Transcript

    • Electronic Communication Investigate Megan Hoerauf
    • What is ARPANET? • The world's first operational packet switching network
    • What is Difference between a Hard & Soft Bounce? • A soft bounce is an email message that gets as far as the recipient’s mail server it recognizes the address but is bounced back undelivered before it gets to the intended recipient. • A hard bounce is an email message that has been returned to the sender and is permanently undeliverable.
    • What is Computer Spam? Electronic junk mail or junk newsgroup postings.
    • What is Difference between a Internet and Intranet? • The Internet is a global network of interconnected computers, enabling users to share information along multiple channels • The Intranet is a restricted computer network; a private network created using World Wide Web software
    • What is POP used for? • Pop-up ads or pop-ups are a form of online advertising on the web intended to attract web traffic or capture email addresses.
    • What is Phishing? • phishing is the process of attempting to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
    • What is Encryption and Decryption? • Encryption is the activity of converting data or information into code • Decryption is the activity of making clear or converting from code into plain text; quot;a secret key or password is required for decryptionquot;
    • What is Netiquette? Why is it important? • A set of social conventions that facilitate interaction over networks, ranging from mailing lists to blogs and forums.
    • What does a Router do? • Routers connect two or more logical subnets, which do not necessarily map one-to-one to the physical interfaces of the router