Your SlideShare is downloading. ×
Electronic Communications Slide Show 2
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Electronic Communications Slide Show 2

226
views

Published on

Published in: Technology, News & Politics

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
226
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. A hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address A soft bounce is an e-mail message that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full.
  • 2. Computer spam is defined as unsolicited junk mail. It may be an advertisement for a product sent to a mailing list or newsgroup. This is unwanted among email users.
  • 3. Internet is an electronic communications network  that connects computer networks around he world. Intranet is a private computer network with a  firewall that is accessible only by the organization's members, employees, or others with
  • 4. post office protocol, a protocol used to  retrieve e-mail from a mail server
  • 5. Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are  asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal the  user’s information.
  • 6. Encryption- scrambling of information for  security purposes to be sent across the Internet  Decryption- descrambling of information for security purposes that has been sent across the Internet
  • 7. Netiquette – guidelines for posting  messages to online services, and Internet newsgroups.  Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.
  • 8. A Router is a device that forwards data  packets along networks. A router is connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.