Electronic Communications Slide Show 2Presentation Transcript
A hard bounce is the failed delivery of an e-mail due
to a permanent reason like a non-existent address
A soft bounce is an e-mail message that gets as far as
the recipients mail server but is bounced back
undelivered before it gets to the intended
recipient. A soft bounce might occur because the
recipient’s inbox is full.
Computer spam is defined as unsolicited
junk mail. It may be an advertisement for
a product sent to a mailing list or
newsgroup. This is unwanted among
Internet is an electronic communications network
that connects computer networks around he world.
Intranet is a private computer network with a
firewall that is accessible only by the organization's
members, employees, or others with
post office protocol, a protocol used to
retrieve e-mail from a mail server
Phishing is the act of sending an e-mail to a user falsely
claiming to be an established legitimate business in an
attempt to scam the user into surrendering private information
that will be used for identity theft.
The e-mail directs the user to visit a Web site where they are
asked to update personal information, such as passwords
and credit card, social security, and bank account.
The web site, however, is bogus and set up only to steal the
Encryption- scrambling of information for
security purposes to be sent across the
Decryption- descrambling of information
for security purposes that has been sent
across the Internet
Netiquette – guidelines for posting
messages to online services, and
Netiquette covers not only rules to
maintain civility in discussions, but also
special guidelines unique to the
electronic nature of forum messages.
A Router is a device that forwards data
packets along networks. A router is
connected to at least two networks.
Routers are located at gateways, the
places where two or more networks