Electronic Communications Slide Show 2
Upcoming SlideShare
Loading in...5
×
 

Electronic Communications Slide Show 2

on

  • 536 views

 

Statistics

Views

Total Views
536
Views on SlideShare
536
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Electronic Communications Slide Show 2 Electronic Communications Slide Show 2 Presentation Transcript

  • A hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address A soft bounce is an e-mail message that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full.
  • Computer spam is defined as unsolicited junk mail. It may be an advertisement for a product sent to a mailing list or newsgroup. This is unwanted among email users.
  • Internet is an electronic communications network  that connects computer networks around he world. Intranet is a private computer network with a  firewall that is accessible only by the organization's members, employees, or others with
  • post office protocol, a protocol used to  retrieve e-mail from a mail server
  • Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are  asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal the  user’s information.
  • Encryption- scrambling of information for  security purposes to be sent across the Internet  Decryption- descrambling of information for security purposes that has been sent across the Internet
  • Netiquette – guidelines for posting  messages to online services, and Internet newsgroups.  Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.
  • A Router is a device that forwards data  packets along networks. A router is connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.