A hard bounce is the failed delivery of an e-mail due
   to a permanent reason like a non-existent address
A soft bounce i...
Computer spam is defined as unsolicited
 junk mail. It may be an advertisement for
 a product sent to a mailing list or
 n...
Internet is an electronic communications network

    that connects computer networks around he world.
    Intranet is a ...
post office protocol, a protocol used to

    retrieve e-mail from a mail server
Phishing is the act of sending an e-mail to a user falsely

    claiming to be an established legitimate business in an
 ...
Encryption- scrambling of information for

  security purposes to be sent across the
  Internet
 Decryption- descramblin...
Netiquette – guidelines for posting

  messages to online services, and
  Internet newsgroups.
 Netiquette covers not on...
A Router is a device that forwards data

    packets along networks. A router is
    connected to at least two networks.
...
Electronic Communications Slide Show 2
Upcoming SlideShare
Loading in...5
×

Electronic Communications Slide Show 2

244

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
244
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Electronic Communications Slide Show 2

  1. 1. A hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address A soft bounce is an e-mail message that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full.
  2. 2. Computer spam is defined as unsolicited junk mail. It may be an advertisement for a product sent to a mailing list or newsgroup. This is unwanted among email users.
  3. 3. Internet is an electronic communications network  that connects computer networks around he world. Intranet is a private computer network with a  firewall that is accessible only by the organization's members, employees, or others with
  4. 4. post office protocol, a protocol used to  retrieve e-mail from a mail server
  5. 5. Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are  asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal the  user’s information.
  6. 6. Encryption- scrambling of information for  security purposes to be sent across the Internet  Decryption- descrambling of information for security purposes that has been sent across the Internet
  7. 7. Netiquette – guidelines for posting  messages to online services, and Internet newsgroups.  Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.
  8. 8. A Router is a device that forwards data  packets along networks. A router is connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×