Your SlideShare is downloading. ×
  • Like
Electronic Communications Slide Show 2
Upcoming SlideShare
Loading in...5

Thanks for flagging this SlideShare!

Oops! An error has occurred.


Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Electronic Communications Slide Show 2



Published in Technology , News & Politics
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On SlideShare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. A hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address A soft bounce is an e-mail message that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full.
  • 2. Computer spam is defined as unsolicited junk mail. It may be an advertisement for a product sent to a mailing list or newsgroup. This is unwanted among email users.
  • 3. Internet is an electronic communications network  that connects computer networks around he world. Intranet is a private computer network with a  firewall that is accessible only by the organization's members, employees, or others with
  • 4. post office protocol, a protocol used to  retrieve e-mail from a mail server
  • 5. Phishing is the act of sending an e-mail to a user falsely  claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. The e-mail directs the user to visit a Web site where they are  asked to update personal information, such as passwords and credit card, social security, and bank account. The web site, however, is bogus and set up only to steal the  user’s information.
  • 6. Encryption- scrambling of information for  security purposes to be sent across the Internet  Decryption- descrambling of information for security purposes that has been sent across the Internet
  • 7. Netiquette – guidelines for posting  messages to online services, and Internet newsgroups.  Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.
  • 8. A Router is a device that forwards data  packets along networks. A router is connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.