<ul><li>Advanced research projects agency network </li></ul>
<ul><li>Hard Bounce-  a hard bounce is the failed delivery of an email due to a permanent reason like a non- existent addr...
<ul><li>Computer spam is junk mail and sometimes carries virus’s.  </li></ul>
<ul><li>The internet is open to the public so anyone can view it. The Intranet is private, so only certain users can see i...
<ul><li>Post Office Protocol </li></ul><ul><li>Used to retrieve email from a server </li></ul><ul><li>Most email servers u...
<ul><li>The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise  webopedia.com ...
<ul><li>The translation of data into a secret code. Encryption is the most effective way to achieve data security.  Webope...
<ul><li>Contraction of Internet etiquette, the etiquette guidelines for posting messages to online services, and particula...
<ul><li>The router is really important because it is what connects you to the internet! Without it you might not be able t...
Upcoming SlideShare
Loading in...5
×

Electronic Communication Investigate

215

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
215
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Electronic Communication Investigate

  1. 2. <ul><li>Advanced research projects agency network </li></ul>
  2. 3. <ul><li>Hard Bounce- a hard bounce is the failed delivery of an email due to a permanent reason like a non- existent address </li></ul><ul><li>Soft Bounce- undelivered before it gets bounced back </li></ul>
  3. 4. <ul><li>Computer spam is junk mail and sometimes carries virus’s. </li></ul>
  4. 5. <ul><li>The internet is open to the public so anyone can view it. The Intranet is private, so only certain users can see it. </li></ul>
  5. 6. <ul><li>Post Office Protocol </li></ul><ul><li>Used to retrieve email from a server </li></ul><ul><li>Most email servers use this. </li></ul>
  6. 7. <ul><li>The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise webopedia.com </li></ul>
  7. 8. <ul><li>The translation of data into a secret code. Encryption is the most effective way to achieve data security. Webopedia.com </li></ul><ul><li>The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password webopedia.com </li></ul>
  8. 9. <ul><li>Contraction of Internet etiquette, the etiquette guidelines for posting messages to online services, and particularly Internet newsgroups. </li></ul><ul><li>It is important because it is the language you use on the computer </li></ul>
  9. 10. <ul><li>The router is really important because it is what connects you to the internet! Without it you might not be able to use it. It can be your own personal network. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×