Electronic Communication Investigate


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Electronic Communication Investigate

  1. 1. Electronic Communication Investigate Kristie Zothner Pd.4 ARPANET: developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.
  2. 2. Hard/Soft Bounce <ul><li>Hard Bounce is the failed delivery of an email due to a permanent reason like a non-existent address </li></ul><ul><li>While a Soft Bounce is an email message that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipients inbox is full </li></ul>
  3. 3. Computer Spam <ul><li>Computer Spam is unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. </li></ul>
  4. 4. Internet vs. Intranet <ul><li>Internet is an electronic communications network that connects computer networks and organizational computer facilities around the war. </li></ul><ul><li>While Intranet is a private computer network with a firewall, business. </li></ul>
  5. 5. POP <ul><li>(Point of Protocol), An Internet standard for delivering e-mail from a server to an e-mail client on a personal computer. Abbreviated POP. </li></ul>
  6. 6. Phishing <ul><li>Phish is an Internet scam designed to trick the recipient into revealing credit card, passwords, social security numbers and other personal information to individuals who intend to use them for fraudulent purposes. </li></ul>
  7. 7. Encryption/ Decryption <ul><li>Encryption is the coding of a clear text message by a transmitting unit so as to prevent unauthorized eavesdropping along the transmission line; the receiving unit uses the same algorithm as the transmitting unit to decode the incoming message. </li></ul><ul><li>Decryption is the process of converting encrypted data back into its original form, so it can be understood. </li></ul>
  8. 8. Netiquette <ul><li>Netiquette is etiquette practiced or advocated in electronic communication over a computer network. </li></ul><ul><li>Its important because it follows rule sand respects other people business on the Internet. </li></ul><ul><li>Rule 1: Remember the Human </li></ul><ul><li>Rule 2: Adhere to the same standards of behavior online that you follow in real life </li></ul><ul><li>Rule 3: Know where you are in cyberspace </li></ul><ul><li>Rule 4: Respect other people's time and bandwidth </li></ul><ul><li>Rule 5: Make yourself look good online </li></ul><ul><li>Rule 6: Share expert knowledge </li></ul><ul><li>Rule 7: Help keep flame wars under control </li></ul><ul><li>Rule 8: Respect other people's privacy </li></ul><ul><li>Rule 9: Don't abuse your power </li></ul><ul><li>Rule 10: Be forgiving of other people's mistakes </li></ul>
  9. 9. Router <ul><li>Router is a device in a network that handles message transfers between computers. </li></ul>