Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Daniel D’Elia 4 th  Block ARPANET-Advanced researched projects agency network developed by the us department of Defense du...
Bounce <ul><li>Hard bounce is when the email fails to send on error of the sender </li></ul><ul><li>A soft bounce is an er...
Spam <ul><li>Spam is junk mail that is a hassle to delete and many email services have a junk folder to help block spam </...
Internet vs. Intranet <ul><li>The internet is public service while intranet would be within a company with firewall </li><...
POP <ul><li>Point-to-Point Tunneling Protocol  (PPTP) is a method for implementing virtual private networks. PPTP does not...
Phishing <ul><li>This is the process of attempting to acquire sensitive information such as usernames, passwords and credi...
Encryption & Decryption <ul><li>Decryption-the activity of making clear or converting from code into plain text; &quot;a s...
Netiquette <ul><li>The rules of etiquette that apply when communicating over computer networks, esp. the Internet, a neces...
Router <ul><li>A router is a device which forwards packets between networks creating a local are network  </li></ul>
Upcoming SlideShare
Loading in …5
×

Comppt22

415 views

Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Comppt22

  1. 1. Daniel D’Elia 4 th Block ARPANET-Advanced researched projects agency network developed by the us department of Defense during the Cold War
  2. 2. Bounce <ul><li>Hard bounce is when the email fails to send on error of the sender </li></ul><ul><li>A soft bounce is an error on the recipient’s part </li></ul>
  3. 3. Spam <ul><li>Spam is junk mail that is a hassle to delete and many email services have a junk folder to help block spam </li></ul>
  4. 4. Internet vs. Intranet <ul><li>The internet is public service while intranet would be within a company with firewall </li></ul>
  5. 5. POP <ul><li>Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption </li></ul>
  6. 6. Phishing <ul><li>This is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details </li></ul>
  7. 7. Encryption & Decryption <ul><li>Decryption-the activity of making clear or converting from code into plain text; &quot;a secret key or password is required for decryption </li></ul><ul><li>Encryption- putting the data into a secret key </li></ul>
  8. 8. Netiquette <ul><li>The rules of etiquette that apply when communicating over computer networks, esp. the Internet, a necessity to keep respect on the internet </li></ul>
  9. 9. Router <ul><li>A router is a device which forwards packets between networks creating a local are network </li></ul>

×