Electronic Communication 2

407 views

Published on

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
407
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Electronic Communication 2

  1. 1. Ebonie Rowell 3/6/09 Blcok-3 ARPANET The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.
  2. 2. What is the Difference between a Hard and Soft Bounce? A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid. A hard bounce might occur because the domain name doesn't exist or because the recipient is unknown. A soft bounce is an e-mail message that gets as far as the recipient's mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient's inbox is full.
  3. 3. Computer Spam E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.
  4. 4. What is the Difference Between Internet and Intranet? The Internet is a global network of interconnected computers, enabling users to share information along multiple channels. An intranet is a private computer network that uses Internet technologies to securely share any part of an organization's information or operational systems with its employees.
  5. 5. What is POP Used For? Post Office Protocol version is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.
  6. 6. Phishing Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
  7. 7. What is Encryption and Decryption? Encryption is the scrambling of information for security purposes to be sent across the internet. Decryption is the descrambling of information for security purposes that has been sent across the internet.
  8. 8. Netiquette Netiquette is a set of guidelines for posting messages to online services, and internet newsgroups. Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.
  9. 9. Router A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LAN’s or WAN’s or a LAN and its ISP’s network. Routers are located at gateway, the place where two or more networks connect

×