Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Electronic Communication Investigate


Published on

Published in: Technology, News & Politics
  • Be the first to comment

  • Be the first to like this

Electronic Communication Investigate

  1. 1. Lindsey Monroe Block 2 ARPANET:
  2. 2. <ul><li>Hard Bounce- a hard bounce is the failed delivery of an e-mail due to a permanent reason like a non-existent address </li></ul><ul><li>Soft Bounce- a soft bounce is an e-mail message that gets a far as the recipient’s mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient’s inbox is full </li></ul>
  3. 3. <ul><li>Spam- junk mail </li></ul>
  4. 4. <ul><li>Intranet- private computer network with a firewall, business </li></ul><ul><li>Internet- an electronic communications network that connects computer networks around the world </li></ul>
  5. 5. <ul><li>POP- Post Office Protocol, a protocol used to retrieve email from a mail server </li></ul>
  6. 6. <ul><li>Phishing- The act of sending an email to a user falsely claiming to be an established legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft. </li></ul>
  7. 7. <ul><li>Encryption- scrambling of information for security purposes to be sent across the internet </li></ul><ul><li>Decryption- descrambling of information for security purposes that has been sent across the internet </li></ul>
  8. 8. <ul><li>Netiquette-guidelines for posting messages to online services, and internet newsgroups. </li></ul><ul><li>Netiquette covers not only rules to maintain civility in discussions, </li></ul><ul><li>But also special guidelines unique to the electronic nature of forum messages. </li></ul><ul><ul><li>DON NOT SHOUT is message- all caps </li></ul></ul><ul><ul><li>Avoid to much formatting because it may change across different computers </li></ul></ul><ul><ul><li>Check email daily and respond promptly. </li></ul></ul><ul><ul><li>Remember that email is a written form of communication and therefore can be printed out and viewed by others than those originally intended for or used as legal documentation </li></ul></ul><ul><ul><li>Remember that you can always deny that you said it, but what you write is documented. </li></ul></ul><ul><ul><li>Remember that email is not confidential </li></ul></ul><ul><ul><li>Do not spam readers with unnecessary information or frivolous material it is not professional and could be in violation of company policy and grounds for termination of employment </li></ul></ul><ul><ul><li>Proofread and spell check for spelling errors </li></ul></ul>
  9. 9. <ul><li>Router- a device that forwards data packets along networks. A router is connected to at least two networks. Routers are located at gateways. The places where two or more networks connect. </li></ul>