The document defines and describes several key computer networking terms: hard bounces occur when an email is returned due to an invalid address, while soft bounces are emails returned after delivery; computer spam involves mass emailing unsolicited messages to promote products; intranets run faster than the internet but within a single environment; POP is an application layer protocol for email retrieval; phishing aims to steal user information through deception; encryption scrambles messages during transmission and decryption unscrambles them; netiquette outlines proper online conduct; and routers connect computers to the wider internet.