SlideShare a Scribd company logo
ARPANET: The ARPANET (Advanced Research Projects
Agency Network) developed by ARPA of the United States
Department of Defense, was the predecessor of the
modern-day Internet.
Hard vs. Soft Bounce
 Hard Bounce- the failed delivery of an email due to a
  permanent reason like a non-existent address
 Soft Bounce- an email message that gets bounced back
  because the recipient’s inbox is full
Computer Spam
 Computer spam is unwanted and unsolicited email
 advertisements or messages
Internet vs. Intranet
 Internet: an electronic communication network that
  connects computer networks around the world
 Intranet: private computer network with a firewall;
  business
POP
 POP: Post Office Protocol, a protocol used to retrieve
 email from a mail server
Phishing
 The act of sending an email to a user falsely claiming
 to be an established legitimate business is an attempt
 to scam the users into surrendering private
 information that will be used for identity theft.
Encryption and Decryption
 Encryption: scrambling of info for security purposes to
  be sent across the Internet
 Decryption: descrambling of info for security purposes
  that has been sent across the Internet
Netiquette
  Netiquette: guidelines for posting messages to other
  services and Internet newsgroups.
 Netiquette is important because it not only covers
  rules to maintain civility in discussion, but also special
  guidelines unique to the electronic nature of forum
  messages
Router
 A device that forwards data packets along networks. A
 router connected to at least two networks. Routers are
 located at gateways, the places where two or more
 networks connect.

More Related Content

What's hot

Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
SameerFareedMughal
 
Rutgers - RUCS Internet
Rutgers - RUCS InternetRutgers - RUCS Internet
Rutgers - RUCS Internet
Michael Dobe, Ph.D.
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to Internet
Chinmay Raul
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
Marivic Manlagnit
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
Subrata Kumer Paul
 
Internet
InternetInternet
Internet
Pooja Goswami
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
sameera.moparty
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Anish Thomas
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
lizard4444
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
VTC_NeilaSofien
 
Arpanet
ArpanetArpanet
Arpanet
Rthompson2
 
Networking
NetworkingNetworking
Networking
kameeradissanayake
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
calix_ricia
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
Brain Young
 
Gov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and CodeGov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and Code
Christina Gagnier
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundaments
chungmd
 
Anoop vijayan
Anoop vijayanAnoop vijayan
Anoop vijayan
anoop vijayan
 
Session 2
Session 2Session 2
Krishna
KrishnaKrishna
Krishna
pujaGoswami
 

What's hot (19)

Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
Rutgers - RUCS Internet
Rutgers - RUCS InternetRutgers - RUCS Internet
Rutgers - RUCS Internet
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to Internet
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Internet
InternetInternet
Internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Pervasive nation
Pervasive nationPervasive nation
Pervasive nation
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Arpanet
ArpanetArpanet
Arpanet
 
Networking
NetworkingNetworking
Networking
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Gov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and CodeGov 20 LA Presentation - Sex Drugs Rock and Code
Gov 20 LA Presentation - Sex Drugs Rock and Code
 
Web Fundaments
Web FundamentsWeb Fundaments
Web Fundaments
 
Anoop vijayan
Anoop vijayanAnoop vijayan
Anoop vijayan
 
Session 2
Session 2Session 2
Session 2
 
Krishna
KrishnaKrishna
Krishna
 

Viewers also liked

Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
mBlackwell
 
E Mail Terms Powerpoint
E Mail Terms PowerpointE Mail Terms Powerpoint
E Mail Terms Powerpoint
mBlackwell
 
Esthec
EsthecEsthec
Esthec
michelvdspek
 
Inside A Computer
Inside A ComputerInside A Computer
Inside A Computer
mBlackwell
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
mBlackwell
 
Gutarras
GutarrasGutarras
Gutarras
Mayorgare
 
Copyright Slideshow
Copyright SlideshowCopyright Slideshow
Copyright Slideshow
mBlackwell
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
mBlackwell
 
Inside A Computer Workstation
Inside A Computer WorkstationInside A Computer Workstation
Inside A Computer Workstation
mBlackwell
 
First Time Home Buyer Seminar
First Time Home Buyer SeminarFirst Time Home Buyer Seminar
First Time Home Buyer Seminar
poo1shark8
 
Effective and engaging learning
Effective and engaging learningEffective and engaging learning
Effective and engaging learning
Colin Campbell
 
Effective and engaging learning
Effective and engaging learningEffective and engaging learning
Effective and engaging learning
Colin Campbell
 
Flickr Presentation
Flickr PresentationFlickr Presentation
Flickr Presentationfishmella
 
flickr presentatsioon
flickr presentatsioonflickr presentatsioon
flickr presentatsioonfishmella
 
Sun Rise And Sun Set In Hong Kong
Sun Rise And Sun Set In Hong KongSun Rise And Sun Set In Hong Kong
Sun Rise And Sun Set In Hong KongPiyoosh Tripathi
 

Viewers also liked (16)

Types Of Computer Systems
Types Of Computer SystemsTypes Of Computer Systems
Types Of Computer Systems
 
E Mail Terms Powerpoint
E Mail Terms PowerpointE Mail Terms Powerpoint
E Mail Terms Powerpoint
 
Esthec
EsthecEsthec
Esthec
 
Inside A Computer
Inside A ComputerInside A Computer
Inside A Computer
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
Gutarras
GutarrasGutarras
Gutarras
 
Copyright Slideshow
Copyright SlideshowCopyright Slideshow
Copyright Slideshow
 
Code Red Virus
Code Red VirusCode Red Virus
Code Red Virus
 
Inside A Computer Workstation
Inside A Computer WorkstationInside A Computer Workstation
Inside A Computer Workstation
 
First Time Home Buyer Seminar
First Time Home Buyer SeminarFirst Time Home Buyer Seminar
First Time Home Buyer Seminar
 
Effective and engaging learning
Effective and engaging learningEffective and engaging learning
Effective and engaging learning
 
Effective and engaging learning
Effective and engaging learningEffective and engaging learning
Effective and engaging learning
 
Flickr Presentation
Flickr PresentationFlickr Presentation
Flickr Presentation
 
flickr presentatsioon
flickr presentatsioonflickr presentatsioon
flickr presentatsioon
 
Sun Rise And Sun Set In Hong Kong
Sun Rise And Sun Set In Hong KongSun Rise And Sun Set In Hong Kong
Sun Rise And Sun Set In Hong Kong
 
Carpe Diem
Carpe DiemCarpe Diem
Carpe Diem
 

Similar to Other Powerpoinnt

Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
jpatetta
 
Arpanet
ArpanetArpanet
Arpanet
jhartsfield
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshow
smithj12
 
Communication 2
Communication 2Communication 2
Communication 2
KZCheng
 
Comppt22
Comppt22Comppt22
Comppt22
Deliad
 
Comppt2
Comppt2Comppt2
Comppt2
Dyern
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
madisonhall
 
Introduction internet by abhay
Introduction internet by abhayIntroduction internet by abhay
Introduction internet by abhay
Abhay Goyal
 
Internet
InternetInternet
Internet
Naman Goel
 
Internet
InternetInternet
Internet
Naman Goel
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
Brain Young
 
Internet
InternetInternet
Internet
Naman Goel
 
Computer Apps 1 Slide Show
Computer Apps 1 Slide ShowComputer Apps 1 Slide Show
Computer Apps 1 Slide Show
Josh Mathew
 
Arpanet
ArpanetArpanet
Arpanet
faustynj
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
Arpit Suthar
 
INTERNET
INTERNETINTERNET
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
Megan Hoerauf
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
kevpatel
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
bartholomeocoombs
 
Wiretapping
WiretappingWiretapping
Wiretapping
Mr Cracker
 

Similar to Other Powerpoinnt (20)

Electronic Communications
Electronic CommunicationsElectronic Communications
Electronic Communications
 
Arpanet
ArpanetArpanet
Arpanet
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshow
 
Communication 2
Communication 2Communication 2
Communication 2
 
Comppt22
Comppt22Comppt22
Comppt22
 
Comppt2
Comppt2Comppt2
Comppt2
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Introduction internet by abhay
Introduction internet by abhayIntroduction internet by abhay
Introduction internet by abhay
 
Internet
InternetInternet
Internet
 
Internet
InternetInternet
Internet
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 
Internet
InternetInternet
Internet
 
Computer Apps 1 Slide Show
Computer Apps 1 Slide ShowComputer Apps 1 Slide Show
Computer Apps 1 Slide Show
 
Arpanet
ArpanetArpanet
Arpanet
 
Packet sniffing in LAN
Packet sniffing in LANPacket sniffing in LAN
Packet sniffing in LAN
 
INTERNET
INTERNETINTERNET
INTERNET
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
 
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docxChapter 14Internet Services and EmailChapter 14 Overview.docx
Chapter 14Internet Services and EmailChapter 14 Overview.docx
 
Wiretapping
WiretappingWiretapping
Wiretapping
 

Recently uploaded

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

Other Powerpoinnt

  • 1. ARPANET: The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense, was the predecessor of the modern-day Internet.
  • 2. Hard vs. Soft Bounce  Hard Bounce- the failed delivery of an email due to a permanent reason like a non-existent address  Soft Bounce- an email message that gets bounced back because the recipient’s inbox is full
  • 3. Computer Spam Computer spam is unwanted and unsolicited email advertisements or messages
  • 4. Internet vs. Intranet  Internet: an electronic communication network that connects computer networks around the world  Intranet: private computer network with a firewall; business
  • 5. POP POP: Post Office Protocol, a protocol used to retrieve email from a mail server
  • 6. Phishing The act of sending an email to a user falsely claiming to be an established legitimate business is an attempt to scam the users into surrendering private information that will be used for identity theft.
  • 7. Encryption and Decryption  Encryption: scrambling of info for security purposes to be sent across the Internet  Decryption: descrambling of info for security purposes that has been sent across the Internet
  • 8. Netiquette Netiquette: guidelines for posting messages to other services and Internet newsgroups.  Netiquette is important because it not only covers rules to maintain civility in discussion, but also special guidelines unique to the electronic nature of forum messages
  • 9. Router A device that forwards data packets along networks. A router connected to at least two networks. Routers are located at gateways, the places where two or more networks connect.