Electronic Communication 2

9
Ebonie Rowell 3/6/09 Blcok-3 ARPANET The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.

Transcript of Electronic Communication 2

Page 1: Electronic Communication 2

Ebonie Rowell3/6/09Blcok-3

ARPANET

The ARPANET (Advanced Research Projects Agency Network) developed by ARPA of the United States Department of Defense during the Cold War, was the world's first operational packet switching network, and the predecessor of the global Internet.

Page 2: Electronic Communication 2

What is the Difference between a Hard and Soft

Bounce? A hard bounce is an e-mail message that has been returned to the sender because the recipient's address is invalid. A hard bounce might occur because the domain name doesn't exist or because the recipient is unknown.

A soft bounce is an e-mail message that gets as far as the recipient's mail server but is bounced back undelivered before it gets to the intended recipient. A soft bounce might occur because the recipient's inbox is full.

Page 3: Electronic Communication 2

Computer Spam

E-mail spam, also known as junk e-mail, is a subset of spam that involves nearly identical messages sent to numerous recipients by e-mail.

Page 4: Electronic Communication 2

What is the Difference Between

Internet and Intranet?

The Internet is a global network of interconnected computers, enabling users to share information along multiple channels. An intranet is a private computer network that uses Internet technologies to securely share any part of an organization's information or operational systems with its employees.

Page 5: Electronic Communication 2

What is POP Used For?Post Office Protocol version is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection.

Page 6: Electronic Communication 2

Phishing

Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

Page 7: Electronic Communication 2

What is Encryption and Decryption?

Encryption is the scrambling of information for security purposes to be sent across the internet. Decryption is the descrambling of information for security purposes that has been sent across the internet.

Page 8: Electronic Communication 2

Netiquette

Netiquette is a set of guidelines for posting messages to online services, and internet newsgroups. Netiquette covers not only rules to maintain civility in discussions, but also special guidelines unique to the electronic nature of forum messages.

Page 9: Electronic Communication 2

Router

A router is a device that forwards data packets along networks. A router is connected to at least two networks, commonly two LAN’s or WAN’s or a LAN and its ISP’s network. Routers are located at gateway, the place where two or more networks connect