electronic communication investigate
TRANSCRIPT
Advanced research projects agency network
Hard Bounce- a hard bounce is the failed delivery of an email due to a permanent reason like a non- existent address
Soft Bounce- undelivered before it gets bounced back
Computer spam is junk mail and sometimes carries virus’s.
The internet is open to the public so anyone can view it. The Intranet is private, so only certain users can see it.
Post Office Protocol Used to retrieve email from a server Most email servers use this.
The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise webopedia.com
The translation of data into a secret code. Encryption is the most effective way to achieve data security. Webopedia.com
The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password webopedia.com
Contraction of Internet etiquette, the etiquette guidelines for posting messages to online services, and particularly Internet newsgroups.
It is important because it is the language you use on the computer
The router is really important because it is what connects you to the internet! Without it you might not be able to use it. It can be your own personal network.