electronic communication investigate

10

Upload: sarah-s

Post on 26-May-2015

207 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Electronic Communication Investigate
Page 2: Electronic Communication Investigate

Advanced research projects agency network

Page 3: Electronic Communication Investigate

Hard Bounce- a hard bounce is the failed delivery of an email due to a permanent reason like a non- existent address

Soft Bounce- undelivered before it gets bounced back

Page 4: Electronic Communication Investigate

Computer spam is junk mail and sometimes carries virus’s.

Page 5: Electronic Communication Investigate

The internet is open to the public so anyone can view it. The Intranet is private, so only certain users can see it.

Page 6: Electronic Communication Investigate

Post Office Protocol Used to retrieve email from a server Most email servers use this.

Page 7: Electronic Communication Investigate

The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise webopedia.com

Page 8: Electronic Communication Investigate

The translation of data into a secret code. Encryption is the most effective way to achieve data security. Webopedia.com

The process of decoding data that has been encrypted into a secret format. Decryption requires a secret key or password webopedia.com

Page 9: Electronic Communication Investigate

Contraction of Internet etiquette, the etiquette guidelines for posting messages to online services, and particularly Internet newsgroups.

It is important because it is the language you use on the computer

Page 10: Electronic Communication Investigate

The router is really important because it is what connects you to the internet! Without it you might not be able to use it. It can be your own personal network.