(3 9 09) electronic communication investigate, slideshare slideshow
DESCRIPTION
Jordan Chaires P.4.TRANSCRIPT
![Page 1: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/1.jpg)
Jordan Chaires Block 4
ARPANET stands for Advanced Research Projects Agency Network which is the world's first operational packet switching network, and the predecessor of the global Internet.
![Page 2: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/2.jpg)
Hard and Soft Bounce
Hard bounce is an email message that has been returned to the sender and is permanently undeliverable.
Soft bounce is an email message that gets as far as the recipient's mail server (it recognizes the address) but is bounced back undelivered before it gets to the intended recipient.
![Page 3: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/3.jpg)
Computer Spam
Computer Spam is electronic junk mail or junk newsgroup postings. Sometimes carry viruses.
![Page 4: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/4.jpg)
Internet VS. Intranet
Internet is a global network connecting millions of computers.
Intranet is a network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization.
![Page 5: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/5.jpg)
POP
POP (Post Office Protocol) is used to retrieve e-mail from a mail server.
![Page 6: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/6.jpg)
Phishing
Phishing is the act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
![Page 7: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/7.jpg)
Encryption and DecryptionEncryption is the translation of data into a secret code.
Decryption is the process of decoding data that has been encrypted into a secret format.
![Page 8: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/8.jpg)
Netiquette
Netiquette is the manner in which you act on the internet.
It is important because your reputation will be affected based upon how people see your netiquette.
![Page 9: (3 9 09) Electronic Communication Investigate, Slideshare Slideshow](https://reader036.vdocument.in/reader036/viewer/2022083002/558d2e6cd8b42a86198b4586/html5/thumbnails/9.jpg)
Router
A router is a device that forwards data packets along networks.