ARPANET-ADVANCED RESEARCHED PROJECTS AGENCY NETWORK DEVOLVED DEVELOPED BY THE US DEPARTMENT OF DEFENSE DURING THE COLD WAR Electronic Communication Part 2 By: Ashley Parker
Bounce Hard bounce is when the email fails to send on error of the sender A soft bounce is an error on the recipient’s part
Spam Spam is junk mail that is a hassle to delete and many email services have a junk folder to help block spam
Internet vs. Intranet The internet is public service while intranet would be within a company with firewall
POP Point-to-Point Tunneling Protocol  (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption
Phishing This is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Encryption & Decryption Encryption-the activity of converting data or information into code  Decryption-the activity of making clear or converting from code into plain text; "a secret key or password is required for decryption
Netiquette The rules of etiquette that apply when communicating over computer networks, esp. the Internet. It is important so that all people on the web are treated with respect.
Router A router is a device which forwards packets between networks. The forwarding decision is based on network layer information and routing tables, often constructed by routing protocols.

More Related Content

PPT
Comppt2
PPT
Comppt22
PPTX
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
PPT
Electronic Communication Investigate
PPTX
Other Powerpoinnt
PPT
Electronic Communication 2
PPT
Electronic Communications 2
PPTX
Arpanet
Comppt2
Comppt22
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
Electronic Communication Investigate
Other Powerpoinnt
Electronic Communication 2
Electronic Communications 2
Arpanet

What's hot (19)

PPT
Rutgers - RUCS Internet
PPT
Arpanet
PPTX
Electronic Communication Investigate
PPT
slideshow 2
PPTX
Internet and intranet
PPT
Arpanet
PPTX
Introduction to Internet
PPT
Difference Between Intranet And Extranet
PPSX
H1N1 & IT Continuity
PPTX
Computer Apps 1 Slide Show
PPT
Electronic Communication Investigate
PPT
Com Slideshow 2
PPTX
Networks
PDF
Telephony DNS
PPT
Introduction to Internet
PPT
Electronic Communication Investigate
PDF
How High-speed Dial-up Works
PPS
An Introduction to Internet
PPT
Bryanpulido
Rutgers - RUCS Internet
Arpanet
Electronic Communication Investigate
slideshow 2
Internet and intranet
Arpanet
Introduction to Internet
Difference Between Intranet And Extranet
H1N1 & IT Continuity
Computer Apps 1 Slide Show
Electronic Communication Investigate
Com Slideshow 2
Networks
Telephony DNS
Introduction to Internet
Electronic Communication Investigate
How High-speed Dial-up Works
An Introduction to Internet
Bryanpulido
Ad

Viewers also liked (20)

PPT
Viruses, Biometrics, & Encryption
PDF
Wealth Apprentice Profile
PDF
4 rose screenhits
PPTX
Hot Air Balloons
PDF
NewSchoolLeader.com First year Principal Hurdles
PPTX
1 sarah aa 24 may13
PPT
2 jenny women in angel investing
PPTX
Maria Dramalioti-Taylor's Rules for Entrenpreneurs
PPT
Pyramid Of Intervention
PPTX
SLLA EXAM Passed! Top 5 Interviewing Tips!
PDF
1789 1800
PDF
Volume 2-issue-6-2148-2154
PDF
PDF
Ijarcet vol-2-issue-7-2292-2296
PDF
PDF
1816 1819
PDF
ArtíCulo Sobre Carmen Cerdeira
PDF
1829 1833
PDF
1766 1770
PDF
Viruses, Biometrics, & Encryption
Wealth Apprentice Profile
4 rose screenhits
Hot Air Balloons
NewSchoolLeader.com First year Principal Hurdles
1 sarah aa 24 may13
2 jenny women in angel investing
Maria Dramalioti-Taylor's Rules for Entrenpreneurs
Pyramid Of Intervention
SLLA EXAM Passed! Top 5 Interviewing Tips!
1789 1800
Volume 2-issue-6-2148-2154
Ijarcet vol-2-issue-7-2292-2296
1816 1819
ArtíCulo Sobre Carmen Cerdeira
1829 1833
1766 1770
Ad

Similar to Electronic Communication 2a (20)

PPTX
Arpanet
PPT
Electronic Communication Investigate
PPTX
Other Powerpoinnt
PPT
Comm Slideshow
PPT
Electronic Communications
PPT
Electronic Communication Investigate
PPT
Communication 2
PDF
Anonymizing Networks
PPT
E Mail Ppt 2
PDF
IR-Optimising-Your-Network.pdf
DOCX
Firewall configuration
PPTX
Secured Data Transmission
PPS
Protocol & Type of Networks
PPTX
Virtual private networks (vpn)
PDF
Group3
DOCX
Individual CommentsYour answers missed there below topics, sp.docx
PDF
TCP/IP PRESENTATION BY SHARMILA FALLER FOR INFORMATION SYSTEM
PPT
Ip address
PPT
VPN by Amin Pathan
PPTX
Resource Guid
Arpanet
Electronic Communication Investigate
Other Powerpoinnt
Comm Slideshow
Electronic Communications
Electronic Communication Investigate
Communication 2
Anonymizing Networks
E Mail Ppt 2
IR-Optimising-Your-Network.pdf
Firewall configuration
Secured Data Transmission
Protocol & Type of Networks
Virtual private networks (vpn)
Group3
Individual CommentsYour answers missed there below topics, sp.docx
TCP/IP PRESENTATION BY SHARMILA FALLER FOR INFORMATION SYSTEM
Ip address
VPN by Amin Pathan
Resource Guid

Recently uploaded (20)

PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
STKI Israel Market Study 2025 version august
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPTX
Microsoft Excel 365/2024 Beginner's training
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
Chapter 5: Probability Theory and Statistics
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
Geologic Time for studying geology for geologist
PDF
Comparative analysis of machine learning models for fake news detection in so...
PPTX
Configure Apache Mutual Authentication
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
NewMind AI Weekly Chronicles – August ’25 Week III
STKI Israel Market Study 2025 version august
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Consumable AI The What, Why & How for Small Teams.pdf
Zenith AI: Advanced Artificial Intelligence
sustainability-14-14877-v2.pddhzftheheeeee
UiPath Agentic Automation session 1: RPA to Agents
Custom Battery Pack Design Considerations for Performance and Safety
Improvisation in detection of pomegranate leaf disease using transfer learni...
Microsoft Excel 365/2024 Beginner's training
Module 1.ppt Iot fundamentals and Architecture
Chapter 5: Probability Theory and Statistics
Final SEM Unit 1 for mit wpu at pune .pptx
Geologic Time for studying geology for geologist
Comparative analysis of machine learning models for fake news detection in so...
Configure Apache Mutual Authentication
Flame analysis and combustion estimation using large language and vision assi...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The influence of sentiment analysis in enhancing early warning system model f...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...

Electronic Communication 2a

  • 1. ARPANET-ADVANCED RESEARCHED PROJECTS AGENCY NETWORK DEVOLVED DEVELOPED BY THE US DEPARTMENT OF DEFENSE DURING THE COLD WAR Electronic Communication Part 2 By: Ashley Parker
  • 2. Bounce Hard bounce is when the email fails to send on error of the sender A soft bounce is an error on the recipient’s part
  • 3. Spam Spam is junk mail that is a hassle to delete and many email services have a junk folder to help block spam
  • 4. Internet vs. Intranet The internet is public service while intranet would be within a company with firewall
  • 5. POP Point-to-Point Tunneling Protocol (PPTP) is a method for implementing virtual private networks. PPTP does not provide confidentiality or encryption
  • 6. Phishing This is the process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
  • 7. Encryption & Decryption Encryption-the activity of converting data or information into code  Decryption-the activity of making clear or converting from code into plain text; "a secret key or password is required for decryption
  • 8. Netiquette The rules of etiquette that apply when communicating over computer networks, esp. the Internet. It is important so that all people on the web are treated with respect.
  • 9. Router A router is a device which forwards packets between networks. The forwarding decision is based on network layer information and routing tables, often constructed by routing protocols.