SlideShare a Scribd company logo
ARPANET advanced research projects agency network developed by US Dept of Defense during the Cold War, was the world’s first operational packet switching network, and predecessor of the internet
Hard Bounce- failed delivery of an email due to a permanent reason like a non existent address Soft Bounce- an email that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. This might occur because the recipient’s mail box is full.
Spam unwanted and unsolicited email advertisements or messages
Internet- an electronic communications network that connects computer networks around the world
POP POP is a standard protocol used by email clients to retrieve mail from servers.
Phishing Phishing is the process of attempting to get sensitive information from a user such as credit cards or passwords.  Phishers usually use sites similar looking to MySpace and other such websites for this.
Encryption and Decryption Encryption is the process of scrambling a message, to make it more secure while it crosses the internet. Decryption is when the message is unscrambled to make it readable for the receiver. Encryption makes it much less likely your sensitive information will be stolen or intercepted.
Netiquette Netiquette is using etiquette on the internet such as NOT SHOUTING and scrolling.
Router A Router is a networking device whose software and hardware are usually designed to the tasks of routing and forwarding information. It is usually used on the internet.

More Related Content

PPT
Arpanet
PPT
slideshow 2
PPT
Communication 2
PPT
Electronic Communication Investigate
PPT
E Mail Ppt 2
PPT
Electronic Communication 2
PPTX
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
PPT
Electronic Communication Investigate
Arpanet
slideshow 2
Communication 2
Electronic Communication Investigate
E Mail Ppt 2
Electronic Communication 2
(3 9 09) Electronic Communication Investigate, Slideshare Slideshow
Electronic Communication Investigate

What's hot (18)

PPTX
Internet
PPTX
Other Powerpoinnt
PPTX
The Internet
PPT
Introduction to Internet
PPTX
Introduction to internet
PPT
Rutgers - RUCS Internet
PPTX
Introduction internet by abhay
PPT
Electronic Communication Investigate
PPT
Electronic Communications 2
PPT
Internet
PPTX
Presentation12
PPTX
Service provided by internet
PPT
Ch2 presenting the internet.
PPTX
internet and its services
PPTX
How Internet Works
PPTX
Computer and application
PPTX
Network and internet fundamental
PPT
How Internet Works
Internet
Other Powerpoinnt
The Internet
Introduction to Internet
Introduction to internet
Rutgers - RUCS Internet
Introduction internet by abhay
Electronic Communication Investigate
Electronic Communications 2
Internet
Presentation12
Service provided by internet
Ch2 presenting the internet.
internet and its services
How Internet Works
Computer and application
Network and internet fundamental
How Internet Works
Ad

Viewers also liked (7)

PPT
Communication Slideshow 1
PPT
Seach Slideshow
PPTX
1.5 portable communication devices
PPTX
Communication devices
PPTX
Lecture 3 network communication media and devices
PPT
Communication System Devices
PPTX
Communication & network devices
Communication Slideshow 1
Seach Slideshow
1.5 portable communication devices
Communication devices
Lecture 3 network communication media and devices
Communication System Devices
Communication & network devices
Ad

Similar to Com Slideshow 2 (20)

PPT
Comm Slideshow
PPT
Electronic Communications
PPTX
Other Powerpoinnt
PPTX
Arpanet
PPT
Electronic Communication Investigate
PPT
Comppt2
PPT
Comppt22
PPT
Electronic Communication 2a
PPT
Electronic Communication Investigate
PDF
Email security presentation
PPTX
Computer Apps 1 Slide Show
PDF
Email security
DOCX
Chapter 14Internet Services and EmailChapter 14 Overview.docx
PPTX
Internet an how it works
PPT
Network Security Chapter 7
PPTX
Electronic Communication Investigate
PPTX
Access and use of internet of level 1 course
PPT
E-mail and Encryption
PPTX
Wiretapping
Comm Slideshow
Electronic Communications
Other Powerpoinnt
Arpanet
Electronic Communication Investigate
Comppt2
Comppt22
Electronic Communication 2a
Electronic Communication Investigate
Email security presentation
Computer Apps 1 Slide Show
Email security
Chapter 14Internet Services and EmailChapter 14 Overview.docx
Internet an how it works
Network Security Chapter 7
Electronic Communication Investigate
Access and use of internet of level 1 course
E-mail and Encryption
Wiretapping

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
1. Introduction to Computer Programming.pptx
PDF
project resource management chapter-09.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Encapsulation theory and applications.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Getting Started with Data Integration: FME Form 101
Tartificialntelligence_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
1 - Historical Antecedents, Social Consideration.pdf
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Enhancing emotion recognition model for a student engagement use case through...
1. Introduction to Computer Programming.pptx
project resource management chapter-09.pdf
Unlocking AI with Model Context Protocol (MCP)
Encapsulation theory and applications.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Programs and apps: productivity, graphics, security and other tools
OMC Textile Division Presentation 2021.pptx
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
A comparative study of natural language inference in Swahili using monolingua...
Getting Started with Data Integration: FME Form 101

Com Slideshow 2

  • 1. ARPANET advanced research projects agency network developed by US Dept of Defense during the Cold War, was the world’s first operational packet switching network, and predecessor of the internet
  • 2. Hard Bounce- failed delivery of an email due to a permanent reason like a non existent address Soft Bounce- an email that gets as far as the recipients mail server but is bounced back undelivered before it gets to the intended recipient. This might occur because the recipient’s mail box is full.
  • 3. Spam unwanted and unsolicited email advertisements or messages
  • 4. Internet- an electronic communications network that connects computer networks around the world
  • 5. POP POP is a standard protocol used by email clients to retrieve mail from servers.
  • 6. Phishing Phishing is the process of attempting to get sensitive information from a user such as credit cards or passwords. Phishers usually use sites similar looking to MySpace and other such websites for this.
  • 7. Encryption and Decryption Encryption is the process of scrambling a message, to make it more secure while it crosses the internet. Decryption is when the message is unscrambled to make it readable for the receiver. Encryption makes it much less likely your sensitive information will be stolen or intercepted.
  • 8. Netiquette Netiquette is using etiquette on the internet such as NOT SHOUTING and scrolling.
  • 9. Router A Router is a networking device whose software and hardware are usually designed to the tasks of routing and forwarding information. It is usually used on the internet.