SlideShare una empresa de Scribd logo
1 de 9
Dilasha Shrestha 4 th  block ARPANET (Advanced Research Projects Agency Network )   advanced research project agency network developed by ARPA of the United States Department Of Defense during the Cold War, was the world’s first operational packet switching network, and the predecessor of the Global Internet.
Hard & Soft Bounce ,[object Object],[object Object]
Computer Spam ,[object Object],[object Object]
Internet & Intranet ,[object Object],[object Object]
POP ,[object Object],[object Object]
Phishing ,[object Object]
Encryption & Decryption ,[object Object],[object Object]
Netiquette ,[object Object]
Router ,[object Object]

Más contenido relacionado

La actualidad más candente

Introduction internet by abhay
Introduction internet by abhayIntroduction internet by abhay
Introduction internet by abhayAbhay Goyal
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatemadisonhall
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to InternetChinmay Raul
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internetsameera.moparty
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinatorMarivic Manlagnit
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamentalVTC_NeilaSofien
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other PowerpoinntmBlackwell
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateBrain Young
 
The internet homework
The internet homeworkThe internet homework
The internet homeworkkta2701
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2kevpatel
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetASIT Education
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetAnish Thomas
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetPallavi Gupte
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatelockyerj
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 

La actualidad más candente (18)

Introduction internet by abhay
Introduction internet by abhayIntroduction internet by abhay
Introduction internet by abhay
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to Internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
The internet homework
The internet homeworkThe internet homework
The internet homework
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 

Similar a slideshow 2

Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other PowerpoinntmBlackwell
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication InvestigateBrain Young
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhMary-Jo Apigo
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfMr. Moms
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshowsmithj12
 
Comppt22
Comppt22Comppt22
Comppt22Deliad
 
Comppt2
Comppt2Comppt2
Comppt2Dyern
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it worksshahnaz10
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirIntro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirUniversity of Education
 
1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptx1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptxVijalJain3
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 courseAbdirisakIman
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatesarah s
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraAmit Chandra
 

Similar a slideshow 2 (20)

Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 
Fa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singhFa13 7718-ch7 9-singh
Fa13 7718-ch7 9-singh
 
NPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdfNPTL - Ethical Hacking by Madhur Jatiya.pdf
NPTL - Ethical Hacking by Madhur Jatiya.pdf
 
Comm Slideshow
Comm SlideshowComm Slideshow
Comm Slideshow
 
Comppt22
Comppt22Comppt22
Comppt22
 
Comppt2
Comppt2Comppt2
Comppt2
 
Internet an how it works
Internet an how it worksInternet an how it works
Internet an how it works
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakirIntro. to internet architecture& protocol by zubair yaseen&yameen shakir
Intro. to internet architecture& protocol by zubair yaseen&yameen shakir
 
week1ppt-130915060231-phpapp02.pdf
week1ppt-130915060231-phpapp02.pdfweek1ppt-130915060231-phpapp02.pdf
week1ppt-130915060231-phpapp02.pdf
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptx1. Introduction to Cyber Security.pptx
1. Introduction to Cyber Security.pptx
 
Note1
Note1Note1
Note1
 
Networks
NetworksNetworks
Networks
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 course
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
GSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit ChandraGSBA - IT Orientation Program by Prof. Amit Chandra
GSBA - IT Orientation Program by Prof. Amit Chandra
 

Último

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Último (20)

DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

slideshow 2

  • 1. Dilasha Shrestha 4 th block ARPANET (Advanced Research Projects Agency Network ) advanced research project agency network developed by ARPA of the United States Department Of Defense during the Cold War, was the world’s first operational packet switching network, and the predecessor of the Global Internet.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.