SlideShare una empresa de Scribd logo
1 de 9
ARPANET stands for Advanced Research

    Projects Agency Network which is the world's
    first operational packet switching network,
    and the predecessor of the global Internet.
Hard bounce is an email message that has

    been returned to the sender and is
    permanently undeliverable.
    Soft bounce is an email message that gets as

    far as the recipient's mail server (it recognizes
    the address) but is bounced back undelivered
    before it gets to the intended recipient.
 Computer Spam is electronic
 junk mail or junk newsgroup
 postings. Sometimes carry
 viruses.
Internet is a global network connecting

    millions of computers.
    Intranet is a network based on TCP/IP

    protocols (an internet) belonging to an
    organization, usually a corporation,
    accessible only by the organization's
    members, employees, or others with
    authorization.
 POP (Post Office Protocol) is
 used to retrieve e-mail from a
 mail server.
 Phishing is the act of sending an e-
 mail to a user falsely claiming to be
 an established legitimate enterprise
 in an attempt to scam the user into
 surrendering private information
 that will be used for identity theft.
 Encryption is the translation of
  data into a secret code.
 Decryption is the process of
  decoding data that has been
  encrypted into a secret format.
 Netiquette is the manner in which
  you act on the internet.
 It is important because your
  reputation will be affected based
  upon how people see your
  netiquette.
 A router is a device that
 forwards data packets along
 networks.

Más contenido relacionado

La actualidad más candente

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatelockyerj
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinatorMarivic Manlagnit
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateBrain Young
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication InvestigateMegan Hoerauf
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internetsameera.moparty
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation DowningIWCS
 
The internet homework
The internet homeworkThe internet homework
The internet homeworkkta2701
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet FundamentalPrithvi Raj M
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network. PushpendraSingh483
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranetcalix_ricia
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to InternetChinmay Raul
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2dlombana
 
Electronic Communication 2a
Electronic Communication 2aElectronic Communication 2a
Electronic Communication 2aparkera
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSbadri narayan
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network TutorialBOXLIGHT Inc
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-markgernale24
 
Networking And Internet
Networking And InternetNetworking And Internet
Networking And Internetsusantai89
 

La actualidad más candente (20)

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Network Internet Presentation Downing
Network Internet Presentation DowningNetwork Internet Presentation Downing
Network Internet Presentation Downing
 
The internet homework
The internet homeworkThe internet homework
The internet homework
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet Fundamental
 
Fundamental Of Computer Network.
Fundamental Of Computer Network. Fundamental Of Computer Network.
Fundamental Of Computer Network.
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
An Introduction to Internet
An Introduction to InternetAn Introduction to Internet
An Introduction to Internet
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
 
Electronic Communication 2a
Electronic Communication 2aElectronic Communication 2a
Electronic Communication 2a
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Ways to-access-inetrnet-
Ways to-access-inetrnet-Ways to-access-inetrnet-
Ways to-access-inetrnet-
 
Networking and internet
Networking and internetNetworking and internet
Networking and internet
 
Networking And Internet
Networking And InternetNetworking And Internet
Networking And Internet
 
Internet
InternetInternet
Internet
 

Destacado

PresentacióN Powerpoint 2003
PresentacióN Powerpoint 2003PresentacióN Powerpoint 2003
PresentacióN Powerpoint 2003baoca
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)AndrewRJamieson
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systemsRaghav S
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security Malachi Jones
 
An entire concept of embedded systems entire ppt
An entire concept of embedded systems entire pptAn entire concept of embedded systems entire ppt
An entire concept of embedded systems entire pptPrabhakar Captain
 

Destacado (8)

PresentacióN Powerpoint 2003
PresentacióN Powerpoint 2003PresentacióN Powerpoint 2003
PresentacióN Powerpoint 2003
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
An entire concept of embedded systems entire ppt
An entire concept of embedded systems entire pptAn entire concept of embedded systems entire ppt
An entire concept of embedded systems entire ppt
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
Secure Embedded Systems
Secure Embedded SystemsSecure Embedded Systems
Secure Embedded Systems
 

Similar a ARPANET, email bounces, spam, internet, intranet, POP, phishing, encryption, netiquette, routers

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatesarah s
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication InvestigateBrain Young
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2kevpatel
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other PowerpoinntmBlackwell
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other PowerpoinntmBlackwell
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacksApijay Kumar
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway LessonBuffalo Seminary
 
Comppt2
Comppt2Comppt2
Comppt2Dyern
 
Comppt22
Comppt22Comppt22
Comppt22Deliad
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 courseAbdirisakIman
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...Sijuna Aetta
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigatemadisonhall
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internetTallat Satti
 
Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Internet architecture
Internet architectureInternet architecture
Internet architectureNaman Rastogi
 

Similar a ARPANET, email bounces, spam, internet, intranet, POP, phishing, encryption, netiquette, routers (20)

Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
Other Powerpoinnt
Other PowerpoinntOther Powerpoinnt
Other Powerpoinnt
 
week1ppt-130915060231-phpapp02.pdf
week1ppt-130915060231-phpapp02.pdfweek1ppt-130915060231-phpapp02.pdf
week1ppt-130915060231-phpapp02.pdf
 
Introduction to Internet
Introduction to Internet Introduction to Internet
Introduction to Internet
 
Introduction to Internet
Introduction to InternetIntroduction to Internet
Introduction to Internet
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
09 The Information Super Highway Lesson
09 The Information Super Highway Lesson09 The Information Super Highway Lesson
09 The Information Super Highway Lesson
 
Comppt2
Comppt2Comppt2
Comppt2
 
Comppt22
Comppt22Comppt22
Comppt22
 
Access and use of internet of level 1 course
Access and use of internet of level 1 courseAccess and use of internet of level 1 course
Access and use of internet of level 1 course
 
Basics about Internet ...
Basics about Internet                                                        ...Basics about Internet                                                        ...
Basics about Internet ...
 
what_is_internet.pptx
what_is_internet.pptxwhat_is_internet.pptx
what_is_internet.pptx
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
History of Internet and advantages of internet
History of Internet and advantages of internetHistory of Internet and advantages of internet
History of Internet and advantages of internet
 
Computing safety
Computing safetyComputing safety
Computing safety
 
Internet architecture
Internet architectureInternet architecture
Internet architecture
 
Internet security
Internet securityInternet security
Internet security
 

Último

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Último (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

ARPANET, email bounces, spam, internet, intranet, POP, phishing, encryption, netiquette, routers

  • 1. ARPANET stands for Advanced Research  Projects Agency Network which is the world's first operational packet switching network, and the predecessor of the global Internet.
  • 2. Hard bounce is an email message that has  been returned to the sender and is permanently undeliverable. Soft bounce is an email message that gets as  far as the recipient's mail server (it recognizes the address) but is bounced back undelivered before it gets to the intended recipient.
  • 3.  Computer Spam is electronic junk mail or junk newsgroup postings. Sometimes carry viruses.
  • 4. Internet is a global network connecting  millions of computers. Intranet is a network based on TCP/IP  protocols (an internet) belonging to an organization, usually a corporation, accessible only by the organization's members, employees, or others with authorization.
  • 5.  POP (Post Office Protocol) is used to retrieve e-mail from a mail server.
  • 6.  Phishing is the act of sending an e- mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft.
  • 7.  Encryption is the translation of data into a secret code.  Decryption is the process of decoding data that has been encrypted into a secret format.
  • 8.  Netiquette is the manner in which you act on the internet.  It is important because your reputation will be affected based upon how people see your netiquette.
  • 9.  A router is a device that forwards data packets along networks.