1. The ARPANET (Advanced Research Projects Agency Network) developed by ARPA
of the United States Department of Defense during the Cold War, was the world's
first operational packet switching network, and the predecessor of the global
Internet
James Hartsfield
2nd
2. Hard & Soft Bounce
• A soft bounce is an email message that gets as far as the recipient's mail server (it recognizes
the address) but is bounced back undelivered before it gets to the intended recipient.
• A hard bounce is an email message that has been returned to the sender and is permanently
undeliverable.
4. Internet & Intranet
• The Internet is an open public space
• An Intranet is designed to be a private space
5. POP
• In computing, the Post Office Protocol version 3
(POP3) is an application-layer Internet standard
protocol used by local e-mail clients to retrieve e-
mail from a remote server over a TCP/IP connection.
6. Phishing
• In the field of computer security, phishing is the criminally
fraudulent process of attempting to acquire sensitive
information such as usernames, passwords and credit card
details by masquerading as a trustworthy entity in an
electronic communication.
7. Encryption & Decryption
• In cryptography, encryption is the process of transforming information as using an
algorithm to make it unreadable to anyone except those possessing special
knowledge, usually referred to as a key.
• The process of decoding data that has been encrypted into a secret format.
Decryption requires a secret key or password.
8. Netiquette
• Netiquette, a portmanteau of quot;network etiquettequot;, is a set of social conventions
that facilitate interaction over networks, ranging from Usenet and mailing lists to
blogs and forums.
9. Router
• A router is a networking device whose software and hardware are usually
tailored to the tasks of routing and forwarding information.