SlideShare una empresa de Scribd logo
1 de 10
ELECTRONIC COMMUNICATION INVESTIGATE Brain Young  Block4 March, 5
ARPANET ,[object Object]
HARD & SOFT BOUNCE ,[object Object],[object Object]
COMPUTER SPAM ,[object Object]
INTERNET AND INTRANET ,[object Object]
POP ,[object Object]
PHISHING ,[object Object]
ENCRYPTION AND DECRYPTION ,[object Object]
NETIQUETTE ,[object Object]
ROUTER ,[object Object]

Más contenido relacionado

La actualidad más candente

Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
Marivic Manlagnit
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
dlombana
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
madisonhall
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
calix_ricia
 
Computer Apps 1 Slide Show
Computer Apps 1 Slide ShowComputer Apps 1 Slide Show
Computer Apps 1 Slide Show
Josh Mathew
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
kevpatel
 

La actualidad más candente (16)

Internet and url by marivic s. manlagnit jmames ict coordinator
Internet and url  by  marivic s. manlagnit jmames ict coordinatorInternet and url  by  marivic s. manlagnit jmames ict coordinator
Internet and url by marivic s. manlagnit jmames ict coordinator
 
Com Slideshow 2
Com Slideshow 2Com Slideshow 2
Com Slideshow 2
 
Computer and application
Computer and applicationComputer and application
Computer and application
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Telephony DNS
Telephony DNSTelephony DNS
Telephony DNS
 
internet Fundamental
internet Fundamentalinternet Fundamental
internet Fundamental
 
The internet homework
The internet homeworkThe internet homework
The internet homework
 
Difference Between Intranet And Extranet
Difference  Between  Intranet And  ExtranetDifference  Between  Intranet And  Extranet
Difference Between Intranet And Extranet
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Computer Apps 1 Slide Show
Computer Apps 1 Slide ShowComputer Apps 1 Slide Show
Computer Apps 1 Slide Show
 
E Mail Ppt 2
E Mail Ppt 2E Mail Ppt 2
E Mail Ppt 2
 
Internet principles of operation
Internet principles of operationInternet principles of operation
Internet principles of operation
 
Internet
InternetInternet
Internet
 
Internet and intranet
Internet and  intranetInternet and  intranet
Internet and intranet
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 
INTERNET FUNDAMENTALS
INTERNET FUNDAMENTALSINTERNET FUNDAMENTALS
INTERNET FUNDAMENTALS
 

Similar a Electronic Communication Investigate

Comppt22
Comppt22Comppt22
Comppt22
Deliad
 
Comppt2
Comppt2Comppt2
Comppt2
Dyern
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
vtc-salma
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
IMRAN KHAN
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
Shaheen Khan
 
Electronic Communication 2a
Electronic Communication 2aElectronic Communication 2a
Electronic Communication 2a
parkera
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
IMRAN KHAN
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
Megan Hoerauf
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
Apijay Kumar
 

Similar a Electronic Communication Investigate (20)

Internet presentation
Internet presentationInternet presentation
Internet presentation
 
Comppt22
Comppt22Comppt22
Comppt22
 
Comppt2
Comppt2Comppt2
Comppt2
 
Network and internet fundamental
Network and internet fundamentalNetwork and internet fundamental
Network and internet fundamental
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Networking-basics
Networking-basicsNetworking-basics
Networking-basics
 
Cn file
Cn fileCn file
Cn file
 
Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)Lesson 17 fundamental of internet (88 kb)
Lesson 17 fundamental of internet (88 kb)
 
Cibm workshop2 chapter eight
Cibm  workshop2 chapter eightCibm  workshop2 chapter eight
Cibm workshop2 chapter eight
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
digital communication assignment task 1
digital communication assignment task 1 digital communication assignment task 1
digital communication assignment task 1
 
PPt on internet
PPt on internetPPt on internet
PPt on internet
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
Electronic Communication 2a
Electronic Communication 2aElectronic Communication 2a
Electronic Communication 2a
 
Lesson 6 fundamentals of internet and java programming (140 kb)
Lesson 6  fundamentals of internet and java programming (140 kb)Lesson 6  fundamentals of internet and java programming (140 kb)
Lesson 6 fundamentals of internet and java programming (140 kb)
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Electronic Communication Investigate
Electronic Communication InvestigateElectronic Communication Investigate
Electronic Communication Investigate
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Firewall
FirewallFirewall
Firewall
 
Lesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptxLesson 1. General Introduction to IT and Cyber Security.pptx
Lesson 1. General Introduction to IT and Cyber Security.pptx
 

Más de Brain Young

Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2
Brain Young
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Brain Young
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
Brain Young
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
Brain Young
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
Brain Young
 
Internet Search Slideshow, Section 1
Internet Search Slideshow, Section 1Internet Search Slideshow, Section 1
Internet Search Slideshow, Section 1
Brain Young
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
Brain Young
 

Más de Brain Young (7)

Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2Internet Slideshow Quiz, Sections 1 & 2
Internet Slideshow Quiz, Sections 1 & 2
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Viruses, Biometrics, Encryption
Viruses,  Biometrics,  EncryptionViruses,  Biometrics,  Encryption
Viruses, Biometrics, Encryption
 
Electronic Communication Investigate
Electronic  Communication  InvestigateElectronic  Communication  Investigate
Electronic Communication Investigate
 
Internet Search Slideshow, Section 1
Internet Search Slideshow, Section 1Internet Search Slideshow, Section 1
Internet Search Slideshow, Section 1
 
Electronic Communication
Electronic CommunicationElectronic Communication
Electronic Communication
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Electronic Communication Investigate