Kevin Patel Block 4 03/05/09
Kevin PatelBlock 4
03/05/09
A hard bounce is a e-mail sent to the sender of an e-mail who’s recipient could not be found.
A soft bounce is a similar error message sent to a patron due to the fact that the recipients inbox is full
Computer spam is the sending of e-mails that have bad intentions; these can range from credit card spam to identity theft.
The internet is the wide connection of servers all across the world. These servers can be “surfed” with internet browsers such as Mozilla Firefox, or Internet Explorer.
Intranet is similar but over a small number of servers or computers
In computing, the Post Office Protocol version 3 (POP3) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP3 and IMAP4 (Internet Message Access Protocol) are the two most prevalent Internet standard protocols for e-mail retrieval. Virtually all modern e-mail clients and servers support both.
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites (YouTube, Facebook, MySpace, Windows Live Messenger), auction sites (eBay
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge. Decryption is the opposite.
Netiquette is internet etiquette it is an essential skill to have so that surfing is a safe ,easy ,and fun process
Routers re-route internet to all the parts of you’re house so you can have it. This is routed by the us of Ethernet cables which allow you to use the internet.