- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Found 1980 Articles for Differences
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
41K+ Views
Both Routers and Switches are network connecting devices. Routers work at the network layer and are responsible to find the shortest path for a packet across the network, whereas Switches connect various devices in a network. Routers connect devices across multiple networks. Read through this article to find out more about these two network devices and how they operate to understand how they are different from each other. What is a Router? Routers are network connecting devices that determine the shortest path for a packet to take to get to its destination. A router's primary function is to connect ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
117K+ Views
Both BFS and DFS are types of graph traversal algorithms, but they are different from each other. BFS or Breadth First Search starts from the top node in the graph and travels down until it reaches the root node. On the other hand, DFS or Depth First Search starts from the top node and follows a path to reaches the end node of the path. Read this article to learn more about these two graph traversal algorithms and how they are different from each other. What is BFS? Breadth First Search (BFS) algorithm traverses a graph in a breadth-ward motion ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
14K+ Views
Active and Passive Attacks are security attacks that jeopardize the security of a system. Security attacks are basically the unauthorized actions that that are taken to destroy, change, or steal the sensitive information and data from the system. In an Active attack, an attacker tries to modify the content of the messages. On the other hand, in a Passive attack, an attacker observes the messages, copy them and may use them for malicious purposes. Read this article to find out more about Active and Passive attacks and how they are different from each other. Let's start with some basics of ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
6K+ Views
Stop and Wait protocol is a protocol for flow control mechanism. In this protocol, the sender sends one frame at a time and waits for acknowledgment from the receiver. Once acknowledged, the sender sends another frame to the receiver. Stop and Wait protocol is also a protocol for flow control mechanism. In this protocol, the sender sends multiple frames at a time and retransmits the frames which are found to be corrupted or damaged. Read through this article to find out more about these two protocols and how they are different from each other. What is Stop and Wait ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
4K+ Views
GUI and CLI are the types of interfaces created by an operating system between the user and the hardware components. GUI (Graphical User Interface) uses graphical elements like icons, menus, etc. to create a communication channel between the user and machine, while CLI (Command Line Interface) uses text commands to create a communication channel between the user and the machine. Read this article to find out more about GUI and CLI and how these two interfaces are different from each other. What is GUI? GUI stands for Graphical User Interface. GUI-based operating systems are very easy to use because they ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
18K+ Views
In computers, several types of secondary storage devices like CDs, DVDs, Blue-Ray Discs, HDDs, etc. are used for permanent storage of data and information. Both CD and DVD are the types of optical storage devices whose operation is based on the optical effects. Both CD and DVD use red LASER to perform read and write operations. However, they are quite different from each other in many aspects. In this article, we will discuss all the important differences between CD and DVD. Let's start with some basics of CD and DVD. What is a CD? CD stands for Compact ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
14K+ Views
WiFi and WiMax are used to create wireless network connections. WiFi is used to create small networks and used to connect printers, computers, gaming consoles, whereas WiMax uses spectrum to deliver connection to network. WiMax is used to provide Internet services such as Mobile Data and hotspots. Go through this article to find out more about the features of WiFi and WiMax and how they are different from each other. What is WiFi? WiFi (Wireless Fidelity) is a combination of wireless network protocols based on the IEEE 802.11 family of standards that are widely used for device networking and Internet ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
7K+ Views
The process of turning plain text into an encrypted form (cipher text) is known as encryption. Sensitive data is transmitted in an encrypted form so that it can be protected and a strong encryption mechanism ensures that the data is not misused even if a hacker gets hold of it. Decryption is the reverse mechanism where the encrypted cipher text is converted back into its original form.Read through this article to find out more about encryption and decryption and how they are different from each other.What is Encryption?Encryption is the procedure of encoding data in cryptography. This procedure turns plaintext, ... Read More
![Mahesh Parahar](https://www.tutorialspoint.com/assets/profiles/127878/profile/60_2277600-1655382864.jpg)
8K+ Views
Both MAC Address and IP Address are used to uniquely identify a machine on the internet. MAC address is provided by the chip maker while IP Address is provided by the Internet Service Provider. Mac Address Media Access Control (MAC) address is a physical address that works at the data link layer of the OSI model. A MAC address is a 48 or 64-bit address associated with a network adapter. MAC addresses are linked to the hardware of the network adapters, hence they are also known as the "hardware address" or "physical address." MAC addresses uniquely identify the adapter ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
2K+ Views
Connection-oriented and Connection-less Services are used to establish connections between two or more devices. Connection-oriented Services A connection-oriented service is one that establishes a dedicated connection between the communicating entities before data communication commences. It is modeled after the telephone system. To use a connection-oriented service, the user first establishes a connection, uses it and then releases it. In connection-oriented services, the data streams/packets are delivered to the receiver in the same order in which they have been sent by the sender. Connection-oriented services may be done in either of the following ways − Circuit-switched connection: In circuit ... Read More