Article Categories
- All Categories
-
Data Structure
-
Networking
-
RDBMS
-
Operating System
-
Java
-
MS Excel
-
iOS
-
HTML
-
CSS
-
Android
-
Python
-
C Programming
-
C++
-
C#
-
MongoDB
-
MySQL
-
Javascript
-
PHP
-
Economics & Finance
Articles by Kiran Kumar Panigrahi
Page 24 of 32
Difference Between Multimedia and Hypermedia
Multimedia integrates different forms of content such as text, audio, video, graphics, etc., to form a single presentation. We come across so many different forms of multimedia element on almost every webpage or App that we open. Multimedia is definitely heavy than the traditional static text-based content, but any form of multimedia can immediately attract the users' attention and convey the message quickly.Hypermedia is a mix of hypertext with media such as graphics, sounds, and animations. It can be understood as the improved version of hypertext.Read through this article to find out more about Multimedia and Hypermedia and how they ...
Read MoreDifference between Point-to-Point and Multi-point Communication
Communication, in general, is the process of transferring data from a source to a destination by using any of the available modes such as audio, video, text or even signals, etc. This communication may be straightforward between one sender and one receiver or it may include multiple senders and receivers. On the basis of the number of senders and receivers involved, a communication can either be "Point-to-Point" or "Multi-point".Read through this article to find out more about these two forms of communication and how they differ from each other.What is Point-to-Point Communication?In telecommunications, a point-to-point connection is a communications link ...
Read MoreDifference between Lossy Compression and Lossless Compression
Data Compression refers to a technique that allows a large file to be reduced to a smaller-size. It also allows decompressing the compressed file back into its original form.Lossy compression restores the large file to its original form with some level of loss in data which can be considered negligible, while lossless compression restores the compressed file to its original form without any loss of data.Read through this article to find out more about Lossy and Lossless compression techniques and how they are different from each other.What is Lossy Compression?Lossy compression is a type of data encoding and compression that ...
Read MoreDifference between IPv4 and IPv6
IPv4 and IPv6 are internet protocol versions, with IPv6 being an upgraded version of IPv4. There are several differences between the IPv4 and IPv6 protocols, including their functionality, but the most important difference is the quantity of addresses (Address space) that they create.Read through this article to find out more about IPv4 and IPv6 and how they are different from each other.What is Internet Protocol (IP)?The Internet Protocol is a set of rules that allows our computers to communicate via the Internet. IP addresses are basically in charge of directing the data packets to their correct destinations. IP controls all ...
Read MoreDifference between TELNET and FTP
FTP is an Internet protocol for transmitting or transferring data from one computer to another via TCP or IP networks. TELNET, on the other hand, is a connection protocol that allows a user to connect to a remote server waiting for commands. The user can then give commands to the server and inspect the returned responses, once the connection has been established.Read through this article to find out more about Telnet and FTP and how they are different from each other.What is Telnet?Telnet is a network protocol that allows you to remotely connect to a computer and establish a two-way, ...
Read MoreDifference between FTP and TFTP
FTP is used for copying files from one host to another host location. FTP works on Port 20 and 21. Port 20 is used for data and Port 21 is used for connection control.TFTP is lighter than FTP and is used when a file transfer functionality is needed without FTP features. It works on Port 69 and follows the UDP protocol.Read through this article to find out more about FTP and TFTP and how they are different from each other.What is FTP?FTP stands for File Transfer Protocol. It is a client/server protocol for sending files to and from a host ...
Read MoreDifference between File Transfer Protocol (FTP) and Secure File Transfer Protocol (SFTP)
Both FTP and SFTP are file transfer protocols and they are used to transfer files from one system to another. FTP does not use any secure channel to transfer files, whereas SFTP uses SSH protocol to establish a control connection. SFTP is highly secure than FTP.Read through this article to find out more about FTP and SFTP and how they are different from each other.What is File Transfer Protocol (FTP)?FTP stands for File Transfer Protocol; it is a client/server protocol for sending files to and from a host computer. User names and passwords can be used to authenticate FTP.Some websites ...
Read MoreDifference between CSMA/CA and CSMA/CD
Both CSMA/CA and CSMA/CD are network protocols for transmission that operate in the Medium Access Control Layer, however there are significant differences in the way they operate. Read through this article to find out more about CSMA/CA and CSMA/CD and how they are different from each other.What is CSMA/CA?CSMA/CA is a network protocol for carrier transmission that stands for Carrier Sense Multiple Access with Collision Avoidance. It works in the same media access control layer as CSMA/CD. This protocol is effective before the collision.Algorithm of CSMA/CAThe algorithm of CSMA/CA is as follows −When a frame is ready, the transmitting station ...
Read MoreDifference Between Hub and Bridge
Both Hubs and Bridges are network connecting devices and both of them broadcast data to every node on a network. Hubs operate at the Physical Layer and they do not perform packet filtering or addressing function; they send the data packets to all the connected devices. Bridges connect various devices in a network.A bridge operates at the data link layer to connect multiple networks. It can read the outmost section of a data packet to tell where the message is going. A bridge can be programmed to reject packets from a particular network, so it can be used to reduce ...
Read MoreDifference between Spoofing and Phishing
Spoofing is an identity theft where a person tries to use the identity of a legitimate user. Phishing, on the other hand, is a phenomenon where an attacker employs social engineering methods to steal sensitive and confidential information from a user. Spoofing and phishing are both forms of cyber-attacks aimed at tricking you into disclosing your personal information. Both methods will be used by a criminal to gain your user names, passwords, and maybe more. Despite the fact that their final aim is the same, their techniques are not. Read through this article to find out more ...
Read More