- Trending Categories
Data Structure
Networking
RDBMS
Operating System
Java
MS Excel
iOS
HTML
CSS
Android
Python
C Programming
C++
C#
MongoDB
MySQL
Javascript
PHP
Physics
Chemistry
Biology
Mathematics
English
Economics
Psychology
Social Studies
Fashion Studies
Legal Studies
- Selected Reading
- UPSC IAS Exams Notes
- Developer's Best Practices
- Questions and Answers
- Effective Resume Writing
- HR Interview Questions
- Computer Glossary
- Who is Who
Kiran Kumar Panigrahi has Published 425 Articles
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
624 Views
Have you ever seen http:// or https:// in a browser's address bar while surfing a website? In a nutshell, both of these are protocols that allow a web server and a web browser to communicate about a certain website. But, what are the features that distinguish these two? Well, the ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
8K+ Views
What is Routing? The process of determining a path for traffic inside a network or across or across different networks is known as routing. Routing occurs in a wide range of networks, including circuit-switched networks like the public switched telephone network (PSTN) and computer networks like the Internet. Routing is ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
819 Views
Both Firewall and Antivirus are security tools that protect the computer systems as well as the network infrastructure from virus, worms, Trojans, and other such cyber-threats. Firewalls scan and evaluate the data packets before they enter into a network, and then they either allow or deny the data packets based ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
1K+ Views
A Malware is a malicious program that is used by attackers to perform illegal operations on a user's machine, such as stealing personal information, corrupting system/network, encrypting data for "ransom" or deleting the data, etc.An Adware is a program that displays Ads during its execution. Developers get money from this ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
859 Views
Both these terms "cybersecurity" and "network security" are related to security measures that organizations employ to protect their data, systems, and network infrastructure from online threats. However, cybersecurity is used in a much broader sense, while network security is a subset of cybersecurity. Read through this article to find out ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
17K+ Views
When we surf the Internet, a two-way communication takes place between our web browser (client) and a web server (server). To regulate this communication, there are some protocols among which the most common one is the HTTP protocol, where the browser sends an HTTP request to the server and then ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
984 Views
When we surf the Internet, the webpages that we see and the contents that we download generally come from the "surface web". This is the part of the world wide web that is accessible to all with an Internet connection. The Surface Web is huge, but in reality, it covers ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
A VPN connects a private network to another public network, which allows users to transmit and receive data as if their computers were connected to the private network physically.MPLS is a routing technique that is used to improve the speed and control of the network traffic. It speeds up traffic ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
2K+ Views
What is USB?A Universal Serial Bus (USB) is a communication interface that allows devices to communicate with a host controller such as a computer system. It links peripheral devices including digital cameras, mice, keyboards, scanners, printers, media players, flash drives, and external hard drives to a computer.A USB may be ... Read More
![Kiran Kumar Panigrahi](https://www.tutorialspoint.com/assets/profiles/390736/profile/60_2598-1635242143.png)
Kiran Kumar Panigrahi
5K+ Views
Channel allocation techniques are used in radio resource management for wireless and cellular networks to distribute bandwidth and communication channels to base stations, access points, and terminal devices.The objective of channel allocation is to maximize system spectral efficiency in bits/s/Hz/site through frequency reuse while maintaining a high level of service ... Read More